Sample records for intrusion detection system

  1. Interior intrusion detection systems

    SciTech Connect (OSTI)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01T23:59:59.000Z

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  2. A system for distributed intrusion detection

    SciTech Connect (OSTI)

    Snapp, S.R.; Brentano, J.; Dias, G.V.; Goan, T.L.; Heberlein, L.T.; Ho, Che-Lin; Levitt, K.N.; Mukherjee, B. (California Univ., Davis, CA (USA). Div. of Computer Science); Grance, T. (Air Force Cryptologic Support Center, San Antonio, TX (USA)); Mansur, D.L.; Pon, K.L. (Lawrence Livermore National Lab., CA (USA)); Smaha, S.E. (Haystack Labs., Inc., Austin, TX (USA))

    1991-01-01T23:59:59.000Z

    The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of our present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.

  3. Traffic Analysis: From Stateful Firewall to Network Intrusion Detection System

    E-Print Network [OSTI]

    Chiueh, Tzi-cker

    1 Traffic Analysis: From Stateful Firewall to Network Intrusion Detection System Fanglu Guo Tzi normalization. Index Terms Packet (traffic) analysis, stateful firewall, network intrusion detection system intrusion detection system (NIDS). Stateful firewall analyzes packets up to their layer 4 headers while NIDS

  4. The architecture of a network level intrusion detection system

    SciTech Connect (OSTI)

    Heady, R.; Luger, G.; Maccabe, A.; Servilla, M. [New Mexico Univ., Albuquerque, NM (United States). Dept. of Computer Science

    1990-08-15T23:59:59.000Z

    This paper presents the preliminary architecture of a network level intrusion detection system. The proposed system will monitor base level information in network packets (source, destination, packet size, and time), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  5. NeuDetect: A Neural Network Data Mining Wireless Network Intrusion Detection System

    E-Print Network [OSTI]

    Ezeife, Christie

    NeuDetect: A Neural Network Data Mining Wireless Network Intrusion Detection System C.I. Ezeife wireless intrusion detection systems, this paper presents a method of applying artificial neural networks mining clas- sification technique to wireless network intrusion detection system. The proposed system

  6. Rule Mode Selection in Intrusion Detection and Prevention Systems

    E-Print Network [OSTI]

    Boutaba, Raouf

    to maximize the security enforcement levels while avoiding any unnecessary network performance degradation to strike a balance between system security and network performance. Index Terms--Security Performance Evaluation, Security Management, Security Configuration. I. INTRODUCTION Intrusion Detection and

  7. Evolution Induced Secondary Immunity: An Artificial Immune System based Intrusion Detection System

    E-Print Network [OSTI]

    Sanyal, Sugata

    Evolution Induced Secondary Immunity: An Artificial Immune System based Intrusion Detection System@rediffmail.com Abstract The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Artificial Immune System along with Genetic algorithm to develop an Intrusion Detection System. Far from

  8. Visual monitoring environments, such as intrusion detection systems, debugging

    E-Print Network [OSTI]

    Erbacher, Robert F.

    Abstract Visual monitoring environments, such as intrusion detection systems, debugging environments, and feature extraction systems, require that a user familiar with the target domain examine, most in an efficient form. How the users employ the environment and the type and quantity of data will also affect

  9. Threshold Verification Technique for Network Intrusion Detection System

    E-Print Network [OSTI]

    Faizal, M A; Shahrin, S; Robiah, Y; Rahayu, S Siti; Nazrulazhar, B

    2009-01-01T23:59:59.000Z

    Internet has played a vital role in this modern world, the possibilities and opportunities offered are limitless. Despite all the hype, Internet services are liable to intrusion attack that could tamper the confidentiality and integrity of important information. An attack started with gathering the information of the attack target, this gathering of information activity can be done as either fast or slow attack. The defensive measure network administrator can take to overcome this liability is by introducing Intrusion Detection Systems (IDSs) in their network. IDS have the capabilities to analyze the network traffic and recognize incoming and on-going intrusion. Unfortunately the combination of both modules in real time network traffic slowed down the detection process. In real time network, early detection of fast attack can prevent any further attack and reduce the unauthorized access on the targeted machine. The suitable set of feature selection and the correct threshold value, add an extra advantage for I...

  10. Neural Network Based Intrusion Detection System for Critical Infrastructures

    SciTech Connect (OSTI)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01T23:59:59.000Z

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  11. IDSaaS: Intrusion Detection System as a Service in Public Clouds Turki Alharkan

    E-Print Network [OSTI]

    IDSaaS: Intrusion Detection System as a Service in Public Clouds Turki Alharkan School of Computing to monitor and protect their virtual existence by implementing their own intrusion detection capabilities along with other security technologies within the cloud fabric. Intrusion Detection as a Service (IDSaa

  12. Detecting Intrusion Faults in Remotely Controlled Systems Salvatore Candido and Seth Hutchinson

    E-Print Network [OSTI]

    Hutchinson, Seth

    the design process. With this in mind, researchers have begun to address security issues specific to controlDetecting Intrusion Faults in Remotely Controlled Systems Salvatore Candido and Seth Hutchinson to a remote-controlled system (deemed an "intrusion fault" or "intrusion") despite attempts to conceal

  13. An Efficient Intrusion Detection System Design Thomas Holz, Michael Meier, Hartmut Koenig

    E-Print Network [OSTI]

    Meier, Michael

    mechanisms (e.g. authentication, encryption, or access control) they provide an automatic detection1 An Efficient Intrusion Detection System Design Thomas Holz, Michael Meier, Hartmut Koenig Mail:{thh,mm,koenig}@informatik.tu-cottbus.de Abstract: Intrusion detection systems have proved

  14. An evaluation of fiber optic intrusion detection systems in interior applications

    SciTech Connect (OSTI)

    Vigil, J.T.

    1994-03-01T23:59:59.000Z

    This report discusses the testing and evaluation of four commercially available fiber optic intrusion detection systems. The systems were tested under carpet-type matting and in a vaulted ceiling application. This report will focus on nuisance alarm data and intrusion detection results. Tests were conducted in a mobile office building and in a bunker.

  15. A Game Theoretic Analysis of Intrusion Detection in Access Control Systems

    E-Print Network [OSTI]

    Alpcan, Tansu

    . The security of an access control system is of prime importance and is crucial for a successful operation, decision, and control processes for information security and intrusion detection. Such a mathematicalA Game Theoretic Analysis of Intrusion Detection in Access Control Systems Tansu Alpcan and Tamer

  16. Development and Testing of Field-Deployable Real-Time Laser-Based Non-Intrusive Detection System for Measurement of True Travel Time on the Highway

    E-Print Network [OSTI]

    2001-01-01T23:59:59.000Z

    Real-Time Laser-Based Non-Intrusive Detection System forof a laser-based non-intrusive detection system for real-Real-Time Laser-Based Non-Intrusive Detection System for

  17. A Field-Deployable Real-Time Laser-Based Non-Intrusive Detection System for Measurement of True Travel Time on the Highway

    E-Print Network [OSTI]

    Cheng, Harry H.; Shaw, Ben; Palen, Joe; Wang, Zhaoqing; Chen, Bo

    2002-01-01T23:59:59.000Z

    Real-Time Laser-Based Non-Intrusive Detection System forJoe Palen, "A Laser-Based Non-Intrusive Detection System forReal-Time Laser-Based Non-Intrusive Detection System for

  18. Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems

    E-Print Network [OSTI]

    Peisert, Sean

    ) for protecting automated distribution systems (ADS) against certain types of cyber attacks in a new way, distribution au- tomation, network security, intrusion detection systems. I. INTRODUCTION A. Scope and Goals their development with that of an appropriate cyber security frame- work that would prevent attackers from gaining

  19. A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11

    SciTech Connect (OSTI)

    Heady, R.; Luger, G.F.; Maccabe, A.B.; Servilla, M.; Sturtevant, J. [New Mexico Univ., Albuquerque, NM (United States). Dept. of Computer Science

    1991-05-15T23:59:59.000Z

    This paper presents the implementation of a prototype network level intrusion detection system. The prototype system monitors base level information in network packets (source, destination, packet size, time, and network protocol), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  20. A Mobility and Energy-aware Hierarchical Intrusion Detection System for Mobile ad hoc Networks

    E-Print Network [OSTI]

    Stavrakakis, Ioannis

    A Mobility and Energy-aware Hierarchical Intrusion Detection System for Mobile ad hoc Networks consumption. The proposed architecture adopts and enhances the Mobility and Energy Aware Clustering Algorithm and energy of nodes in the cluster formation in order to improve detection accuracy and re- duce energy

  1. Functional requirements with survey results for integrated intrusion detection and access control annunciator systems

    SciTech Connect (OSTI)

    Arakaki, L.H.; Monaco, F.M.

    1995-09-01T23:59:59.000Z

    This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

  2. Decentralized Detector Generation in Cooperative Intrusion Detection Systems

    E-Print Network [OSTI]

    Alpcan, Tansu

    mechanisms, distributed monitoring-detection-prevention with self- * properties and a security simulation/evaluation) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay network. The AIS uses the negative selection algorithm for the selection of detectors (e

  3. Using ACL2 to Verify Security Properties of Specification-based Intrusion Detection Systems

    E-Print Network [OSTI]

    California at Davis, University of

    Using ACL2 to Verify Security Properties of Specification- based Intrusion Detection Systems Tao. These specifications are mainly developed manually, based upon an expert understanding of characteristics of #12;the to normal users [CK01]. In SHIM, specifications are developed in SHIM to constrain the behaviors

  4. New Hardware and Software Design of a Field-Deployable Real-Time Laser-Based Non-Intrusive Detection System for Measurement of True Travel Time on the Highway

    E-Print Network [OSTI]

    2001-01-01T23:59:59.000Z

    Real-Time Laser-Based Non-Intrusive Detection System forReal-Time Laser-Based Non-Intrusive Detection System foroptics. The laser-based non-intrusive detection system uses

  5. Intrusion Detection Techniques in Sensor Aikaterini Mitrokotsa

    E-Print Network [OSTI]

    to the network administrator because communication between the access point and the clients is broadcastPDF PROOF Intrusion Detection Techniques in Sensor Networks Aikaterini Mitrokotsa Department Research has been conducted in wired network Intrusion Detection Systems (IDS) for over 25 years. Although

  6. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    SciTech Connect (OSTI)

    Jared Verba; Michael Milvich

    2008-05-01T23:59:59.000Z

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  7. Performance Analysis in Intrusion Detection and Prevention Systems

    E-Print Network [OSTI]

    Boutaba, Raouf

    between system security and network performance. Index Terms--Security Performance Evaluation, Security. The evaluation of the IDPS performance for any given security configuration is a crucial step for improving real-checking process along with its consequent action (i.e., alert or drop) on the resulting security of the network

  8. Intrusion detection sensor testing tools

    SciTech Connect (OSTI)

    Hayward, D.R.

    1994-08-01T23:59:59.000Z

    Intrusion detection sensors must be frequently tested to verify that they are operational, and they must be periodically tested to verify that they are functioning at required performance levels. Concerns involving this testing can include: The significant amount of manpower required, inconsistent results due to variability in methods and personnel, exposure of personnel to hazardous environments, and difficulty in obtaining access to the areas containing some of the intrusion sensors. To address these concerns, the Department of Energy directed Sandia National Labs. to develop intrusion detection sensor testing tools. Over the past two years Sandia has developed several sensor testing tool prototypes. This paper describes the evolution of an exterior intrusion detection sensor tester and automatic data logger, and also describes various interior intrusion detection sensor test fixtures that can be remotely activated to simulate an intruder.

  9. Intrusion detection in mobile ad hoc networks

    E-Print Network [OSTI]

    Sun, Bo

    2005-08-29T23:59:59.000Z

    .Zone-BasedIntrusionDetectionSystem(ZBIDS)...... 25 1. ZBIDSFramework.................... 25 D.InternalModeloftheIDSAgent............... 29 1. DataCollectionModule................. 30 2. DetectionEngine..................... 31 3. Local Aggregation and Correlation Engine (LACE) . . 32 4. Global... have been widely regarded as being part of the solution to protect today?s computer systems. Research on IDSs began with a report by Anderson [9] followed by Denning?s seminal paper [10], which lays the foundation for most of the current intrusion...

  10. HPNAIDM: The High-Performance Network Anomaly/Intrusion Detection and Mitigation System

    SciTech Connect (OSTI)

    Chen, Yan [Northwesten University] [Northwesten University

    2013-12-05T23:59:59.000Z

    Identifying traffic anomalies and attacks rapidly and accurately is critical for large network operators. With the rapid growth of network bandwidth, such as the next generation DOE UltraScience Network, and fast emergence of new attacks/virus/worms, existing network intrusion detection systems (IDS) are insufficient because they: • Are mostly host-based and not scalable to high-performance networks; • Are mostly signature-based and unable to adaptively recognize flow-level unknown attacks; • Cannot differentiate malicious events from the unintentional anomalies. To address these challenges, we proposed and developed a new paradigm called high-performance network anomaly/intrustion detection and mitigation (HPNAIDM) system. The new paradigm is significantly different from existing IDSes with the following features (research thrusts). • Online traffic recording and analysis on high-speed networks; • Online adaptive flow-level anomaly/intrusion detection and mitigation; • Integrated approach for false positive reduction. Our research prototype and evaluation demonstrate that the HPNAIDM system is highly effective and economically feasible. Beyond satisfying the pre-set goals, we even exceed that significantly (see more details in the next section). Overall, our project harvested 23 publications (2 book chapters, 6 journal papers and 15 peer-reviewed conference/workshop papers). Besides, we built a website for technique dissemination, which hosts two system prototype release to the research community. We also filed a patent application and developed strong international and domestic collaborations which span both academia and industry.

  11. Advanced technologies for perimeter intrusion detection sensors

    SciTech Connect (OSTI)

    Williams, J.D.

    1995-03-01T23:59:59.000Z

    The development of integrated circuit fabrication techniques and the resulting devices have contributed more to the advancement of exterior intrusion detectors and alarm assessment devices than any other technology. The availability of this technology has led to the improvements in and further development of smaller more powerful computers, microprocessors, solid state memories, solid state cameras, thermal imagers, low-power lasers, and shorter pulse width and higher frequency electronic circuitry. This paper presents information on planning a perimeter intrusion detection system, identifies the site characteristics that affect its performance, and describes improvements to perimeter intrusion detection sensors and assessment devices that have been achieved by using integrated circuit technology.

  12. adaptive intrusion data systems: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    approaches: known pattern Pei, Jian 4 Multisensor Data Fusion for Next Generation Distributed Intrusion Detection Systems CiteSeer Summary: Next generation cyberspace intrusion...

  13. Autonomous Rule Creation for Intrusion Detection

    SciTech Connect (OSTI)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01T23:59:59.000Z

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  14. AIDE - Advanced Intrusion Detection Environment

    SciTech Connect (OSTI)

    Smith, Cathy L.

    2013-04-28T23:59:59.000Z

    Would you like to know when someone has dropped an undesirable executable binary on our system? What about something less malicious such as a software installation by a user? What about the user who decides to install a newer version of mod_perl or PHP on your web server without letting you know beforehand? Or even something as simple as when an undocumented config file change is made by another member of the admin group? Do you even want to know about all the changes that happen on a daily basis on your server? The purpose of an intrusion detection system (IDS) is to detect unauthorized, possibly malicious activity. The purpose of a host-based IDS, or file integrity checker, is check for unauthorized changes to key system files, binaries, libraries, and directories on the system. AIDE is an Open Source file and directory integrity checker. AIDE will let you know when a file or directory has been added, deleted, modified. It is included with the Red Hat Enterprise 6. It is available for other Linux distros. This is a case study describing the process of configuring AIDE on an out of the box RHEL6 installation. Its goal is to illustrate the thinking and the process by which a useful AIDE configuration is built.

  15. adaptive intrusion detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Last Page Topic Index 1 Adaptive Model Generation for Intrusion Detection Systems Computer Technologies and Information Sciences Websites Summary: Adaptive Model Generation for...

  16. acquisition intrusion detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Next Page Last Page Topic Index 1 Security Intrusion & Detection Security Intrusion Computer Technologies and Information Sciences Websites Summary: intrusions, log suspicious...

  17. Challenges and Solutions for Intrusion Detection in Wireless Mesh Networks

    E-Print Network [OSTI]

    Hassanzadeh, Amin

    2014-05-03T23:59:59.000Z

    detection can be achieved in such resource constrained environments. The major challenges that hinder the performance of intrusion detection systems (IDS) in WMN are resources (e.g., energy, processing, and storage capabilities) accompanied by the adhoc...

  18. A New Approach To Robust Non-Intrusive Traffic Detection at Intersections!

    E-Print Network [OSTI]

    Minnesota, University of

    A New Approach To Robust Non-Intrusive Traffic Detection at Intersections! Chad Stelzig ­ Algorithm Solutions! Background and Terminology !! § "Non-Intrusive Detection Systems"! § Above ground detection accuracy with a non- intrusive system! #12;Global Solutions! Single Sensor Detection Systems! § Any

  19. Intrusion detection using secure signatures

    DOE Patents [OSTI]

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30T23:59:59.000Z

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  20. A Hardware Platform for Network Intrusion Detection and Prevention Chris Clark1

    E-Print Network [OSTI]

    Lee, Wenke

    A Hardware Platform for Network Intrusion Detection and Prevention Chris Clark1 , Wenke Lee2, athomas}@cc.gatech.edu Abstract The current generation of centralized network intrusion detection systems that intrusion detection analysis should be distributed to network node IDS (NNIDS) running in hardware

  1. Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems

    E-Print Network [OSTI]

    Parvania, Masood; Koutsandria, Georgia; Muthukumar, Vishak; Peisert, Sean; McParland, Chuck; Scaglione, Anna

    2014-01-01T23:59:59.000Z

    Security protocols against cyber attacks in the distributioncyber security weak- ness and system fragility of power distribution

  2. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems

    E-Print Network [OSTI]

    Chen, Ing-Ray

    within radio range Na b (t) Attacker strength detected at time t in Beta(, ) in Beta(, ) Number of ranging operations per node per TIDS Et Energy for transmission per node Er Energy for reception per node Ea Energy for analyzing data per node Es Energy for sensing per node Eo Initial system energy TIDS

  3. LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED

    E-Print Network [OSTI]

    Smith, Sean W.

    challenge, since on top of the resource restrictions inherent to embedded devices, SCADA systems must to intrusion detection for SCADA systems, and are currently porting Autoscopy to actual power hardware to test operating as part of a SCADA system, where this logic applies to the control of potentially hazardous

  4. Intrusion Detection via Static Analysis David Wagner

    E-Print Network [OSTI]

    Wagner, David

    Xerox PARC ddean@parc.xerox.com Abstract One of the primary challenges in intrusion detection degree of automation, pro­ tection against a broad class of attacks based on corrupted code. Beginning with Sun's introduction of the Java language and its support of mobile code in 1995, pro­ gramming

  5. anomaly-based intrusion detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Topic Index 1 Applying Kernel Methods to Anomaly Based Intrusion Detection Systems Computer Technologies and Information Sciences Websites Summary: . There are two types of...

  6. MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT

    E-Print Network [OSTI]

    Noel, Steven

    MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT Steven Noel Center for Secure, with a particular emphasis on the emerging approach of data mining. The discussion parallels two important aspects security, Intrusion detection, data mining 1. Introduction The goal of intrusion detection is to discover

  7. Non-intrusive fault detection in reciprocating compressors

    E-Print Network [OSTI]

    Schantz, Christopher James

    2011-01-01T23:59:59.000Z

    This thesis presents a set of techniques for non-intrusive sensing and fault detection in reciprocating compressors driven by induction motors. The procedures developed here are "non-intrusive" because they rely only on ...

  8. Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs

    E-Print Network [OSTI]

    Noel, Steven

    Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

  9. Distributed fiber optic moisture intrusion sensing system

    DOE Patents [OSTI]

    Weiss, Jonathan D. (Albuquerque, NM)

    2003-06-24T23:59:59.000Z

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  10. Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems

    E-Print Network [OSTI]

    Cho, Sung-Bae

    and Elman neural network. [6] compares frequency, data mining, and HMM. Results in [5] and [6] show that exploiting temporal sequence information of events leads to better performance and hidden Markov model (HMM. Forrest at New Mexico University for modeling and evaluating invisible events based on system calls. HMM

  11. automated intrusion detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CLASS FILES, VOL. 1, NO. 11, NOVEMBER 2002 1 Hi-DRA: Intrusion Detection for Internet Security Computer Technologies and Information Sciences Websites Summary: for Internet...

  12. A Network-Processor-Based Traffic Splitter for Intrusion Detection

    E-Print Network [OSTI]

    Markatos, Evangelos P.

    1 A Network-Processor-Based Traffic Splitter for Intrusion Detection Ioannis Charitakis, Kostas processor and evaluated its performance using a combination of experimental evaluation and simulation. Our network-level security and protection, Network Processors, Intrusion Detection I. Charitakis and E. P

  13. Intrusion Detection, Diagnosis, and Recovery with SelfSecuring Storage

    E-Print Network [OSTI]

    Intrusion Detection, Diagnosis, and Recovery with Self­Securing Storage John Strunk, Garth Goodson Carnegie Mellon University Pittsburgh, 15213 Abstract Self­securing storage turns storage devices active parts of intrusion survival strategy. From behind storage interface (e.g., SCSI CIFS), a self

  14. A Hybrid Artificial Immune System and Self Organising Map for Network Intrusion

    E-Print Network [OSTI]

    Alvarez, Nadir

    A Hybrid Artificial Immune System and Self Organising Map for Network Intrusion Detection Simon T using an artificial immune system. Connections that are flagged as anoma- lous are then categorised://www.sciencedirect.com/science/article/pii/S0020025507005531.] Key words: Artificial immune system; Self Organizing Map; Intrusion detection; Genetic algorithm

  15. HoBIDS: A Data Mining Approach to Host Based Intrusion Detection

    E-Print Network [OSTI]

    Hershkop, Shlomo

    HoBIDS: A Data Mining Approach to Host Based Intrusion Detection Department of Computer Science of a host based IDS built on a data mining framework. This framework allows the system to detect both known and lightweight sensor system with the capabilities of sophisticated data-mining techniques to build a powerful

  16. Minimally intrusive strategies for fault detection and energy monitoring

    E-Print Network [OSTI]

    Cox, Robert Williams, 1979-

    2006-01-01T23:59:59.000Z

    This thesis addresses the need for automated monitoring systems that rely on minimally intrusive sensor arrays. The monitoring techniques employed in this thesis require fewer sensors because they take a different approach ...

  17. Real-time Vehicle Reidentification System for Freeway Performance Measurements

    E-Print Network [OSTI]

    Jeng, Shin-Ting

    2007-01-01T23:59:59.000Z

    system are considered “non-intrusive detection systems”detection systems, non-intrusive detection systems areproblem. Among the non- intrusive detection systems ILDs,

  18. Learning Cost-Sensitve Classification Rules for Network Intrusion Detection using RIPPER

    E-Print Network [OSTI]

    Yang, Junfeng

    Report CUCS-035-1999 Advanced Intelligent Systems CS4721 Spring 1999 Final Project Matthew Miller which can be used to test live network stream input in order to detect intrusions. This is done connections to build a set of connection profile records that can be useful in detection [Lee 99

  19. Energy Efficient Intrusion Detection in Camera Sensor Networks

    E-Print Network [OSTI]

    Guibas, Leonidas J.

    Energy Efficient Intrusion Detection in Camera Sensor Networks Primoz Skraba1 and Leonidas Guibas2 on low cost, low bandwidth sensors. With dropping costs and advances in imaging technology, there is now of challenges. If used continuously, cameras consume too much energy to operate on battery power. While

  20. Evaluation of Non-intrusive Traffic Detection Technologies Phase III

    E-Print Network [OSTI]

    Minnesota, University of

    TPF-5(171) Evaluation of Non-intrusive Traffic Detection Technologies Đ Phase III #12 not intrude into pavement for installation. ·! Sensors above, below or to the side of the roadway qualify;Miovision #12;Miovision #12;Laser-based sensors #12;PEEK AxleLight #12;TIRTL #12;TIRTL #12;#12;#12;#12;

  1. Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule

    E-Print Network [OSTI]

    Chen, Ing-Ray

    . Intrusion detection systems (IDSs) are security appliances that review audit data to identify cyber attacks is of the utmost importance. An IDS audits UAVs in a distributed system to determine if the UAVs are functioning and opportunistic attacker behaviors (modes which many historical cyber attacks have used) on the effectiveness

  2. Data Mining Approaches for Intrusion Detection Wenke Lee Salvatore J. Stolfo

    E-Print Network [OSTI]

    Somayaji, Anil

    Data Mining Approaches for Intrusion Detection Wenke Lee Salvatore J. Stolfo Computer Science. The key ideas are to use data mining techniques to discover consistent and useful patterns of system experiments on the sendmail system call data and the network tcpdump data, we demonstrate that we can

  3. Application of Data Mining to Network Intrusion Detection: Classifier Selection Model

    E-Print Network [OSTI]

    Nguyen, Huy

    2010-01-01T23:59:59.000Z

    As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS becomes an important open problem that is receiving more and more attention from the research community. The uncertainty to explore if certain algorithms perform better for certain attack classes constitutes the motivation for the reported herein. In this paper, we evaluate performance of a comprehensive set of classifier algorithms using KDD99 dataset. Based on evaluation results, best algorithms for each attack category is chosen and two classifier algorithm selection models are proposed. The simulation result comparison indicates that noticeable performance improvement and real-time intrusion detection can be achieved as we apply the proposed models to detect different kinds of network at...

  4. Detection and diagnosis of faults and energy monitoring of HVAC systems with least-intrusive power analysis

    E-Print Network [OSTI]

    Luo, Dong, 1966-

    2001-01-01T23:59:59.000Z

    Faults indicate degradation or sudden failure of equipment in a system. Widely existing in heating, ventilating, and air conditioning (HVAC) systems, faults always lead to inefficient energy consumption, undesirable indoor ...

  5. Non-intrusive cooling system

    DOE Patents [OSTI]

    Morrison, Edward F. (Burnt Hills, NY); Bergman, John W. (Barrington, NH)

    2001-05-22T23:59:59.000Z

    A readily replaceable heat exchange cooling jacket for applying fluid to a system conduit pipe. The cooling jacket comprises at least two members, separable into upper and lower portions. A chamber is formed between the conduit pipe and cooling jacket once the members are positioned about the pipe. The upper portion includes a fluid spray means positioned above the pipe and the bottom portion includes a fluid removal means. The heat exchange cooling jacket is adaptable with a drain tank, a heat exchanger, a pump and other standard equipment to provide a system for removing heat from a pipe. A method to remove heat from a pipe, includes the steps of enclosing a portion of the pipe with a jacket to form a chamber between an outside surface of the pipe and the cooling jacket; spraying cooling fluid at low pressure from an upper portion of the cooling jacket, allowing the fluid to flow downwardly by gravity along the surface of the pipe toward a bottom portion of the chamber; and removing the fluid at the bottom portion of the chamber.

  6. A Statistical Framework for Intrusion Detection in Ad Hoc Networks

    E-Print Network [OSTI]

    Sarkar, Saswati

    with limited processing power. The overall framework provides a good balance between complexity and performance means of electronic com- munication in areas where establishing infrastructure like base stations etc. [5], [6]. These intrusions leverage system vulnerabilities. There are two ways to prevent

  7. UCLog: A Unified, Correlated Logging Architecture for Intrusion Detection

    E-Print Network [OSTI]

    Zhou, Yuanyuan

    targets for terrorists and criminals to break-in. Intrusions can compromise the integrity, confidentiality Slammer Worm in less than seven hours the Internet traffic was overloaded to the point that many private]. Similarly, the ReVirt system [16] can record all actions below the level of the virtual machine, allowing

  8. Robust and Scalable Trust Management for Collaborative Intrusion Detection

    E-Print Network [OSTI]

    Boutaba, Raouf

    peer. We evaluate our system based on a simulated collaborative host-based IDS network) identify intrusions by comparing observable behavior against suspicious patterns. They can be network-based to evaluate the trustworthiness of participating IDSes, especially when they are host-based. In this work, we

  9. Approximate logic circuits for low overhead, non-intrusive concurrent error detection

    E-Print Network [OSTI]

    Mohanram, Kartik

    Approximate logic circuits for low overhead, non-intrusive concurrent error detection Mihir R for the synthesis of approximate logic circuits. A low overhead, non-intrusive solution for concurrent error as proposed in this paper. A low overhead, non-intrusive solution for CED based on ap- proximate

  10. Nuclear-power-plant perimeter-intrusion alarm systems

    SciTech Connect (OSTI)

    Halsey, D.J.

    1982-04-01T23:59:59.000Z

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981.

  11. Smart container UWB sensor system for situational awareness of intrusion alarms

    DOE Patents [OSTI]

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.; Leach, Jr., Richard R.; Vigars, Mark L.

    2013-06-11T23:59:59.000Z

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability may also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system

  12. BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur

    E-Print Network [OSTI]

    Kundur, Deepa

    BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur for implementation across multiple resource constrained SCADA field devices in the smart grid. The predictable and regular nature of the SCADA communication patterns is exploited to detect intrusions in the field devices

  13. A Data Mining Framework for Building Intrusion Detection Models # Salvatore J. Stolfo

    E-Print Network [OSTI]

    Lee, Wenke

    A Data Mining Framework for Building Intrusion Detection Models # Wenke Lee Salvatore J. Stolfo Kui. In this paper, we describe a data mining framework for adaptively building Intrusion Detection (ID) models each network connection or host ses­ sion, and apply data mining programs to learn rules

  14. Real-time processing of a long perimeter fiber optic intrusion system 

    E-Print Network [OSTI]

    Snider, William Timothy

    2009-09-30T23:59:59.000Z

    This thesis reports on recent advances made in real-time intruder detection for an intrusion system developed at Texas A&M University that utilizes a phase-sensitive optical time-domain reflectometer. The system uses light pulses from a highly...

  15. A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J. Han

    E-Print Network [OSTI]

    Chuah, Mooi-Choo "Mooi"

    A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J University Bethlehem, PA 18015 Abstract-- Several intrusion detection approaches have been proposed in sparse ad hoc networks. In this paper, we propose a ferry-based intrusion detection and mitigation (FBIDM

  16. A Data Mining Framework for Building Intrusion Detection Models Salvatore J. Stolfo

    E-Print Network [OSTI]

    Yang, Junfeng

    A Data Mining Framework for Building Intrusion Detection Models Wenke Lee Salvatore J. Stolfo Kui W of expert knowledge, changes to IDSs are expensive and slow. In this paper, we describe a data mining, and apply data mining programs to learn rules that accurately capture the behavior of intrusions and normal

  17. On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks

    E-Print Network [OSTI]

    Chen, Ing-Ray

    to that of the experimental testbed. Simulations of larger (50-node) ad hoc networks indicate that monitoring-based intrusion evaluations of IDTs are based on small testbed configura- tions, or simulations which do not incorporate any on monitoring- based intrusion detection for ad hoc networks. Experimental results show that, even for a simple

  18. Using Model-based Intrusion Detection for SCADA Networks Steven Cheung Bruno Dutertre Martin Fong Ulf Lindqvist Keith Skinner

    E-Print Network [OSTI]

    Cheung, Steven

    Using Model-based Intrusion Detection for SCADA Networks Steven Cheung Bruno Dutertre Martin Fong In a model-based intrusion detection approach for protecting SCADA networks, we construct models and a prototype implementation of them for monitoring Modbus TCP networks. Keywords: SCADA security, intrusion

  19. Evaluation and analysis of non-intrusive techniques for detecting illicit substances

    SciTech Connect (OSTI)

    Micklich, B.J.; Roche, C.T.; Fink, C.L.; Yule, T.J.; Demirgian, J.C. [Argonne National Lab., IL (United States); Kunz, T.D.; Ulvick, S.J.; Cui, J. [Houston Advanced Research Center, The Woodlands, TX (United States)

    1995-12-31T23:59:59.000Z

    Argonne National Laboratory (ANL) and the Houston Advanced Research Center (HARC) have been tasked by the Counterdrug Technology Assessment Center of the Office of National Drug Control Policy to conduct evaluations and analyses of technologies for the non-intrusive inspection of containers for illicit substances. These technologies span the range of nuclear, X-ray, and chemical techniques used in nondestructive sample analysis. ANL has performed assessments of nuclear and X-ray inspection concepts and undertaken site visits with developers to understand the capabilities and the range of applicability of candidate systems. ANL and HARC have provided support to law enforcement agencies (LEAs), including participation in numerous field studies. Both labs have provided staff to assist in the Narcotics Detection Technology Assessment (NDTA) program for evaluating drug detection systems. Also, the two labs are performing studies of drug contamination of currency. HARC has directed technical evaluations of automated ballistics imaging and identification systems under consideration by law enforcement agencies. ANL and HARC have sponsored workshops and a symposium, and are participating in a Non-Intrusive Inspection Study being led by Dynamics Technology, Incorporated.

  20. Fast and Accurate Embedded Systems Energy Characterization Using Non-intrusive

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Fast and Accurate Embedded Systems Energy Characterization Using Non-intrusive Measurements Nicolas system energy model based on non-intrusive measurements. This model aims at being inte- grated in fast

  1. Distributed fiber optic intrusion sensor system for monitoring long perimeters

    E-Print Network [OSTI]

    Juarez, Juan C.

    2009-06-02T23:59:59.000Z

    Perturbation ........................ 17 G. Frequency Drift Measurement................................................................... 19 III ERBIUM DOPED FIBER LASER CHARACTERIZATION........................ 22 A. Er:Fiber Laser... .................................................................................................... 22 12. Experimental setup for fiber laser used in the intrusion sensor system ............. 24 13. Spectral linewidth scan of Erbium doped fiber laser ......................................... 24 14. Delayed self-heterodyne test setup...

  2. agent detection system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agent Systems Summer School (Durham 2007) 2253 Pointers to Other Courses John Zachmann, Gabriel 19 An Architecture for Intrusion Detection using Autonomous Agents CiteSeer...

  3. A Non-Intrusive Monitoring System for Ambient Assisted Living Service Delivery

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Non-Intrusive Monitoring System for Ambient Assisted Living Service Delivery Willy All : Italy (2012)" #12;2 A Non-Intrusive Monitoring System for AAL Service Delivery Previous works from [6 is intrusive, and the massive deployment of sensors in the environment which implies a significant financial

  4. Enforcing Trust-based Intrusion Detection in Cloud Computing Using Algebraic Methods

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Enforcing Trust-based Intrusion Detection in Cloud Computing Using Algebraic Methods Amira Bradai scheme for hybrid cloud computing is proposed. We consider a trust metric based on honesty, cooperation detection, Perron Frobenius, cloud computing, hybrid execution, false alarms, security scores. I

  5. austurhorn intrusive complex: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Institute (EPRI Hubbard, Susan 5 Security Intrusion & Detection Security Intrusion Computer Technologies and Information Sciences Websites Summary: intrusions, log suspicious...

  6. Verifying the secure setup of Unix client/servers and detection of network intrusion

    SciTech Connect (OSTI)

    Feingold, R.; Bruestle, H.R.; Bartoletti, T.; Saroyan, A.; Fisher, J.

    1995-07-01T23:59:59.000Z

    This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today`s global ``Infosphere`` presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to check on their security configuration. SPI`s broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI`s use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on an Ethernet broadcast Local Area Network segment and produce transcripts of suspicious user connections. NID`s retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.

  7. Sensing Danger: Innate Immunology for Intrusion Detection Uwe Aickelin and Julie Greensmith

    E-Print Network [OSTI]

    Aickelin, Uwe

    Sensing Danger: Innate Immunology for Intrusion Detection Uwe Aickelin and Julie Greensmith School years ago through the so called `Danger Project' (EPSRC GR/S47809/01). Our conclusion then was that AIS developed as part of the Danger Project - the Dendritic Cell Algorithm (DCA) and the Toll-like Receptor

  8. Hierarchical Task Analysis of Intrusion Detection Systems

    E-Print Network [OSTI]

    Blustein, J.

    .......................... 4 3. Hierarchical Task Analysis ............................ 6 3.1 Network Security Administrator .................... 7 3.2 Functions of Network Security Administrator ....... 7 4. Diagrams on a single or group of persons called Network Security Administrators. They use a wide variety of tools

  9. A Continuous Time Bayesian Network Approach for Intrusion Detection

    E-Print Network [OSTI]

    Xu, Jing

    2010-01-01T23:59:59.000Z

    also challenges network administrators to deal with identitya fact of life for network administrators. Detecting attackscan help the network administrator tell whether the current

  10. A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures

    E-Print Network [OSTI]

    Sanders, William H.

    , and highlight the interesting cost/benefit trade-offs that emerge. Index Terms--AMI, threat model, intrusion research is a dif- ficult task, partly because cybersecurity risk is challenging to quantify. As stated in the Roadmap to Achieve Energy Deliv- ery Systems Cybersecurity released by the U.S. Department of Energy (Do

  11. Embedded Markov Process based Model for Performance Analysis of Intrusion Detection and

    E-Print Network [OSTI]

    Boutaba, Raouf

    and evaluates its impact on performance. Through extensive simulations, we validate the proposed model-off between security enforcement levels on one side and network Quality of Service (QoS) requirements on the other. Index Terms--Security Performance Evaluation, Intrusion De- tection and Prevention Systems

  12. Continuous Time Bayesian Networks for Host Level Network Intrusion Detection

    E-Print Network [OSTI]

    Shelton, Christian R.

    R. Shelton Department of Computer Science and Engineering University of California, Riverside continuous time Bayesian networks learned from historic non-attack data and flag future event sequences whose. In this paper, we look at the problem of detecting such attacks at the host level. Instead of constructing

  13. Building Intrusion Detection with a Wireless Sensor Network

    E-Print Network [OSTI]

    Braun, Torsten

    supported by the National Competence Center in Research on Mobile Information and Communication Systems. In order to save energy for communication, the system provides all nodes with some adaptive short: Is it possible to develop an energy-efficient reliable building surveillance system? Can the data volume

  14. Diagnostic indicators for shipboard mechanical systems using Non-Intrusive Load Monitoring

    E-Print Network [OSTI]

    McKay, Thomas Duncan

    2006-01-01T23:59:59.000Z

    This thesis examines the use of Non-intrusive Load Monitoring (NILM) in auxiliary shipboard systems, such as a low pressure air system, to determine the state of equipment in larger connected systems, such as the main ...

  15. Bloom Filter Based Intrusion Detection for Smart Grid

    E-Print Network [OSTI]

    Parthasarathy, Saranya

    2012-07-16T23:59:59.000Z

    SCADA server and field devices in power system. The approach is tested for attacks like HMI compromise and Man-in-the-Middle. Bloom Filter is chosen because of its strong space advantage over other data structures like hash tables, linked lists etc...

  16. An analog and digital data acquisition system for Non-Intrusive Load Monitoring

    E-Print Network [OSTI]

    Clifford, Zachary Alan

    2009-01-01T23:59:59.000Z

    Non-Intrusive Load Monitoring (NILM) is a method for characterizing and monitoring discrete loads connected to a power distribution system. This can include a ship, a car, or a utility distribution system. The entire concept ...

  17. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware

    SciTech Connect (OSTI)

    Tierney, Brian L; Vallentin, Matthias; Sommer, Robin; Lee, Jason; Leres, Craig; Paxson, Vern; Tierney, Brian

    2007-09-19T23:59:59.000Z

    In this work we present a NIDS cluster as a scalable solution for realizing high-performance, stateful network intrusion detection on commodity hardware. The design addresses three challenges: (i) distributing traffic evenly across an extensible set of analysis nodes in a fashion that minimizes the communication required for coordination, (ii) adapting the NIDS's operation to support coordinating its low-level analysis rather than just aggregating alerts; and (iii) validating that the cluster produces sound results. Prototypes of our NIDS cluster now operate at the Lawrence Berkeley National Laboratory and the University of California at Berkeley. In both environments the clusters greatly enhance the power of the network security monitoring.

  18. Diagnostic indicators for shipboard systems using non-intrusive load monitoring

    E-Print Network [OSTI]

    DeNucci, Thomas W

    2005-01-01T23:59:59.000Z

    Field studies have demonstrated that the Non-Intrusive Load monitor (NILM) can provide real-time indication of the condition of electro-mechanical systems on board naval vessels. Results from data collected from engineering ...

  19. Design and testing of a non-intrusive torque measurement system

    E-Print Network [OSTI]

    Wilson, Edwin Ernest

    1998-01-01T23:59:59.000Z

    This thesis details the initial development of a non-intrusive torque measurement system to measure torque in a rotating driveshaft like those commonly found on internal combustion engine powered irrigation pumping plants. A typical driveshaft used...

  20. Using the sequential regression (SER) algorithm for long-term signal processing. [Intrusion detection

    SciTech Connect (OSTI)

    Soldan, D. L.; Ahmed, N.; Stearns, S. D.

    1980-01-01T23:59:59.000Z

    The use of the sequential regression (SER) algorithm (Electron. Lett., 14, 118(1978); 13, 446(1977)) for long-term processing applications is limited by two problems that can occur when an SER predictor has more weights than required to predict the input signal. First, computational difficulties related to updating the autocorrelation matrix inverse could arise, since no unique least-squares solution exists. Second, the predictor strives to remove very low-level components in the input, and hence could implement a gain function that is essentially zero over the entire passband. The predictor would then tend to become a no-pass filter which is undesirable in certain applications, e.g., intrusion detection (SAND--78-1032). Modifications to the SER algorithm that overcome the above problems are presented, which enable its use for long-term signal processing applications. 3 figures.

  1. Enforcing positivity in intrusive PC-UQ methods for reactive ODE systems

    SciTech Connect (OSTI)

    Najm, Habib N. [Sandia National Laboratories, Livermore, CA 94551 (United States); Valorani, Mauro [Mechanical and Aerospace Engineering Dept., Sapienza University of Rome, Rome (Italy)

    2014-08-01T23:59:59.000Z

    We explore the relation between the development of a non-negligible probability of negative states and the instability of numerical integration of the intrusive Galerkin ordinary differential equation system describing uncertain chemical ignition. To prevent this instability without resorting to either multi-element local polynomial chaos (PC) methods or increasing the order of the PC representation in time, we propose a procedure aimed at modifying the amplitude of the PC modes to bring the probability of negative state values below a user-defined threshold. This modification can be effectively described as a filtering procedure of the spectral PC coefficients, which is applied on-the-fly during the numerical integration when the current value of the probability of negative states exceeds the prescribed threshold. We demonstrate the filtering procedure using a simple model of an ignition process in a batch reactor. This is carried out by comparing different observables and error measures as obtained by non-intrusive Monte Carlo and Gauss-quadrature integration and the filtered intrusive procedure. The filtering procedure has been shown to effectively stabilize divergent intrusive solutions, and also to improve the accuracy of stable intrusive solutions which are close to the stability limits.

  2. Distributed fiber optic intrusion sensor system for monitoring long perimeters 

    E-Print Network [OSTI]

    Juarez, Juan C.

    2009-06-02T23:59:59.000Z

    A distributed sensor using an optical fiber for detecting and locating intruders over long perimeters (>10 km) is described. Phase changes resulting from either the pressure of the intruder on the ground immediately above the buried fiber or from...

  3. Shipboard fluid system diagnostics using non-intrusive load monitoring

    E-Print Network [OSTI]

    Mitchell, Gregory R. (Gregory Reed)

    2007-01-01T23:59:59.000Z

    Systems on modem naval vessels are becoming exclusively dependent on electrical power. One example of this is the replacement of distilling and evaporator plants with reverse osmosis units. As the system is in continuous ...

  4. System security Dr Len Hamey

    E-Print Network [OSTI]

    Hamey, Len

    , firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

  5. The design of an intrusion security system using digital processing for alarm indication

    E-Print Network [OSTI]

    Holyoak, Joel Nelson

    1973-01-01T23:59:59.000Z

    signal voltage for any moving ob)ect within the protected ares. After appropriate processing, the signal's amplitude is analog-to- digital converted. Amplitude variations are digitally processed by a Hewlett-Packard 2114B minicomputer. Depending... signal for reliable intrusion detection. lg 'k 0 4J 0 Ol 4J IU a 0 rl 'd C CCI 4 I CI '4 O W 0 CI CV 4J 4J Ql W 0 'tj 19 C H A P T E R III THE DESIGN OF THE LINEAR PROCESSOR The processing of the output voltage signal...

  6. Automatic intrusion recovery with system-wide history

    E-Print Network [OSTI]

    Kim, Taesoo, Ph. D. Massachusetts Institute of Technology

    2014-01-01T23:59:59.000Z

    Compromises of our computer systems are inevitable. New software vulnerabilities are discovered and exploited daily, but even if the software is bug-free, administrators may inadvertently make mistakes in configuring ...

  7. Intrusive Galerkin methods with upwinding for uncertain nonlinear hyperbolic systems

    SciTech Connect (OSTI)

    Tryoen, J., E-mail: tryoenj@cermics.enpc.f [Universite Paris Est, CERMICS, Ecole des Ponts, 77455 Marne la Vallee cedex 2 (France); LIMSI-CNRS, 91403 Orsay cedex (France); Le Maitre, O., E-mail: olm@limsi.f [LIMSI-CNRS, 91403 Orsay cedex (France); CEA-Saclay, DEN, DM2S, SFME, F-91191 Gif-sur-Yvette (France); Ndjinga, M., E-mail: michael.ndjinga@cea.f [CEA-Saclay, DEN, DM2S, SFME, F-91191 Gif-sur-Yvette (France); Ern, A., E-mail: ern@cermics.enpc.f [Universite Paris Est, CERMICS, Ecole des Ponts, 77455 Marne la Vallee cedex 2 (France)

    2010-09-01T23:59:59.000Z

    This paper deals with stochastic spectral methods for uncertainty propagation and quantification in nonlinear hyperbolic systems of conservation laws. We consider problems with parametric uncertainty in initial conditions and model coefficients, whose solutions exhibit discontinuities in the spatial as well as in the stochastic variables. The stochastic spectral method relies on multi-resolution schemes where the stochastic domain is discretized using tensor-product stochastic elements supporting local polynomial bases. A Galerkin projection is used to derive a system of deterministic equations for the stochastic modes of the solution. Hyperbolicity of the resulting Galerkin system is analyzed. A finite volume scheme with a Roe-type solver is used for discretization of the spatial and time variables. An original technique is introduced for the fast evaluation of approximate upwind matrices, which is particularly well adapted to local polynomial bases. Efficiency and robustness of the overall method are assessed on the Burgers and Euler equations with shocks.

  8. Computationally Efficient Neural Network Intrusion Security Awareness

    SciTech Connect (OSTI)

    Todd Vollmer; Milos Manic

    2009-08-01T23:59:59.000Z

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  9. An Intelligent Tutor for Intrusion Detection on Computer Systems An Intelligent Tutor for Intrusion Detection on Computer Systems

    E-Print Network [OSTI]

    and not especially common, practice with simulators is valuable. Simulators can efficiently drill students on rare-recognition rules to itself infer the problems, planning methods to figure how best to fix them, plan

  10. Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie A. Dickerson (julied@iastate.edu)

    E-Print Network [OSTI]

    Dickerson, Julie A.

    Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie on a network. It uses simple data mining techniques to process the network input data and help expose metrics administrator. This paper describes the components in the FIRE architecture and explains their roles. Particular

  11. Technical basis document for the steam intrusion from interfacing systems accident

    SciTech Connect (OSTI)

    GOETZ, T.G.

    2003-03-21T23:59:59.000Z

    This technical basis document was developed to support the Documented Safety Analysis (DSA) and describes the risk binning process and the technical basis for assigning risk bins for the steam intrusion from interfacing systems representative accident and associated represented hazardous conditions. The purpose of the risk binning process is to determine the need for safety-significant structures, systems, and components (SSC) and technical safety requirement (TSR)-level controls for a given representative accident or represented hazardous conditions based on an evaluation of the frequency and consequence. Note that the risk binning process is not applied to facility workers, because all facility worker hazardous conditions are considered for safety-significant SSCs and/or TSR-level controls. Determination of the need for safety-class SSCs was performed in accordance with DOE-STD-3009-94, ''Preparation Guide for US Department of Energy Nonreactor Nuclear Facility Documented Safety Analyses'', as described in this report.

  12. Agent-Based Distributed Intrusion Alert System Arjita Ghosh and Sandip Sen

    E-Print Network [OSTI]

    Sen, Sandip

    , we discuss our proactive agent-based early warning system that uses coordinated surveillance threat detection: We want our system to be an early warning system that, in addition to its ability in addition to other functionalities of an IDS: (a) early warning when pre-attack activities are detected, (b

  13. Idaho Explosive Detection System

    ScienceCinema (OSTI)

    Klinger, Jeff

    2013-05-28T23:59:59.000Z

    Learn how INL researchers are making the world safer by developing an explosives detection system that can inspect cargo. For more information about INL security research, visit http://www.facebook.com/idahonationallaboratory

  14. SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA

    E-Print Network [OSTI]

    Gu, Guofei

    , College Station, Texas, USA 2 Department of Information Security, Shanghai University of Electric Power with a real-world power plant simulator. The experiment results show that SRID can detect various false data] worm spread across Iran nuclear infrastructure and occupied the headline of news and media, we

  15. An Adaptive Sampling Algorithm with Applications to Denial-of-Service Attack Detection

    E-Print Network [OSTI]

    -- There is an emerging need for the traffic processing capability of network security mechanisms, such as intrusion-based security systems, like intrusion detection systems (IDS), have not kept pace with the increasing usage that can be attributed to the incapability of current solutions to detect intrusions in high- speed

  16. Evaluation of Non-Intrusive Load Monitoring for shipboard cycling system diagnostics

    E-Print Network [OSTI]

    Mosman, James P. (James Paul)

    2006-01-01T23:59:59.000Z

    The Non-Intrusive Load Monitor (NILM) is a device that utilizes voltage and current measurements to determine the operating schedule of all of the major loads on an electrical service. Additionally, the NILM can use its ...

  17. Buried fiber optic intrusion sensor 

    E-Print Network [OSTI]

    Maier, Eric William

    2004-09-30T23:59:59.000Z

    A distributed fiber optic intrusion sensor capable of detecting intruders from the pressure of their weight on the earth's surface was investigated in the laboratory and in field tests. The presence of an intruder above or in proximity...

  18. Radiation detection system

    DOE Patents [OSTI]

    Franks, Larry A. (Santa Barbara, CA); Lutz, Stephen S. (Santa Barbara, CA); Lyons, Peter B. (Los Alamos, NM)

    1981-01-01T23:59:59.000Z

    A radiation detection system including a radiation-to-light converter and fiber optic wave guides to transmit the light to a remote location for processing. The system utilizes fluors particularly developed for use with optical fibers emitting at wavelengths greater than about 500 nm and having decay times less than about 10 ns.

  19. Solar system fault detection

    DOE Patents [OSTI]

    Farrington, R.B.; Pruett, J.C. Jr.

    1984-05-14T23:59:59.000Z

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  20. A survey of intrusion detection in wireless network applications Robert Mitchell, Ing-Ray Chen

    E-Print Network [OSTI]

    Chen, Ing-Ray

    tool that can defend against the real-world cyber attacks threatening critical systems. These attacks include the Stuxnet attack on Iranian engineering facilities [1,2], proof of concept attacks on insulin pumps [3] and cardiac devices [4], the DoS attack on a German power grid opera- tor [5

  1. automated change detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    operating system. Our PC client software presently has 20 users. The combination of PIR and PC sensors Delbruck, Tobi 67 Using Specification-Based Intrusion Detection for...

  2. automated border detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    operating system. Our PC client software presently has 20 users. The combination of PIR and PC sensors Delbruck, Tobi 63 Using Specification-Based Intrusion Detection for...

  3. automated microarray detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    operating system. Our PC client software presently has 20 users. The combination of PIR and PC sensors Delbruck, Tobi 69 Using Specification-Based Intrusion Detection for...

  4. automated fault detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    operating system. Our PC client software presently has 20 users. The combination of PIR and PC sensors Delbruck, Tobi 242 Using Specification-Based Intrusion Detection for...

  5. automated snp detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    operating system. Our PC client software presently has 20 users. The combination of PIR and PC sensors Delbruck, Tobi 55 Using Specification-Based Intrusion Detection for...

  6. autonomous pathogen detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    autonomous agents CiteSeer Summary: AAFID is a distributed intrusion detection architecture and system, developed in CERIAS at Purdue University. AAFID was the first...

  7. Acoustic emission intrusion detector

    DOE Patents [OSTI]

    Carver, Donald W. (Knoxville, TN); Whittaker, Jerry W. (Knoxville, TN)

    1980-01-01T23:59:59.000Z

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal.

  8. Incipient Transient Detection in Reactor Systems: Experimental and Theoretical Investigation

    SciTech Connect (OSTI)

    Lefteri H. Tsoukalas; S.T. Revankar; X Wang; R. Sattuluri

    2005-09-27T23:59:59.000Z

    The main goal of this research was to develop a method for detecting reactor system transients at the earliest possible time through a comprehensive experimental, testing and benchmarking program. This approach holds strong promise for developing new diagnostic technologies that are non-intrusive, generic and highly portable across different systems. It will help in the design of new generation nuclear power reactors, which utilize passive safety systems with a reliable and non-intrusive multiphase flow diagnostic system to monitor the function of the passive safety systems. The main objective of this research was to develop an improved fuzzy logic based detection method based on a comprehensive experimental testing program to detect reactor transients at the earliest possible time, practically at their birth moment. A fuzzy logic and neural network based transient identification methodology and implemented in a computer code called PROTREN was considered in this research and was compared with SPRT (Sequentially Probability Ratio Testing) decision and Bayesian inference. The project involved experiment, theoretical modeling and a thermal-hydraulic code assessment. It involved graduate and undergraduate students participation providing them with exposure and training in advanced reactor concepts and safety systems. In this final report, main tasks performed during the project period are summarized and the selected results are presented. Detailed descriptions for the tasks and the results are presented in previous yearly reports (Revankar et al 2003 and Revankar et al 2004).

  9. On the Limits of Payload-Oblivious Network Attack Detection

    E-Print Network [OSTI]

    Reiter, Michael

    alarms in order to detect them consistently. Keywords: network intrusion detection, ROC curve, evaluation. 1 Introduction We address the problem of evaluating network intrusion detection systems to the form of log data, encryption or simply a high connection failure rate--methods for detecting

  10. Arc fault detection system

    DOE Patents [OSTI]

    Jha, Kamal N. (Bethel Park, PA)

    1999-01-01T23:59:59.000Z

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard.

  11. Arc fault detection system

    DOE Patents [OSTI]

    Jha, K.N.

    1999-05-18T23:59:59.000Z

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard. 1 fig.

  12. automated flying-insect detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    operating system. Our PC client software presently has 20 users. The combination of PIR and PC sensors Delbruck, Tobi 62 Using Specification-Based Intrusion Detection for...

  13. technology offer Non-Intrusive Remote Oscillator Measurement for

    E-Print Network [OSTI]

    Szmolyan, Peter

    technology offer Non-Intrusive Remote Oscillator Measurement for Distributed Systems based on Flex are quite intrusive: they require physical access to each single node and might interrupt system operation

  14. Incipient fire detection system

    DOE Patents [OSTI]

    Brooks, Jr., William K. (Newport News, VA)

    1999-01-01T23:59:59.000Z

    A method and apparatus for an incipient fire detection system that receives gaseous samples and measures the light absorption spectrum of the mixture of gases evolving from heated combustibles includes a detector for receiving gaseous samples and subjecting the samples to spectroscopy and determining wavelengths of absorption of the gaseous samples. The wavelengths of absorption of the gaseous samples are compared to predetermined absorption wavelengths. A warning signal is generated whenever the wavelengths of absorption of the gaseous samples correspond to the predetermined absorption wavelengths. The method includes receiving gaseous samples, subjecting the samples to light spectroscopy, determining wavelengths of absorption of the gaseous samples, comparing the wavelengths of absorption of the gaseous samples to predetermined absorption wavelengths and generating a warning signal whenever the wavelengths of absorption of the gaseous samples correspond to the predetermined absorption wavelengths. In an alternate embodiment, the apparatus includes a series of channels fluidically connected to a plurality of remote locations. A pump is connected to the channels for drawing gaseous samples into the channels. A detector is connected to the channels for receiving the drawn gaseous samples and subjecting the samples to spectroscopy. The wavelengths of absorption are determined and compared to predetermined absorption wavelengths is provided. A warning signal is generated whenever the wavelengths correspond.

  15. Buried fiber optic intrusion sensor

    E-Print Network [OSTI]

    Maier, Eric William

    2004-09-30T23:59:59.000Z

    to the buried sensor induces a phase shift in light propagating along the fiber which allows for the detection and localization of intrusions. Through the use of an ultra-stable erbium-doped fiber laser and phase sensitive optical time domain reflectometry...

  16. Particle detection systems and methods

    DOE Patents [OSTI]

    Morris, Christopher L.; Makela, Mark F.

    2010-05-11T23:59:59.000Z

    Techniques, apparatus and systems for detecting particles such as muons and neutrons. In one implementation, a particle detection system employs a plurality of drift cells, which can be for example sealed gas-filled drift tubes, arranged on sides of a volume to be scanned to track incoming and outgoing charged particles, such as cosmic ray-produced muons. The drift cells can include a neutron sensitive medium to enable concurrent counting of neutrons. The system can selectively detect devices or materials, such as iron, lead, gold, uranium, plutonium, and/or tungsten, occupying the volume from multiple scattering of the charged particles passing through the volume and can concurrently detect any unshielded neutron sources occupying the volume from neutrons emitted therefrom. If necessary, the drift cells can be used to also detect gamma rays. The system can be employed to inspect occupied vehicles at border crossings for nuclear threat objects.

  17. Scalability of Non-intrusive Load Monitoring for Shipboard Applications

    E-Print Network [OSTI]

    Paris, James

    2009-01-01T23:59:59.000Z

    The non-intrusive load monitor has been demonstrated as an effective tool for evaluating and monitoring shipboard electro-mechanical systems through analysis of electrical power data. A key advantage of the non-intrusive ...

  18. Protein detection system

    DOE Patents [OSTI]

    Fruetel, Julie A. (Livermore, CA); Fiechtner, Gregory J. (Bethesda, MD); Kliner, Dahv A. V. (San Ramon, CA); McIlroy, Andrew (Livermore, CA)

    2009-05-05T23:59:59.000Z

    The present embodiment describes a miniature, microfluidic, absorption-based sensor to detect proteins at sensitivities comparable to LIF but without the need for tagging. This instrument utilizes fiber-based evanescent-field cavity-ringdown spectroscopy, in combination with faceted prism microchannels. The combination of these techniques will increase the effective absorption path length by a factor of 10.sup.3 to 10.sup.4 (to .about.1-m), thereby providing unprecedented sensitivity using direct absorption. The coupling of high-sensitivity absorption with high-performance microfluidic separation will enable real-time sensing of biological agents in aqueous samples (including aerosol collector fluids) and will provide a general method with spectral fingerprint capability for detecting specific bio-agents.

  19. NonIntrusive Conservative

    E-Print Network [OSTI]

    Läufer, Konstantin

    A Look at Non­Intrusive Conservative Garbage Collection Purdue University Page 1 of 16 A Look at Non­Intrusive Conservative Garbage Collection Gustavo Rodriguez­Rivera Vincent Russo Purdue University {grr,russo@cs.purdue.edu} #12; A Look at Non­Intrusive Conservative Garbage Collection Purdue

  20. NetGator: Malware Detection Using Program Interactive Challenges

    E-Print Network [OSTI]

    Stavrou, Angelos

    to an external party over an encrypted or plain text connection before the intrusion is detected. In this paper used for targeted exfiltration of data. Current intrusion detection systems cannot always keep hole that malware will increasingly cap- italize on. The use of encrypted traffic has been growing

  1. NADIR: A prototype system for detecting network and file system abuse

    SciTech Connect (OSTI)

    Hochberg, J.G.; Jackson, K.A.; Stallings, C.A.; McClary, J.F.; DuBois, D.H.; Ford, J.R.

    1992-01-01T23:59:59.000Z

    This paper describes the design of a prototype computer misuse detection system for the Los Alamos Notional Laboratory's Integrated Computing Network (ICN). This automated expert system, the Network Anomaly Detection and Intrusion Reporter (NADIR), streamlines and supplements the manual audit record review traditionally performed by security auditors. NADIR compares network activity, as summarized in weekly profiles of individual users and the ICN as a whole, against expert rules that define security policy, improper or suspicious behavior, and normal user activity. NADIR reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. This paper describes analysis by NADIR of two types of ICN activity: user authentication and access control, and mass file storage. It highlights system design issues of data handling, exploiting existing auditing systems, and performing audit analysis at the network level.

  2. NADIR: A prototype system for detecting network and file system abuse

    SciTech Connect (OSTI)

    Hochberg, J.G.; Jackson, K.A.; Stallings, C.A.; McClary, J.F.; DuBois, D.H.; Ford, J.R.

    1992-10-01T23:59:59.000Z

    This paper describes the design of a prototype computer misuse detection system for the Los Alamos Notional Laboratory`s Integrated Computing Network (ICN). This automated expert system, the Network Anomaly Detection and Intrusion Reporter (NADIR), streamlines and supplements the manual audit record review traditionally performed by security auditors. NADIR compares network activity, as summarized in weekly profiles of individual users and the ICN as a whole, against expert rules that define security policy, improper or suspicious behavior, and normal user activity. NADIR reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. This paper describes analysis by NADIR of two types of ICN activity: user authentication and access control, and mass file storage. It highlights system design issues of data handling, exploiting existing auditing systems, and performing audit analysis at the network level.

  3. Thermal neutron detection system

    DOE Patents [OSTI]

    Peurrung, Anthony J. (Richland, WA); Stromswold, David C. (West Richland, WA)

    2000-01-01T23:59:59.000Z

    According to the present invention, a system for measuring a thermal neutron emission from a neutron source, has a reflector/moderator proximate the neutron source that reflects and moderates neutrons from the neutron source. The reflector/moderator further directs thermal neutrons toward an unmoderated thermal neutron detector.

  4. in High Performance Computing Computer System, Cluster, and Networking...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    iSSH v. Auditd: Intrusion Detection in High Performance Computing Computer System, Cluster, and Networking Summer Institute David Karns, New Mexico State University Katy Protin,...

  5. Non-intrusive Lightweight Agents for Information Management

    E-Print Network [OSTI]

    Graham, Nick

    Non-intrusive Lightweight Agents for Information Management S. Varma D.B. Skillicorn November 1997 a non-intrusive approach to building information management systems, based on software agents. Software is a non-intrusive, lightweight software agent that manages bookmarks web browser pointers to favourite

  6. Developing Performance Models from Non-intrusive Monitoring Traces

    E-Print Network [OSTI]

    Murphy, John

    Developing Performance Models from Non- intrusive Monitoring Traces Daniela Mania, John Murphy transactions within the system at run-time using non-intrusive monitoring. Our belief is this methodology obtained by non-intrusive monitoring of an EJB-based e-commerce application. Moreover, the methodology

  7. Centrifugal unbalance detection system

    DOE Patents [OSTI]

    Cordaro, Joseph V. (Martinez, GA); Reeves, George (Graniteville, SC); Mets, Michael (Aiken, SC)

    2002-01-01T23:59:59.000Z

    A system consisting of an accelerometer sensor attached to a centrifuge enclosure for sensing vibrations and outputting a signal in the form of a sine wave with an amplitude and frequency that is passed through a pre-amp to convert it to a voltage signal, a low pass filter for removing extraneous noise, an A/D converter and a processor and algorithm for operating on the signal, whereby the algorithm interprets the amplitude and frequency associated with the signal and once an amplitude threshold has been exceeded the algorithm begins to count cycles during a predetermined time period and if a given number of complete cycles exceeds the frequency threshold during the predetermined time period, the system shuts down the centrifuge.

  8. Power line detection system

    DOE Patents [OSTI]

    Latorre, V.R.; Watwood, D.B.

    1994-09-27T23:59:59.000Z

    A short-range, radio frequency (RF) transmitting-receiving system that provides both visual and audio warnings to the pilot of a helicopter or light aircraft of an up-coming power transmission line complex. Small, milliwatt-level narrowband transmitters, powered by the transmission line itself, are installed on top of selected transmission line support towers or within existing warning balls, and provide a continuous RF signal to approaching aircraft. The on-board receiver can be either a separate unit or a portion of the existing avionics, and can also share an existing antenna with another airborne system. Upon receipt of a warning signal, the receiver will trigger a visual and an audio alarm to alert the pilot to the potential power line hazard. 4 figs.

  9. Power line detection system

    DOE Patents [OSTI]

    Latorre, Victor R. (Tracy, CA); Watwood, Donald B. (Tracy, CA)

    1994-01-01T23:59:59.000Z

    A short-range, radio frequency (RF) transmitting-receiving system that provides both visual and audio warnings to the pilot of a helicopter or light aircraft of an up-coming power transmission line complex. Small, milliwatt-level narrowband transmitters, powered by the transmission line itself, are installed on top of selected transmission line support towers or within existing warning balls, and provide a continuous RF signal to approaching aircraft. The on-board receiver can be either a separate unit or a portion of the existing avionics, and can also share an existing antenna with another airborne system. Upon receipt of a warning signal, the receiver will trigger a visual and an audio alarm to alert the pilot to the potential power line hazard.

  10. Semi autonomous mine detection system

    SciTech Connect (OSTI)

    Douglas Few; Roelof Versteeg; Herman Herman

    2010-04-01T23:59:59.000Z

    CMMAD is a risk reduction effort for the AMDS program. As part of CMMAD, multiple instances of semi autonomous robotic mine detection systems were created. Each instance consists of a robotic vehicle equipped with sensors required for navigation and marking, a countermine sensors and a number of integrated software packages which provide for real time processing of the countermine sensor data as well as integrated control of the robotic vehicle, the sensor actuator and the sensor. These systems were used to investigate critical interest functions (CIF) related to countermine robotic systems. To address the autonomy CIF, the INL developed RIK was extended to allow for interaction with a mine sensor processing code (MSPC). In limited field testing this system performed well in detecting, marking and avoiding both AT and AP mines. Based on the results of the CMMAD investigation we conclude that autonomous robotic mine detection is feasible. In addition, CMMAD contributed critical technical advances with regard to sensing, data processing and sensor manipulation, which will advance the performance of future fieldable systems. As a result, no substantial technical barriers exist which preclude – from an autonomous robotic perspective – the rapid development and deployment of fieldable systems.

  11. Electric load information system based on non-intrusive power monitoring

    E-Print Network [OSTI]

    Lee, Kwangduk Douglas, 1970-

    2003-01-01T23:59:59.000Z

    Obtaining high quality information economically and reliably is always a difficult objective to achieve. The electric power industry and consumers recently face many challenges, such as deregulation, autonomous power systems ...

  12. CYBER THREAT ANALYSIS A KEY ENABLING TECHNOLOGY FOR THE OBJECTIVE FORCE (A CASE STUDY IN NETWORK INTRUSION DETECTION)

    E-Print Network [OSTI]

    Kumar, Vipin

    60000 90 91 92 93 94 95 96 97 98 99 00 01 Today computers control power, oil and gas deliveryCYBER THREAT ANALYSIS ­ A KEY ENABLING TECHNOLOGY FOR THE OBJECTIVE FORCE (A CASE STUDY IN NETWORK-of-systems technologies will enable decisive maneuver, both horizon- tal and vertical, during day and night, and in all

  13. c 2004 by Fabrice Stevens. All rights reserved. VALIDATION OF AN INTRUSION-TOLERANT INFORMATION SYSTEM USING

    E-Print Network [OSTI]

    Illinois at Urbana-Champaign, University of

    c 2004 by Fabrice Stevens. All rights reserved. #12;VALIDATION OF AN INTRUSION-TOLERANT INFORMATION of Illinois at Urbana-Champaign, 2004 Urbana, Illinois #12;To my parents iii #12;ACKNOWLEDGMENTS I would like to thank my advisor, Professor William H. Sanders, for giving me the op- portunity to work for him. His

  14. The Autonomous Pathogen Detection System

    SciTech Connect (OSTI)

    Dzenitis, J M; Makarewicz, A J

    2009-01-13T23:59:59.000Z

    We developed, tested, and now operate a civilian biological defense capability that continuously monitors the air for biological threat agents. The Autonomous Pathogen Detection System (APDS) collects, prepares, reads, analyzes, and reports results of multiplexed immunoassays and multiplexed PCR assays using Luminex{copyright} xMAP technology and flow cytometer. The mission we conduct is particularly demanding: continuous monitoring, multiple threat agents, high sensitivity, challenging environments, and ultimately extremely low false positive rates. Here, we introduce the mission requirements and metrics, show the system engineering and analysis framework, and describe the progress to date including early development and current status.

  15. Compensated intruder-detection systems

    DOE Patents [OSTI]

    McNeilly, David R. (Maryville, TN); Miller, William R. (Andersonville, TN)

    1984-01-01T23:59:59.000Z

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  16. A research team is developing tools based on the theory of complex systems to analyze the structure and behavior of firms in a non-intrusive, objective, and

    E-Print Network [OSTI]

    Ottino, Julio M.

    and behavior of firms in a non-intrusive, objective, and quantitative way. NORTHWESTERN CHEMICAL AND BIOLOGICAL reveal how people interact and allow mapping of the informal network in a non-intrusive, objective

  17. Pulsed helium ionization detection system

    DOE Patents [OSTI]

    Ramsey, R.S.; Todd, R.A.

    1985-04-09T23:59:59.000Z

    A helium ionization detection system is provided which produces stable operation of a conventional helium ionization detector while providing improved sensitivity and linearity. Stability is improved by applying pulsed dc supply voltage across the ionization detector, thereby modifying the sampling of the detectors output current. A unique pulse generator is used to supply pulsed dc to the detector which has variable width and interval adjust features that allows up to 500 V to be applied in pulse widths ranging from about 150 nsec to about dc conditions.

  18. Pulsed helium ionization detection system

    DOE Patents [OSTI]

    Ramsey, Roswitha S. (Knoxville, TN); Todd, Richard A. (Knoxville, TN)

    1987-01-01T23:59:59.000Z

    A helium ionization detection system is provided which produces stable operation of a conventional helium ionization detector while providing improved sensitivity and linearity. Stability is improved by applying pulsed dc supply voltage across the ionization detector, thereby modifying the sampling of the detectors output current. A unique pulse generator is used to supply pulsed dc to the detector which has variable width and interval adjust features that allows up to 500 V to be applied in pulse widths ranging from about 150 nsec to about dc conditions.

  19. Explosives detection system and method

    DOE Patents [OSTI]

    Reber, Edward L. (Idaho Falls, ID); Jewell, James K. (Idaho Falls, ID); Rohde, Kenneth W. (Idaho Falls, ID); Seabury, Edward H. (Idaho Falls, ID); Blackwood, Larry G. (Idaho Falls, ID); Edwards, Andrew J. (Idaho Falls, ID); Derr, Kurt W. (Idaho Falls, ID)

    2007-12-11T23:59:59.000Z

    A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

  20. Embedded Software Energy Characterization: using non-intrusive measures for application

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Embedded Software Energy Characterization: using non-intrusive measures for application source code propose a complete system energy model based on non-intrusive measurements. This model aims at being

  1. Radiation Detection Materials and Systems | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Radiation Detection Materials and Systems SHARE Radiation Detection Materials and Systems ORNL's Nuclear Material Detection and Characterization programs are at the forefront of...

  2. Discriminating ultrasonic proximity detection system

    DOE Patents [OSTI]

    Annala, Wayne C. (Durango, CO)

    1989-01-01T23:59:59.000Z

    This invention uses an ultrasonic transmitter and receiver and a microprocessor to detect the presence of an object. In the reset mode the invention uses a plurality of echoes from each ultrasonic burst to create a reference table of the echo-burst-signature of the empty monitored environment. The invention then processes the reference table so that it only uses the most reliable data. In the detection mode the invention compares the echo-burst-signature of the present environment with the reference table, detecting an object if there is a consistent difference between the echo-burst-signature of the empty monitored environment recorded in the reference table and the echo-burst-signature of the present environment.

  3. Non-intrusive appliance monitor apparatus

    DOE Patents [OSTI]

    Hart, George W. (Natick, MA); Kern, Jr., Edward C. (Lincoln, MA); Schweppe, Fred C. (Carlisle, MA)

    1989-08-15T23:59:59.000Z

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

  4. Non-intrusive appliance monitor apparatus

    DOE Patents [OSTI]

    Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

    1989-08-15T23:59:59.000Z

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

  5. Distributed Termination Detection for Dynamic Systems

    E-Print Network [OSTI]

    Dhamdhere, Dhananjay Madhav

    Distributed Termination Detection for Dynamic Systems D. M. Dhamdhere \\Lambda Sridhar R. Iyer E for detecting the termination of a dis­ tributed computation is presented. The algorithm does not require global are provided. Keywords Distributed algorithms, Distributed computation, Distributed termination, Dynamic

  6. Design and Optimization of Monitoring and Feedback Systems in Wireless Health

    E-Print Network [OSTI]

    Rofouei, Mahsan

    2012-01-01T23:59:59.000Z

    wearable contexts as a non- intrusive monitoring system instructure which allows non-intrusive measurement. Walkingin wearable contexts as a non-intrusive monitoring system in

  7. Detection of arcs in automotive electrical systems

    E-Print Network [OSTI]

    Mishrikey, Matthew David

    2005-01-01T23:59:59.000Z

    At the present time, there is no established method for the detection of DC electric arcing. This is a concern for forthcoming advanced automotive electrical systems which consist of higher DC electric power bus voltages, ...

  8. Sensor Fault Detection and Isolation System

    E-Print Network [OSTI]

    Yang, Cheng-Ken

    2014-08-01T23:59:59.000Z

    The purpose of this research is to develop a Fault Detection and Isolation (FDI) system which is capable to diagnosis multiple sensor faults in nonlinear cases. In order to lead this study closer to real world applications in oil industries...

  9. EUROPEAN CONFERENCE FOR AEROSPACE SCIENCES Semi-intrusive and non-intrusive stochastic methods for

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    4TH EUROPEAN CONFERENCE FOR AEROSPACE SCIENCES Semi-intrusive and non-intrusive stochastic methods, 33400 Talence, France Abstract In this work we present semi-intrusive and non-intrusive techniques and non-intrusive. The intrusive technique consist to write an ad-hoc code by modifying an existing

  10. Shipboard applications of non-intrusive load monitoring

    E-Print Network [OSTI]

    Ramsey, Jack S

    2004-01-01T23:59:59.000Z

    The Non-Intrusive Load Monitor (NILM) provides a method of measuring component performance and source power quality through a single point of entry in the power distribution system. A study was performed utilizing the NILM ...

  11. A framework for non-intrusive load monitoring and diagnostics

    E-Print Network [OSTI]

    Paris, James, Ph. D. Massachusetts Institute of Technology

    2006-01-01T23:59:59.000Z

    The widespread use of electrical and electromechanical systems places increasing demands on monitoring and diagnostic techniques. The non-intrusive load monitor (NILM) provides a low-cost, low-maintenance way to perform ...

  12. Improving shipboard applications of non-intrusive load monitoring

    E-Print Network [OSTI]

    Jones, Richard A. (Richard Alan), Nav. E. Massachusetts Institute of Technology

    2008-01-01T23:59:59.000Z

    The Non-Intrusive Load Monitor (NILM) measures equipment performance by measuring and analyzing the source power to the equipment at a single point in the electrical system. Previous studies have proven the usefulness of ...

  13. Harmonic approaches to non-intrusive load diagnostics

    E-Print Network [OSTI]

    Fuller, Ashley E. (Ashley Eliot)

    2008-01-01T23:59:59.000Z

    The Non-Intrusive Load Monitor (NILM) is a system that monitors, records and processes voltage and current measurements to establish the operating characteristics of individual loads on a load center from a single aggregate ...

  14. Network-Level Polymorphic Shellcode Detection Using Emulation

    E-Print Network [OSTI]

    Markatos, Evangelos P.

    to the attack vector. We present a heuristic detection method that scans network traffic streams that makes it self-decrypting. Since the decryptor itself cannot be encrypted, some detection approaches rely such as self-modifying code. 2 Related Work Network intrusion detection systems (NIDS) like Snort [12] have

  15. Non-intrusive and structure preserving multiscale integration of stiff ODEs, SDEs and Hamiltonian systems with hidden slow dynamics via flow averaging

    E-Print Network [OSTI]

    Tao, Molei; Marsden, Jerrold E

    2009-01-01T23:59:59.000Z

    We introduce a new class of integrators for stiff ODEs as well as SDEs. These integrators are (i) {\\it Multiscale}: they are based on flow averaging and so do not resolve the fast variables but rather employ step-sizes determined by slow variables (ii) {\\it Basis}: the method is based on averaging the flow of the given dynamical system (which may have hidden slow and fast processes) instead of averaging the instantaneous drift of assumed separated slow and fast processes. This bypasses the need for identifying explicitly (or numerically) the slow or fast variables. (iii) {\\it Non intrusive}: A pre-existing numerical scheme resolving the microscopic time scale can be used as a black box and turned into one of the integrators in this paper by simply turning the large coefficients on over a microscopic timescale and off during a mesoscopic timescale. (iv) {\\it Convergent over two scales}: strongly over slow processes and in the sense of measures over fast ones. (v) {\\it Structure preserving}: For stiff Hamiltoni...

  16. Non-intrusive refrigerant charge indicator

    DOE Patents [OSTI]

    Mei, Viung C.; Chen, Fang C.; Kweller, Esher

    2005-03-22T23:59:59.000Z

    A non-intrusive refrigerant charge level indicator includes a structure for measuring at least one temperature at an outside surface of a two-phase refrigerant line section. The measured temperature can be used to determine the refrigerant charge status of an HVAC system, and can be converted to a pressure of the refrigerant in the line section and compared to a recommended pressure range to determine whether the system is under-charged, properly charged or over-charged. A non-intrusive method for assessing the refrigerant charge level in a system containing a refrigerant fluid includes the step of measuring a temperature at least one outside surface of a two-phase region of a refrigerant containing refrigerant line, wherein the temperature measured can be converted to a refrigerant pressure within the line section.

  17. System for particle concentration and detection

    DOE Patents [OSTI]

    Morales, Alfredo M.; Whaley, Josh A.; Zimmerman, Mark D.; Renzi, Ronald F.; Tran, Huu M.; Maurer, Scott M.; Munslow, William D.

    2013-03-19T23:59:59.000Z

    A new microfluidic system comprising an automated prototype insulator-based dielectrophoresis (iDEP) triggering microfluidic device for pathogen monitoring that can eventually be run outside the laboratory in a real world environment has been used to demonstrate the feasibility of automated trapping and detection of particles. The system broadly comprised an aerosol collector for collecting air-borne particles, an iDEP chip within which to temporarily trap the collected particles and a laser and fluorescence detector with which to induce a fluorescence signal and detect a change in that signal as particles are trapped within the iDEP chip.

  18. System For Detection Of Hazardous Events

    DOE Patents [OSTI]

    Kulesz, James J [Oak Ridge, TN; Worley, Brian A [Knoxville, TN

    2005-08-16T23:59:59.000Z

    A system for detecting the occurrence of anomalies, includes a plurality of spaced apart nodes, with each node having adjacent nodes, each of the nodes having one or more sensors associated with the node and capable of detecting anomalies, and each of the nodes having a controller connected to the sensors associated with the node. The system also includes communication links between adjacent nodes, whereby the nodes form a network. Each controller is programmed to query its adjacent nodes to assess the status of the adjacent nodes and the communication links.

  19. System for detection of hazardous events

    DOE Patents [OSTI]

    Kulesz, James J.; Worley, Brian A.

    2006-05-23T23:59:59.000Z

    A system for detecting the occurrence of anomalies, includes a plurality of spaced apart nodes, with each node having adjacent nodes, each of the nodes having one or more sensors associated with the node and capable of detecting anomalies, and each of the nodes having a controller connected to the sensors associated with the node. The system also includes communication links between adjacent nodes, whereby the nodes form a network. Each controller is programmed to query its adjacent nodes to assess the status of the adjacent nodes and the communication links.

  20. Damage detection in initially nonlinear systems

    SciTech Connect (OSTI)

    Bornn, Luke [Los Alamos National Laboratory; Farrar, Charles [Los Alamos National Laboratory; Park, Gyuhae [Los Alamos National Laboratory

    2009-01-01T23:59:59.000Z

    The primary goal of Structural Health Monitoring (SHM) is to detect structural anomalies before they reach a critical level. Because of the potential life-safety and economic benefits, SHM has been widely studied over the past decade. In recent years there has been an effort to provide solid mathematical and physical underpinnings for these methods; however, most focus on systems that behave linearly in their undamaged state - a condition that often does not hold in complex 'real world' systems and systems for which monitoring begins mid-lifecycle. In this work, we highlight the inadequacy of linear-based methodology in handling initially nonlinear systems. We then show how the recently developed autoregressive support vector machine (AR-SVM) approach to time series modeling can be used for detecting damage in a system that exhibits initially nonlinear response. This process is applied to data acquired from a structure with induced nonlinearity tested in a laboratory environment.

  1. Network intrusion detector: NID user`s guide V 1.0

    SciTech Connect (OSTI)

    Palasek, R. [ed.

    1994-04-01T23:59:59.000Z

    The NID suite of software tools was developed to help detect and analyze intrusive behavior over networks. NID combines and uses three techniques of intrusion detection: attack signature recognition, anomaly detection, and a vulnerability risk model. The authors have found from experience that the signature recognition component has been the most effective in detecting network based attacks. The underlying assumption of NID is that there is a security domain that you are interested in protecting. NID monitors traffic that crosses the boundary of that domain, looking for signs of intrusion and abnormal activity.

  2. Field Demonstration of a Real-time Non-intrusive Monitoring System for Condition-based Maintenance

    E-Print Network [OSTI]

    Proper, Ethan

    2009-01-01T23:59:59.000Z

    The performance of important electrical loads on mission critical systems like warships or off-shore platforms is often tracked by dedicated monitoring equipment. Individual monitoring of each load is expensive and risky. ...

  3. DETECTION OF HISTORICAL PIPELINE LEAK PLUMES USING NON-INTRUSIVE SURFACE-BASED GEOPHYSICAL TECHNIQUES AT THE HANFORD NUCLEAR SITE WASHINGTON USA

    SciTech Connect (OSTI)

    SKORSKA MB; FINK JB; RUCKER DF; LEVITT MT

    2010-12-02T23:59:59.000Z

    Historical records from the Department of Energy Hanford Nuclear Reservation (in eastern WA) indicate that ruptures in buried waste transfer pipelines were common between the 1940s and 1980s, which resulted in unplanned releases (UPRs) of tank: waste at numerous locations. A number of methods are commercially available for the detection of active or recent leaks, however, there are no methods available for the detection of leaks that occurred many years ago. Over the decades, leaks from the Hanford pipelines were detected by visual observation of fluid on the surface, mass balance calculations (where flow volumes were monitored), and incidental encounters with waste during excavation or drilling. Since these detection methods for historic leaks are so limited in resolution and effectiveness, it is likely that a significant number of pipeline leaks have not been detected. Therefore, a technology was needed to detect the specific location of unknown pipeline leaks so that characterization technologies can be used to identify any risks to groundwater caused by waste released into the vadose zone. A proof-of-concept electromagnetic geophysical survey was conducted at an UPR in order to image a historical leak from a waste transfer pipeline. The survey was designed to test an innovative electromagnetic geophysical technique that could be used to rapidly map the extent of historical leaks from pipelines within the Hanford Site complex. This proof-of-concept test included comprehensive testing and analysis of the transient electromagnetic method (TEM) and made use of supporting and confirmatory geophysical methods including ground penetrating radar, magnetics, and electrical resistivity characterization (ERC). The results for this initial proof-of-concept test were successful and greatly exceeded the expectations of the project team by providing excellent discrimination of soils contaminated with leaked waste despite the interference from an electrically conductive pipe.

  4. Methods and systems for detection of radionuclides

    DOE Patents [OSTI]

    Coates, Jr., John T.; DeVol, Timothy A.

    2010-05-25T23:59:59.000Z

    Disclosed are materials and systems useful in determining the existence of radionuclides in an aqueous sample. The materials provide the dual function of both extraction and scintillation to the systems. The systems can be both portable and simple to use, and as such can beneficially be utilized to determine presence and optionally concentration of radionuclide contamination in an aqueous sample at any desired location and according to a relatively simple process without the necessity of complicated sample handling techniques. The disclosed systems include a one-step process, providing simultaneous extraction and detection capability, and a two-step process, providing a first extraction step that can be carried out in a remote field location, followed by a second detection step that can be carried out in a different location.

  5. Digital radiographic systems detect boiler tube cracks

    SciTech Connect (OSTI)

    Walker, S. [EPRI, Charlotte, NC (United States)

    2008-06-15T23:59:59.000Z

    Boiler water wall leaks have been a major cause of steam plant forced outages. But conventional nondestructive evaluation techniques have a poor track record of detecting corrosion fatigue cracking on the inside surface of the cold side of waterwall tubing. EPRI is performing field trials of a prototype direct-digital radiographic system that promises to be a game changer. 8 figs.

  6. Portable chemical detection system with intergrated preconcentrator

    DOE Patents [OSTI]

    Baumann, Mark J.; Brusseau, Charles A.; Hannum, David W.; Linker, Kevin L.

    2005-12-27T23:59:59.000Z

    A portable system for the detection of chemical particles such as explosive residue utilizes a metal fiber substrate that may either be swiped over a subject or placed in a holder in a collection module which can shoot a jet of gas at the subject to dislodge residue, and then draw the air containing the residue into the substrate. The holder is then placed in a detection module, which resistively heats the substrate to evolve the particles, and provides a gas flow to move the particles to a miniature detector in the module.

  7. Method and system for detecting an explosive

    DOE Patents [OSTI]

    Reber, Edward L. (Idaho Falls, ID); Rohde, Kenneth W. (Idaho Falls, ID); Blackwood, Larry G. (Bozeman, MT)

    2010-12-07T23:59:59.000Z

    A method and system for detecting at least one explosive in a vehicle using a neutron generator and a plurality of NaI detectors. Spectra read from the detectors is calibrated by performing Gaussian peak fitting to define peak regions, locating a Na peak and an annihilation peak doublet, assigning a predetermined energy level to one peak in the doublet, and predicting a hydrogen peak location based on a location of at least one peak of the doublet. The spectra are gain shifted to a common calibration, summed for respective groups of NaI detectors, and nitrogen detection analysis performed on the summed spectra for each group.

  8. Detecting New Planets in Transiting Systems

    E-Print Network [OSTI]

    Jason H. Steffen

    2006-09-18T23:59:59.000Z

    I present an initial investigation into a new planet detection technique that uses the transit timing of a known, transiting planet. The transits of a solitary planet orbiting a star occur at equally spaced intervals in time. If a second planet is present, dynamical interactions within the system will cause the time interval between transits to vary. These transit time variations can be used to infer the orbital elements of the unseen, perturbing planet. I show analytic expressions for the amplitude of the transit time variations in several limiting cases. Under certain conditions the transit time variations can be comparable to the period of the transiting planet. I also present the application of this planet detection technique to existing transit observations of the TrES-1 and HD209458 systems. While no convincing evidence for a second planet in either system was found from those data, I constrain the mass that a perturbing planet could have as a function of the semi-major axis ratio of the two planets and the eccentricity of the perturbing planet. Near low-order, mean-motion resonances (within about 1% fractional deviation), I find that a secondary planet must generally have a mass comparable to or less than the mass of the Earth--showing that these data are the first to have sensitivity to sub Earth-mass planets orbiting main sequence stars. These results show that TTV will be an important tool in the detection and characterization of extrasolar planetary systems.

  9. Gas intrusion into SPR caverns

    SciTech Connect (OSTI)

    Hinkebein, T.E.; Bauer, S.J.; Ehgartner, B.L.; Linn, J.K.; Neal, J.T.; Todd, J.L.; Kuhlman, P.S.; Gniady, C.T. [Sandia National Labs., Albuquerque, NM (United States). Underground Storage Technology Dept.; Giles, H.N. [Dept. of Energy, Washington, DC (United States). Strategic Petroleum Reserve

    1995-12-01T23:59:59.000Z

    The conditions and occurrence of gas in crude oil stored in Strategic Petroleum Reserve, SPR, caverns is characterized in this report. Many caverns in the SPR show that gas has intruded into the oil from the surrounding salt dome. Historical evidence and the analyses presented here suggest that gas will continue to intrude into many SPR caverns in the future. In considering why only some caverns contain gas, it is concluded that the naturally occurring spatial variability in salt permeability can explain the range of gas content measured in SPR caverns. Further, it is not possible to make a one-to-one correlation between specific geologic phenomena and the occurrence of gas in salt caverns. However, gas is concluded to be petrogenic in origin. Consequently, attempts have been made to associate the occurrence of gas with salt inhomogeneities including anomalies and other structural features. Two scenarios for actual gas intrusion into caverns were investigated for consistency with existing information. These scenarios are gas release during leaching and gas permeation through salt. Of these mechanisms, the greater consistency comes from the belief that gas permeates to caverns through the salt. A review of historical operating data for five Bryan Mound caverns loosely supports the hypothesis that higher operating pressures reduce gas intrusion into caverns. This conclusion supports a permeability intrusion mechanism. Further, it provides justification for operating the caverns near maximum operating pressure to minimize gas intrusion. Historical gas intrusion rates and estimates of future gas intrusion are given for all caverns.

  10. animal detection system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Channel Fault Detection and Diagnosis System for a Small Animal APD-Based Digital PET Scanner CERN Preprints Summary: Fault detection and diagnosis is critical to many...

  11. Mining in a Dataflow Environment: Experience in Network Intrusion Wenke Lee Salvatore J. Stolfo Kui W. Mok

    E-Print Network [OSTI]

    Lee, Wenke

    Mining in a Data­flow Environment: Experience in Network Intrusion Detection Wenke Lee Salvatore J network intrusion detection models. We report our experiments using the network data provided as part not limited to) data cleaning and preprocessing, feature extraction and data mining, and consolidating

  12. Mining in a Data-flow Environment: Experience in Network Intrusion Wenke Lee Salvatore J. Stolfo Kui W. Mok

    E-Print Network [OSTI]

    Yang, Junfeng

    Mining in a Data-flow Environment: Experience in Network Intrusion Detection Wenke Lee Salvatore J network intrusion detection models. We report our experiments using the network data provided as part not limited to) data cleaning and preprocessing, feature extraction and data mining, and consolidating

  13. System and method for detecting gas

    DOE Patents [OSTI]

    Chow, Oscar Ken (Simsbury, CT); Moulthrop, Lawrence Clinton (Windsor, CT); Dreier, Ken Wayne (Madison, CT); Miller, Jacob Andrew (Dexter, MI)

    2010-03-16T23:59:59.000Z

    A system to detect a presence of a specific gas in a mixture of gaseous byproducts comprising moisture vapor is disclosed. The system includes an electrochemical cell, a transport to deliver the mixture of gaseous byproducts from the electrochemical cell, a gas sensor in fluid communication with the transport, the sensor responsive to a presence of the specific gas to generate a signal corresponding to a concentration of the specific gas, and a membrane to prevent transmission of liquid moisture, the membrane disposed between the transport and the gas sensor.

  14. REAL-TIME ACTIVE PIPELINE INTEGRITY DETECTION (RAPID) SYSTEM FOR CORROSION DETECTION AND QUANTIFICATION

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    alone there are over 2 million miles of natural gas transmission and distribution pipeline providing 24REAL-TIME ACTIVE PIPELINE INTEGRITY DETECTION (RAPID) SYSTEM FOR CORROSION DETECTION detection Acellent has developed a Real-time Active Pipeline Integrity Detection (RAPID) system. The RAPID

  15. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines

    E-Print Network [OSTI]

    Shilton, Alistair

    concerning energy . In this article, we propose a centralized intrusion detection scheme based on SupportDetecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines Vector Machines (SVMs) and sliding windows. We find that our system can detect black hole attacks

  16. Number of Waste Package Hit by Igneous Intrusion

    SciTech Connect (OSTI)

    M. Wallace

    2004-10-13T23:59:59.000Z

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios.

  17. Systems and methods for detecting and processing

    DOE Patents [OSTI]

    Johnson, Michael M. (Livermore, CA); Yoshimura, Ann S. (Tracy, CA)

    2006-03-28T23:59:59.000Z

    Embodiments of the present invention provides systems and method for detecting. Sensing modules are provided in communication with one or more detectors. In some embodiments, detectors are provided that are sensitive to chemical, biological, or radiological agents. Embodiments of sensing modules include processing capabilities to analyze, perform computations on, and/or run models to predict or interpret data received from one or more detectors. Embodiments of sensing modules form various network configurations with one another and/or with one or more data aggregation devices. Some embodiments of sensing modules include power management functionalities.

  18. Evaluation of intrusion sensors and video assessment in areas of restricted passage

    SciTech Connect (OSTI)

    Hoover, C.E.; Ringler, C.E.

    1996-04-01T23:59:59.000Z

    This report discusses an evaluation of intrusion sensors and video assessment in areas of restricted passage. The discussion focuses on applications of sensors and video assessment in suspended ceilings and air ducts. It also includes current and proposed requirements for intrusion detection and assessment. Detection and nuisance alarm characteristics of selected sensors as well as assessment capabilities of low-cost board cameras were included in the evaluation.

  19. VISDTA: A video imaging system for detection, tracking, and assessment: Prototype development and concept demonstration

    SciTech Connect (OSTI)

    Pritchard, D.A.

    1987-05-01T23:59:59.000Z

    It has been demonstrated that thermal imagers are an effective surveillance and assessment tool for security applications because: (1) they work day or night due to their sensitivity to thermal signatures; (2) penetrability through fog, rain, dust, etc., is better than human eyes; (3) short or long range operation is possible with various optics; and (4) they are strictly passive devices providing visible imagery which is readily interpreted by the operator with little training. Unfortunately, most thermal imagers also require the setup of a tripod, connection of batteries, cables, display, etc. When this is accomplished, the operator must manually move the camera back and forth searching for signs of aggressor activity. VISDTA is designed to provide automatic panning, and in a sense, ''watch'' the imagery in place of the operator. The idea behind the development of VISDTA is to provide a small, portable, rugged system to automatically scan areas and detect targets by computer processing of images. It would use a thermal imager and possibly an intensified day/night TV camera, a pan/ tilt mount, and a computer for system control. If mounted on a dedicated vehicle or on a tower, VISDTA will perform video motion detection functions on incoming video imagery, and automatically scan predefined patterns in search of abnormal conditions which may indicate attempted intrusions into the field-of-regard. In that respect, VISDTA is capable of improving the ability of security forces to maintain security of a given area of interest by augmenting present techniques and reducing operator fatigue.

  20. Method and system for detecting explosives

    DOE Patents [OSTI]

    Reber, Edward L. (Idaho Falls, ID); Jewell, James K. (Idaho Falls, ID); Rohde, Kenneth W. (Idaho Falls, ID); Seabury, Edward H. (Idaho Falls, ID); Blackwood, Larry G. (Idaho Falls, ID); Edwards, Andrew J. (Idaho Falls, ID); Derr, Kurt W. (Idaho Falls, ID)

    2009-03-10T23:59:59.000Z

    A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

  1. Intrusive gravity currents in two-layer

    E-Print Network [OSTI]

    Flynn, Morris R.

    Intrusive gravity currents in two-layer stratified media Morris R. Flynn & Paul F. Linden Dept.avalanche.org/pictures #12;· `Microbursts' pose a non-trivial threat to airplane safety Introduction Impacts on human health;· Whereas gravity currents travel along a solid boundary, intrusive gravity currents or intrusions propagate

  2. POWER SYSTEM LINE OUTAGE DETECTION AND IDENTIFICATION --A QUICKEST CHANGE DETECTION APPROACH

    E-Print Network [OSTI]

    Liberzon, Daniel

    POWER SYSTEM LINE OUTAGE DETECTION AND IDENTIFICATION -- A QUICKEST CHANGE DETECTION APPROACH Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign ABSTRACT A method to detect and isolate power system transmission line outages in near real-time is proposed

  3. Intrusion detection and monitoring for wireless networks.

    SciTech Connect (OSTI)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

    2005-11-01T23:59:59.000Z

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more complete network coverage for use by emergency responders and other municipal agencies. In short, these Wi-Fi networks are being deployed everywhere. Much thought has been and is being put into evaluating cost-benefit analyses of wired vs. wireless networks and issues such as how to effectively cover an office building or municipality, how to efficiently manage a large network of wireless access points (APs), and how to save money by replacing an Internet service provider (ISP) with 802.11 technology. In comparison, very little thought and money are being focused on wireless security and monitoring for security purposes.

  4. Detection of contamination of municipal water distribution systems

    DOE Patents [OSTI]

    Cooper, John F. (Oakland, CA)

    2012-01-17T23:59:59.000Z

    A system for the detection of contaminates of a fluid in a conduit. The conduit is part of a fluid distribution system. A chemical or biological sensor array is connected to the conduit. The sensor array produces an acoustic signal burst in the fluid upon detection of contaminates in the fluid. A supervisory control system connected to the fluid and operatively connected to the fluid distribution system signals the fluid distribution system upon detection of contaminates in the fluid.

  5. Method and system for turbomachinery surge detection

    SciTech Connect (OSTI)

    Faymon, David K.; Mays, Darrell C.; Xiong, Yufei

    2004-11-23T23:59:59.000Z

    A method and system for surge detection within a gas turbine engine, comprises: measuring the compressor discharge pressure (CDP) of the gas turbine over a period of time; determining a time derivative (CDP.sub.D ) of the measured (CDP) correcting the CDP.sub.D for altitude, (CDP.sub.DCOR); estimating a short-term average of CDP.sub.DCOR.sup.2 ; estimating a short-term average of CDP.sub.DCOR ; and determining a short-term variance of corrected CDP rate of change (CDP.sub.roc) based upon the short-term average of CDP.sub.DCOR and the short-term average of CDP.sub.DCOR.sup.2. The method and system then compares the short-term variance of corrected CDP rate of change with a pre-determined threshold (CDP.sub.proc) and signals an output when CDP.sub.roc >CDP.sub.proc. The method and system provides a signal of a surge within the gas turbine engine when CDP.sub.roc remains>CDP.sub.proc for pre-determined period of time.

  6. Systems and methods for detecting neutrons

    DOE Patents [OSTI]

    Bross, Alan D.; Mellott, Kerry L.; Pla-Dalmau, Anna

    2005-08-09T23:59:59.000Z

    Systems and methods for detecting neutrons. One or more neutron-sensitive scintillators can be configured from a plurality of nano-sized particles, dopants and an extruded plastic material, such as polystyrene. The nano-sized particles can be compounded into the extruded plastic material with at least one dopant that permits the plastic material to scintillate. One or more plastic light collectors can be associated with a neutron-sensitive scintillator, such that the plastic light collector includes a central hole thereof. A wavelength-shifting fiber can then be located within the hole. The wavelength shifting (WLS) fiber absorbs scintillation light having a wavelength thereof and re-emits the light at a longer wavelength.

  7. NON-INTRUSIVE MEASUREMENT OF WORKLOAD IN REAL-TIME Markus Guhe*, Wenhui Liao**, Zhiwei Zhu**, Qiang Ji**, Wayne D. Gray* & Michael J. Schoelles*

    E-Print Network [OSTI]

    Gray, Wayne

    NON-INTRUSIVE MEASUREMENT OF WORKLOAD IN REAL-TIME Markus Guhe*, Wenhui Liao**, Zhiwei Zhu**, Qiang method to measure workload that offers several advantages. First, it uses non-intrusive means: cameras to be performed to process these problems. We develop a real-time, non-intrusive system that meas- ures

  8. System and method for detecting cells or components thereof

    DOE Patents [OSTI]

    Porter, Marc D. (Ames, IA); Lipert, Robert J. (Ames, IA); Doyle, Robert T. (Ames, IA); Grubisha, Desiree S. (Corona, CA); Rahman, Salma (Ames, IA)

    2009-01-06T23:59:59.000Z

    A system and method for detecting a detectably labeled cell or component thereof in a sample comprising one or more cells or components thereof, at least one cell or component thereof of which is detectably labeled with at least two detectable labels. In one embodiment, the method comprises: (i) introducing the sample into one or more flow cells of a flow cytometer, (ii) irradiating the sample with one or more light sources that are absorbed by the at least two detectable labels, the absorption of which is to be detected, and (iii) detecting simultaneously the absorption of light by the at least two detectable labels on the detectably labeled cell or component thereof with an array of photomultiplier tubes, which are operably linked to two or more filters that selectively transmit detectable emissions from the at least two detectable labels.

  9. Electric Power System Anomaly Detection Using Neural Networks

    E-Print Network [OSTI]

    Tronci, Enrico

    Electric Power System Anomaly Detection Using Neural Networks Marco Martinelli1 , Enrico Tronci1. The aim of this work is to propose an approach to monitor and protect Electric Power System by learning of an Electric Power System. In this paper, a neural network based approach for novelty detection is presented

  10. Fault Detection and Diagnosis in Building HVAC Systems

    E-Print Network [OSTI]

    Najafi, Massieh

    2010-01-01T23:59:59.000Z

    Wright, “Condition monitoring in HVAC subsystems using firstmonitoring packaged HVAC equipment. ASHRAE Transactions”,Detection and Diagnosis of HVAC Systems Using Support Vector

  11. INTELLIGENT ILLICIT OBJECT DETECTION SYSTEM FOR ENHANCED AVIATION SECURITY

    E-Print Network [OSTI]

    Blumenstein, Michael

    INTELLIGENT ILLICIT OBJECT DETECTION SYSTEM FOR ENHANCED AVIATION SECURITY Vallipuram for detecting illicit objects in hand luggage. 1. INTRODUCTION Increased security in the aftermath of the 9 sophisticated such that it is extremely difficult to detect possible threats of terrorism without severely

  12. Effect on Speed Distribution due to Intrusive and Non-Intrusive Portable Speed Measurement Devices

    E-Print Network [OSTI]

    Jasrotia, Romika

    2011-06-02T23:59:59.000Z

    , placing traffic signs, and determining the effectiveness of the countermeasures. To evaluate the effectiveness on speed distribution due to the presence of various intrusive and non-intrusive portable speed measurement devices, automated traffic counters...

  13. Upconverting nanoparticles for optimizing scintillator based detection systems

    DOE Patents [OSTI]

    Kross, Brian; McKisson, John E; McKisson, John; Weisenberger, Andrew; Xi, Wenze; Zom, Carl

    2013-09-17T23:59:59.000Z

    An upconverting device for a scintillation detection system is provided. The detection system comprises a scintillator material, a sensor, a light transmission path between the scintillator material and the sensor, and a plurality of upconverting nanoparticles particles positioned in the light transmission path.

  14. An Adaptive Front-end Readout System for Radiation Detection

    E-Print Network [OSTI]

    Stanacevic, Milutin

    An Adaptive Front-end Readout System for Radiation Detection Xiao Yun and Milutin Stana to compensate for the variations of the detector and readout circuitry. II. READOUT SYSTEM FOR RADIATION DETECTION Readout circuitry is directly interfaced to the photodiode and produces a voltage signal

  15. Non-intrusive Occupancy Inferencing using Opportunistically Available Sensor Sources

    E-Print Network [OSTI]

    Ting, Kevin H

    2014-01-01T23:59:59.000Z

    10. Chen, Dong, et al. "Non-Intrusive Occupancy MonitoringACM, 15. Zoha, Ahmed, et al. "Non-intrusive load monitoringCalifornia Los Angeles Non-intrusive Occupancy Inferencing

  16. All row, planar fault detection system

    DOE Patents [OSTI]

    Archer, Charles Jens; Pinnow, Kurt Walter; Ratterman, Joseph D; Smith, Brian Edward

    2013-07-23T23:59:59.000Z

    An apparatus, program product and method for detecting nodal faults may simultaneously cause designated nodes of a cell to communicate with all nodes adjacent to each of the designated nodes. Furthermore, all nodes along the axes of the designated nodes are made to communicate with their adjacent nodes, and the communications are analyzed to determine if a node or connection is faulty.

  17. Systems for detecting charged particles in object inspection

    DOE Patents [OSTI]

    Morris, Christopher L.; Makela, Mark F.

    2013-08-20T23:59:59.000Z

    Techniques, apparatus and systems for detecting particles such as muons. In one implementation, a monitoring system has a cosmic ray-produced charged particle tracker with a plurality of drift cells. The drift cells, which can be for example aluminum drift tubes, can be arranged at least above and below a volume to be scanned to thereby track incoming and outgoing charged particles, such as cosmic ray-produced muons, while also detecting gamma rays. The system can selectively detect devices or materials, such as iron, lead, gold and/or tungsten, occupying the volume from multiple scattering of the charged particles passing through the volume and can also detect any radioactive sources occupying the volume from gamma rays emitted therefrom. If necessary, the drift tubes can be sealed to eliminate the need for a gas handling system. The system can be employed to inspect occupied vehicles at border crossings for nuclear threat objects.

  18. Explosive simulants for testing explosive detection systems

    DOE Patents [OSTI]

    Kury, John W. (Danville, CA); Anderson, Brian L. (Lodi, CA)

    1999-09-28T23:59:59.000Z

    Explosives simulants that include non-explosive components are disclosed that facilitate testing of equipment designed to remotely detect explosives. The simulants are non-explosive, non-hazardous materials that can be safely handled without any significant precautions. The simulants imitate real explosives in terms of mass density, effective atomic number, x-ray transmission properties, and physical form, including moldable plastics and emulsions/gels.

  19. Online Fault Detection and Tolerance for Photovoltaic Energy Harvesting Systems

    E-Print Network [OSTI]

    Pedram, Massoud

    and weather conditions (e.g., clouds), and the output power of PV systems is directly dependent on solar and mitigate the output power shortage under low levels of solar irradiance. Moreover, PV panels exhibit highly fault detection and tolerance. Our fault detection and tolerance technique reduces output power

  20. Detector or System? Extending the Concept of Detective

    E-Print Network [OSTI]

    the Performance of Digital Radiographic Imaging Systems1 EhsanSamei,PhD NicoleT.Ranger,MSc Alistair for measuring the effective detective quantum efficiency (eDQE) of digital radiographic imaging systems the image quality of radiographic and mammographic systems while reducing patient dose. RSNA, 2008 1 From

  1. Bachelor Thesis Detection of Zeno Sets in Hybrid Systems

    E-Print Network [OSTI]

    Bachelor Thesis Detection of Zeno Sets in Hybrid Systems to Validate Modelica Simulations Marcel . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3 Example: Water Tank . . . . . . . . . . . . . . . . . . . . . . . . . . 6 3 Modelica 9 3.1 OpenModelica . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.1.1 Hybrid Automata

  2. Availability Analysis of Repairable Computer Systems and Stationarity Detection

    E-Print Network [OSTI]

    Sericola, Bruno

    Availability Analysis of Repairable Computer Systems and Stationarity Detection Bruno Sericola AbstractĐPoint availability and expected interval availability are dependability measures respectively in this paper a new algorithm to compute these two availability measures. This algorithm is based

  3. Computational vision systems for the detection of malignant melanoma

    E-Print Network [OSTI]

    Kosmopoulos, Dimitrios I.

    Computational vision systems for the detection of malignant melanoma Ilias Maglogiannisa compare these techniques in discriminating malignant melanoma tumors versus dysplastic naevi lesions. KEYWORDS: Skin Lesion, Pattern Analysis, Melanoma, Dermoscopy, Discriminant Analysis, Neural Networks

  4. Strategies To Detect Hidden Geothermal Systems Based On Monitoring...

    Open Energy Info (EERE)

    Detect Hidden Geothermal Systems Based On Monitoring and Analysis Of CO2 In The Near-Surface Environment Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal...

  5. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    SciTech Connect (OSTI)

    James L. Jones

    2003-06-01T23:59:59.000Z

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  6. Simulated performance of an airborne lidar wind shear detection system

    E-Print Network [OSTI]

    Griffith, Kenneth Scott

    1987-01-01T23:59:59.000Z

    SIMULATED PERFORMANCE OF AN AIRBORNE LIDAR WIND SHEAR DETECTION SYSTEM A Thesis by KENNETH SCOTT GRIFFITH Submitted to the Graduate College of Texas ASM University in partial fulfillment of the requirement for the degree of MASTER OF SCIENCE... December 1987 Major Subject: Physics SIMULATED PERFORMANCE OF AN AIRBORNE LIDAR WIND SHEAR DETECTION SYSTEM A Thesis by KENNETH SCOTT GRIFFITH Approved as to style and content by: e . atta ar (Chair an of Committee) T omas . air, III (Member) ic...

  7. An active oil spill detection digital processing system 

    E-Print Network [OSTI]

    Dennard, Robert Marion

    1976-01-01T23:59:59.000Z

    AN ACTIVE OIL SPILL DETECTION DIGITAL PROCESSING SYSTEM A Thesis by Robert Marion Dennard Submitted to the Graduate College of Texas A/M University in partial fulfillment of the requirement for the degree of MASTER OF SCIENCE December 1976... Major Subject: Electrical Engineering AN ACTIVE OIL SPILL DETECTION DIGITAL PROCESSING SYSTEM A Thesis by Robert Marion Dennard Approved as to style and content by: Chairman o Committee Hea o epart ent M er em er December 1976 ABSTRACT...

  8. Methods and systems for remote detection of gases

    DOE Patents [OSTI]

    Johnson, Timothy J

    2012-09-18T23:59:59.000Z

    Novel systems and methods for remotely detecting at least one constituent of a gas via infrared detection are provided. A system includes at least one extended source of broadband infrared radiation and a spectrally sensitive receiver positioned remotely from the source. The source and the receiver are oriented such that a surface of the source is in the field of view of the receiver. The source includes a heating component thermally coupled to the surface, and the heating component is configured to heat the surface to a temperature above ambient temperature. The receiver is operable to collect spectral infrared absorption data representative of a gas present between the source and the receiver. The invention advantageously overcomes significant difficulties associated with active infrared detection techniques known in the art, and provides an infrared detection technique with a much greater sensitivity than passive infrared detection techniques known in the art.

  9. Methods and systems for remote detection of gases

    DOE Patents [OSTI]

    Johnson, Timothy J. (Pasco, WA)

    2007-11-27T23:59:59.000Z

    Novel systems and methods for remotely detecting at least one constituent of a gas via infrared detection are provided. A system includes at least one extended source of broadband infrared radiation and a spectrally sensitive receiver positioned remotely from the source. The source and the receiver are oriented such that a surface of the source is in the field of view of the receiver. The source includes a heating component thermally coupled to the surface, and the heating component is configured to heat the surface to a temperature above ambient temperature. The receiver is operable to collect spectral infrared absorption data representative of a gas present between the source and the receiver. The invention advantageously overcomes significant difficulties associated with active infrared detection techniques known in the art, and provides an infrared detection technique with a much greater sensitivity than passive infrared detection techniques known in the art.

  10. Systems and methods for detection of blowout precursors in combustors

    DOE Patents [OSTI]

    Lieuwen, Tim C.; Nair, Suraj

    2006-08-15T23:59:59.000Z

    The present invention comprises systems and methods for detecting flame blowout precursors in combustors. The blowout precursor detection system comprises a combustor, a pressure measuring device, and blowout precursor detection unit. A combustion controller may also be used to control combustor parameters. The methods of the present invention comprise receiving pressure data measured by an acoustic pressure measuring device, performing one or a combination of spectral analysis, statistical analysis, and wavelet analysis on received pressure data, and determining the existence of a blowout precursor based on such analyses. The spectral analysis, statistical analysis, and wavelet analysis further comprise their respective sub-methods to determine the existence of blowout precursors.

  11. Animal intrusion status report for fiscal year 1989

    SciTech Connect (OSTI)

    Landeen, D.S.

    1990-08-01T23:59:59.000Z

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion tasks that were conducted by Westinghouse Hanford Company in fiscal years 1988 and 1989 with respect to small mammals and water infiltration. 2 refs., 8 figs., 6 tabs.

  12. GIDL: GENERALIZED INTERFERENCE DETECTION AND LOCALIZATION SYSTEM

    E-Print Network [OSTI]

    Stanford University

    Augmentation Sys- tem (WAAS) are being developed by the U.S. Federal Aviation Administration (FAA) to provide of the Federal Aviation Administration. I am very grateful for this support. Without it this project proba- bly locate interference sources. The GIDL System has been successfully demonstrated to the Federal Aviation

  13. Occupancy change detection system and method

    DOE Patents [OSTI]

    Bruemmer, David J. (Idaho Falls, ID) [Idaho Falls, ID; Few, Douglas A. (Idaho Falls, ID) [Idaho Falls, ID

    2009-09-01T23:59:59.000Z

    A robot platform includes perceptors, locomotors, and a system controller. The system controller executes instructions for producing an occupancy grid map of an environment around the robot, scanning the environment to generate a current obstacle map relative to a current robot position, and converting the current obstacle map to a current occupancy grid map. The instructions also include processing each grid cell in the occupancy grid map. Within the processing of each grid cell, the instructions include comparing each grid cell in the occupancy grid map to a corresponding grid cell in the current occupancy grid map. For grid cells with a difference, the instructions include defining a change vector for each changed grid cell, wherein the change vector includes a direction from the robot to the changed grid cell and a range from the robot to the changed grid cell.

  14. Meta-compilation non intrusive du filtrage par contraintes Non intrusive meta-compilation of matching by constraints

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    M´eta-compilation non intrusive du filtrage par contraintes Non intrusive meta´eta-compilation non intrusive du filtrage par contraintes Historique 31 ao^ut 2004 V 0.8 cr´eation du document 15 inria-00280939,version1-20May2008 #12;MANIFICO ­ M´eta-compilation non intrusive du filtrage par

  15. Fissile and Non-Fissile Material Detection Using Nuclear Acoustic Resonance Signatures

    SciTech Connect (OSTI)

    Bernhard R. Tittmann; P.M. Lenahan; David Spears; Rhys Williams

    2008-11-25T23:59:59.000Z

    The objective of this project is to develop anovel technique for remote, non-destructive, non-radiation-based detection of materials of interest to Nonproliferation Programs. We propse the development of a detection system based on magnetic resonance principles (NAR), which would work where radiation detection is not possible. The approach would be non-intrusive, penetrating, applicable to many materials of interest for Nonproliferation, and be able to identify the nuclear samples under investigation.

  16. Analytical foundations of physical security system assessment

    E-Print Network [OSTI]

    Graves, Gregory Howard

    2006-10-30T23:59:59.000Z

    - tion scenarios or systems. Peck [23] [24] and Peck and Lacombe [25] have explored unattended ground sensors with regard to their employment as part of an intrusion detection system in a force protection role for base camps. They examine environ- mental...

  17. Attack Detection and Identification in Cyber-Physical Systems

    E-Print Network [OSTI]

    Bullo, Francesco

    Attack Detection and Identification in Cyber-Physical Systems Fabio Pasqualetti, Florian D of unforeseen failures and external malicious attacks. In this paper (i) we propose a mathematical framework for cyber- physical systems, attacks, and monitors; (ii) we characterize fundamental monitoring limitations

  18. Reducing booster-pump-induced contaminant intrusion in Indian water systems with a self-actuated, back-pressure regulating valve

    E-Print Network [OSTI]

    Taylor, David Donald James

    2014-01-01T23:59:59.000Z

    Intermittently-operated water systems struggle to equitably and effectively distribute clean water to customers. One common customer response to intermittency is to supplement the water system's pressure by using a household, ...

  19. Potential detection systems for monitoring UF{sub 6} releases

    SciTech Connect (OSTI)

    Beck, D.E.; Bostick, W.D.; Armstrong, D.P.; McNeely, J.R.; Stockdale, J.A.D.

    1994-09-01T23:59:59.000Z

    In the near future, the Nuclear Regulatory Commission (NRC) will begin to regulate the gaseous diffusion plants. Them is a concern that the smoke detectors currently used for uranium hexafluoride (UF{sub 6}) release detection will not meet NRC safety system requirements such as high reliability and rapid response. The NRC`s position is that licensees should utilize state-of-the-art equipment such as hydrogen fluoride (HF) detectors that would provide more dependable detection of a UF{sub 6} release. A survey of the literature and current vendor information was undertaken to define the state-of-the-art and commercial availability of HF (or other appropriate) detection systems. For the purpose of this report, classification of the available HF detection systems is made on the basis of detection principle (e.g., calorimetric, electrochemical, separational, or optical). Emphasis is also placed on whether the device is primarily sensitive to response from a point source (e.g., outleakage in the immediate vicinity of a specific set of components), or whether the device is potentially applicable to remote sensing over a larger area. Traditional HF point source monitoring typically uses gas sampling tubes or coated paper tapes with color developing indicator, portable and small area HF monitors are often based upon electrochemical or extractive/separational systems; and remote sensing by optical systems holds promise for indoor and outdoor large area monitoring (including plant boundary/ambient air monitoring).

  20. Fault Tolerant Quantum Filtering and Fault Detection for Quantum Systems

    E-Print Network [OSTI]

    Qing Gao; Daoyi Dong; Ian R. Petersen

    2015-04-26T23:59:59.000Z

    This paper aims to determine the fault tolerant quantum filter and fault detection equation for a class of open quantum systems coupled to laser fields and subject to stochastic faults. In order to analyze open quantum systems where the system dynamics involve both classical and quantum random variables, a quantum-classical probability space model is developed. Using a reference probability approach, a fault tolerant quantum filter and a fault detection equation are simultaneously derived for this class of open quantum systems. An example of two-level open quantum systems subject to Poisson-type faults is presented to illustrate the proposed method. These results have the potential to lead to a new fault tolerant control theory for quantum systems.

  1. Microlensing Detections of Planets in Binary Stellar Systems

    E-Print Network [OSTI]

    Dong-Wook Lee; Chung-Uk Lee; Byeong-Gon Park; Sun-Ju Chung; Young-Soo Kim; Ho-Il Kim; Cheongho Han

    2007-09-13T23:59:59.000Z

    We demonstrate that microlensing can be used for detecting planets in binary stellar systems. This is possible because in the geometry of planetary binary systems where the planet orbits one of the binary component and the other binary star is located at a large distance, both planet and secondary companion produce perturbations at a common region around the planet-hosting binary star and thus the signatures of both planet and binary companion can be detected in the light curves of high-magnification lensing events. We find that identifying planets in binary systems is optimized when the secondary is located in a certain range which depends on the type of the planet. The proposed method can detect planets with masses down to one tenth of the Jupiter mass in binaries with separations planet mass and binary separation are not covered by other methods and thus microlensing would be able to make the planetary binary sample richer.

  2. A Learning System for Discriminating Variants of Malicious Network Traffic

    SciTech Connect (OSTI)

    Beaver, Justin M [ORNL; Symons, Christopher T [ORNL; Gillen, Rob [ORNL

    2013-01-01T23:59:59.000Z

    Modern computer network defense systems rely primarily on signature-based intrusion detection tools, which generate alerts when patterns that are pre-determined to be malicious are encountered in network data streams. Signatures are created reactively, and only after in-depth manual analysis of a network intrusion. There is little ability for signature-based detectors to identify intrusions that are new or even variants of an existing attack, and little ability to adapt the detectors to the patterns unique to a network environment. Due to these limitations, the need exists for network intrusion detection techniques that can more comprehensively address both known unknown networkbased attacks and can be optimized for the target environment. This work describes a system that leverages machine learning to provide a network intrusion detection capability that analyzes behaviors in channels of communication between individual computers. Using examples of malicious and non-malicious traffic in the target environment, the system can be trained to discriminate between traffic types. The machine learning provides insight that would be difficult for a human to explicitly code as a signature because it evaluates many interdependent metrics simultaneously. With this approach, zero day detection is possible by focusing on similarity to known traffic types rather than mining for specific bit patterns or conditions. This also reduces the burden on organizations to account for all possible attack variant combinations through signatures. The approach is presented along with results from a third-party evaluation of its performance.

  3. ANOLE Portable Radiation Detection System Field Test and Evaluation Campaign

    SciTech Connect (OSTI)

    Chris A. Hodge

    2007-07-12T23:59:59.000Z

    Handheld, backpack, and mobile sensors are elements of the Global Nuclear Detection System for the interdiction and control of illicit radiological and nuclear materials. They are used by the U.S. Department of Homeland Security (DHS) and other government agencies and organizations in various roles for border protection, law enforcement, and nonproliferation monitoring. In order to systematically document the operational performance of the common commercial off-the-shelf portable radiation detection systems, the DHS Domestic Nuclear Detection Office conducted a test and evaluation campaign conducted at the Nevada Test Site from January 18 to February 27, 2006. Named “Anole,” it was the first test of its kind in terms of technical design and test complexities. The Anole test results offer users information for selecting appropriate mission-specific portable radiation detection systems. The campaign also offered manufacturers the opportunity to submit their equipment for independent operationally relevant testing to subsequently improve their detector performance. This paper will present the design, execution, and methodologies of the DHS Anole portable radiation detection system test campaign.

  4. A bubble detection system for propellant filling pipeline

    SciTech Connect (OSTI)

    Wen, Wen; Zong, Guanghua; Bi, Shusheng [Robotics Institute, Beihang University, 100191 Beijing (China)

    2014-06-15T23:59:59.000Z

    This paper proposes a bubble detection system based on the ultrasound transmission method, mainly for probing high-speed bubbles in the satellite propellant filling pipeline. First, three common ultrasonic detection methods are compared and the ultrasound transmission method is used in this paper. Then, the ultrasound beam in a vertical pipe is investigated, suggesting that the width of the beam used for detection is usually smaller than the internal diameter of the pipe, which means that when bubbles move close to the pipe wall, they may escape from being detected. A special device is designed to solve this problem. It can generate the spiral flow to force all the bubbles to ascend along the central line of the pipe. In the end, experiments are implemented to evaluate the performance of this system. Bubbles of five different sizes are generated and detected. Experiment results show that the sizes and quantity of bubbles can be estimated by this system. Also, the bubbles of different radii can be distinguished from each other. The numerical relationship between the ultrasound attenuation and the bubble radius is acquired and it can be utilized for estimating the unknown bubble size and measuring the total bubble volume.

  5. Real-world Polymorphic Attack Detection Michalis Polychronakis,1

    E-Print Network [OSTI]

    Markatos, Evangelos P.

    proposed network-level emulation, a heuristic detection method that scans network traffic to detect, sophisticated obfuscation schemes. Keywords Polymorphism, intrusion detection, code emulation 1. Introduction them under control for as long as possible. As detection mechanisms improve, attackers employ

  6. Review of Current Neutron Detection Systems for Emergency Response

    SciTech Connect (OSTI)

    Mukhopadhyay, S. [NSTec; Maurer, R. [NSTec; Guss, P. [NSTec; Kruschwitz, C. [NSTec

    2014-09-01T23:59:59.000Z

    Neutron detectors are used in a myriad of applications—from safeguarding special nuclear materials (SNM) to determining lattice spacing in soft materials. The transformational changes taking place in neutron detection and imaging techniques in the last few years are largely being driven by the global shortage of helium-3 (3He). This article reviews the status of neutron sensors used specifically for SNM detection in radiological emergency response. These neutron detectors must be highly efficient, be rugged, have fast electronics to measure neutron multiplicity, and be capable of measuring direction of the neutron sources and possibly image them with high spatial resolution. Neutron detection is an indirect physical process: neutrons react with nuclei in materials to initiate the release of one or more charged particles that produce electric signals that can be processed by the detection system. Therefore, neutron detection requires conversion materials as active elements of the detection system; these materials may include boron-10 (10B), lithium-6 (6Li), and gadollinium-157 (157Gd), to name a few, but the number of materials available for neutron detection is limited. However, in recent years, pulse-shape-discriminating plastic scintillators, scintillators made of helium-4 (4He) under high pressure, pillar and trench semiconductor diodes, and exotic semiconductor neutron detectors made from uranium oxide and other materials have widely expanded the parameter space in neutron detection methodology. In this article we will pay special attention to semiconductor-based neutron sensors. Modern micro-fabricated nanotubes covered inside with neutron converter materials and with very high aspect ratios for better charge transport will be discussed.

  7. Integrating event detection system operation characteristics into sensor placement optimization.

    SciTech Connect (OSTI)

    Hart, William Eugene; McKenna, Sean Andrew; Phillips, Cynthia Ann; Murray, Regan Elizabeth (US Environmental Protection Agency, Cincinnati, OH); Hart, David Blaine

    2010-05-01T23:59:59.000Z

    We consider the problem of placing sensors in a municipal water network when we can choose both the location of sensors and the sensitivity and specificity of the contamination warning system. Sensor stations in a municipal water distribution network continuously send sensor output information to a centralized computing facility, and event detection systems at the control center determine when to signal an anomaly worthy of response. Although most sensor placement research has assumed perfect anomaly detection, signal analysis software has parameters that control the tradeoff between false alarms and false negatives. We describe a nonlinear sensor placement formulation, which we heuristically optimize with a linear approximation that can be solved as a mixed-integer linear program. We report the results of initial experiments on a real network and discuss tradeoffs between early detection of contamination incidents, and control of false alarms.

  8. Human detection with a multi-sensors stereovision system

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Human detection with a multi-sensors stereovision system Y. Benezeth1 , P.M. Jodoin2 , B. Emile3 Far-Infrared (FIR) and daylight cameras mounted on a stereovision setup. Although daylight or FIR together. In order to gauge performances, a quantitative evaluation based on an annotated dataset

  9. All-to-all sequenced fault detection system

    DOE Patents [OSTI]

    Archer, Charles Jens (Rochester, MN); Pinnow, Kurt Walter (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian Edward (Rochester, MN)

    2010-11-02T23:59:59.000Z

    An apparatus, program product and method enable nodal fault detection by sequencing communications between all system nodes. A master node may coordinate communications between two slave nodes before sequencing to and initiating communications between a new pair of slave nodes. The communications may be analyzed to determine the nodal fault.

  10. A Multiple-Channel Sub-Band Transient Detection System

    SciTech Connect (OSTI)

    David A. Smith

    1998-11-01T23:59:59.000Z

    We have developed a unique multiple-channel sub-band transient detection system to record transient electromagnetic signals in carrier-dominated radio environments; the system has been used to make unique observations of weak, transient HF signals. The detection system has made these observations possible through improved sensitivity compared to conventional broadband transient detection systems; the sensitivity improvement is estimated to be at least 20 dB. The increase in sensitivity has been achieved through subdivision of the band of interest (an 18 MHz tunable bandwidth) into eight sub-band independent detection channels, each with a 400 kHz bandwidth and its own criteria. The system generates a system trigger signal when a predetermined number of channels (typically five) trigger within a predetermined window of time (typically 100 ~s). Events are recorded with a broadband data acquisition system sampling at 50 or 100 Msample/s, so despite the fact that the detection system operates on portions of the signal confined to narrow bands, data acquisition is broadband. Between May and September of 1994, the system was used to detect and record over six thousand transient events in the frequency band from 3 to 30 MHz. Approximately 500 of the events have been characterized as paired bursts of radio noise with individual durations of 2 to 10 ps and separations between the bursts of 5 to 160 ps. The paired transients are typically 5 to 40 dB brighter than the background electromagnetic spectrum between carrier signals. We have termed these events SubIonospheric Pulse Pairs (SIPPS) and presently have no explanation as to their source. Our observations of SIPPS resemble observations of TransIonospheric Pulse Pairs (TIPPs) recorded by the Blackboard instrument on the ALEXIS satellite; the source of TIPP events is also unknown. Most of the recorded SIPP events do not exhibit frequency dispersion, implying propagation along a line-of-sight (groundwave) path; but seven of the pairs exhibit dispersion characteristic of skywave propagation via refraction from the ionosphere. The maximum line-of-sight observation range for radio propagation extends as far as 300 km for a source at an altitude of 5 km, and 520 km for a source at 15 km. Refraction from the ionosphere, however, may allow HF radiation to propagate around the globe. Information about the times and locations of sources, in conjunction with regional, weather maps and computer models of ionospheric propagation, suggest that some SIPP events originate in the vicinity of large-scale thunderstorm complexes.

  11. Vapor intrusion modeling : limitations, improvements, and value of information analyses

    E-Print Network [OSTI]

    Friscia, Jessica M. (Jessica Marie)

    2014-01-01T23:59:59.000Z

    Vapor intrusion is the migration of volatile organic compounds (VOCs) from a subsurface source into the indoor air of an overlying building. Vapor intrusion models, including the Johnson and Ettinger (J&E) model, can be ...

  12. Lateral position detection and control for friction stir systems

    DOE Patents [OSTI]

    Fleming, Paul (Boulder, CO); Lammlein, David (Houston, TX); Cook, George E. (Brentwood, TN); Wilkes, Don Mitchell (Nashville, TN); Strauss, Alvin M. (Nashville, TN); Delapp, David (Ashland City, TN); Hartman, Daniel A. (Santa Fe, NM)

    2010-12-14T23:59:59.000Z

    A friction stir system for processing at least a first workpiece includes a spindle actuator coupled to a rotary tool comprising a rotating member for contacting and processing the first workpiece. A detection system is provided for obtaining information related to a lateral alignment of the rotating member. The detection system comprises at least one sensor for measuring a force experienced by the rotary tool or a parameter related to the force experienced by the rotary tool during processing, wherein the sensor provides sensor signals. A signal processing system is coupled to receive and analyze the sensor signals and determine a lateral alignment of the rotating member relative to a selected lateral position, a selected path, or a direction to decrease a lateral distance relative to the selected lateral position or selected path. In one embodiment, the friction stir system can be embodied as a closed loop tracking system, such as a robot-based tracked friction stir welding (FSW) or friction stir processing (FSP) system.

  13. Non-Intrusive User Interfaces for Interactive Digital Television Experiences

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Non-Intrusive User Interfaces for Interactive Digital Television Experiences Pablo Cesar1 , Dick C.Cruz-Lara@loria.fr, Julien.Ducret@loria.fr Abstract. This paper presents a model and architecture for non-intrusive user to consume and interact with television content. We refer to this model as non-intrusive user interfaces

  14. Embedded Sensor System for Early Pathology Detection in Building Construction

    E-Print Network [OSTI]

    Torres, Santiago J Barro

    2009-01-01T23:59:59.000Z

    Structure pathology detection is an important security task in building construction, which is performed by an operator by looking manually for damages on the materials. This activity could be dangerous if the structure is hidden or difficult to reach. On the other hand, embedded devices and wireless sensor networks (WSN) are becoming popular and cheap, enabling the design of an alternative pathology detection system to monitor structures based on these technologies. This article introduces a ZigBee WSN system, intending to be autonomous, easy to use and with low power consumption. Its functional parts are fully discussed with diagrams, as well as the protocol used to collect samples from sensor nodes. Finally, several tests focused on range and power consumption of our prototype are shown, analysing whether the results obtained were as expected or not.

  15. Asynchronous intrusion recovery for interconnected web services

    E-Print Network [OSTI]

    Sabatini, David M.

    Asynchronous intrusion recovery for interconnected web services Ramesh Chandra, Taesoo Kim, and tracking down and recovering from such an attack re- quires significant manual effort. Web services for such web services. Aire addresses several challenges, such as propagating repair across services when some

  16. Neutron Interrogation System For Underwater Threat Detection And Identification

    SciTech Connect (OSTI)

    Barzilov, Alexander P.; Novikov, Ivan S.; Womble, Phil C. [Department of Physics and Astronomy, Western Kentucky University, 1906 College Heights Blvd, 11077 Bowling Green, KY 42101 (United States)

    2009-03-10T23:59:59.000Z

    Wartime and terrorist activities, training and munitions testing, dumping and accidents have generated significant munitions contamination in the coastal and inland waters in the United States and abroad. Although current methods provide information about the existence of the anomaly (for instance, metal objects) in the sea bottom, they fail to identify the nature of the found objects. Field experience indicates that often in excess of 90% of objects excavated during the course of munitions clean up are found to be non-hazardous items (false alarm). The technology to detect and identify waterborne or underwater threats is also vital for protection of critical infrastructures (ports, dams, locks, refineries, and LNG/LPG). We are proposing a compact neutron interrogation system, which will be used to confirm possible threats by determining the chemical composition of the suspicious underwater object. The system consists of an electronic d-T 14-MeV neutron generator, a gamma detector to detect the gamma signal from the irradiated object and a data acquisition system. The detected signal then is analyzed to quantify the chemical elements of interest and to identify explosives or chemical warfare agents.

  17. A Field-Deployable Real-Time Laser-Based Non-Intrusive Detection System for Measurement of True Travel Time on the Highway

    E-Print Network [OSTI]

    Cheng, Harry H.; Shaw, Ben; Palen, Joe; Wang, Zhaoqing; Chen, Bo

    2002-01-01T23:59:59.000Z

    N No interrupt? N Store wiper position Y XdcpIntHandling()output_port_a( 0x3f ); // store wiper position. break; if(port_a( 0x3f ); // store wiper position if (xdcp_cs_buffer =

  18. Observational Techniques for Detecting Planets in Binary Systems

    E-Print Network [OSTI]

    Matthew W. Muterspaugh; Maciej Konacki; Benjamin F. Lane; Eric Pfahl

    2007-05-21T23:59:59.000Z

    Searches for planets in close binary systems explore the degree to which stellar multiplicity inhibits or promotes planet formation. There is a degeneracy between planet formation models when only systems with single stars are studied--several mechanisms appear to be able to produce such a final result. This degeneracy is lifted by searching for planets in binary systems; the resulting detections (or evidence of non-existence) of planets in binaries isolates which models may contribute to how planets form in nature. In this chapter, we consider observational efforts to detect planetary companions to binary stars in two types of hierarchical planet-binary configurations: first ``S-type'' planets which orbit just one of the stars, with the binary period being much longer than the planet's; second, ``P-type'' or circumbinary planets, where the planet simultaneously orbits both stars, and the planetary orbital period is much longer than that of the binary. The S-type planet finding techniques are different for binaries that can or cannot be spatially resolved. For wider systems, techniques reviewed include dualstar interferometric differential astrometry and precision radial velocities. Alternatively, unresolved binaries can be studied using modified dualstar "PHASES-style" differential astrometry or a modification of the radial velocity technique for composite spectra. Should a fortunately aligned--but still long period--binary be found, eclipse timing can also reveal the presence of S-type planets. Methods for detecting P-type planets include the composite-spectra variant of the radial velocity technique and eclipse timing.

  19. Magnetic resonance imaging of living systems by remote detection

    DOE Patents [OSTI]

    Wemmer, David; Pines, Alexander; Bouchard, Louis; Xu, Shoujun; Harel, Elad; Budker, Dmitry; Lowery, Thomas; Ledbetter, Micah

    2013-10-29T23:59:59.000Z

    A novel approach to magnetic resonance imaging is disclosed. Blood flowing through a living system is prepolarized, and then encoded. The polarization can be achieved using permanent or superconducting magnets. The polarization may be carried out upstream of the region to be encoded or at the place of encoding. In the case of an MRI of a brain, polarization of flowing blood can be effected by placing a magnet over a section of the body such as the heart upstream of the head. Alternatively, polarization and encoding can be effected at the same location. Detection occurs at a remote location, using a separate detection device such as an optical atomic magnetometer, or an inductive Faraday coil. The detector may be placed on the surface of the skin next to a blood vessel such as a jugular vein carrying blood away from the encoded region.

  20. Less harm, less worry or how to improve network security by bounding system offensiveness

    E-Print Network [OSTI]

    Cavallaro, Lorenzo

    been developed (i.e., firewalls, intrusion detection systems, anti- virus, access control systems, etc. Measurements of the implemented prototype show that controlling the outgoing traffic does not affect perfor- mance at the sender machine, when traffic is not hostile. If traffic is hostile, the limited slow down

  1. Robotic guarded motion system and method

    DOE Patents [OSTI]

    Bruemmer, David J. (Idaho Falls, ID)

    2010-02-23T23:59:59.000Z

    A robot platform includes perceptors, locomotors, and a system controller. The system controller executes instructions for repeating, on each iteration through an event timing loop, the acts of defining an event horizon, detecting a range to obstacles around the robot, and testing for an event horizon intrusion. Defining the event horizon includes determining a distance from the robot that is proportional to a current velocity of the robot and testing for the event horizon intrusion includes determining if any range to the obstacles is within the event horizon. Finally, on each iteration through the event timing loop, the method includes reducing the current velocity of the robot in proportion to a loop period of the event timing loop if the event horizon intrusion occurs.

  2. Development of an Event Detection System Based on a Wireless Sensor Network 

    E-Print Network [OSTI]

    Bermingham, Louise

    2011-08-10T23:59:59.000Z

    The focus of this research is to develop an event detection system for groundwater flooding. The groundwater monitoring infrastructure is based on a Wireless Sensor Network, which can often lead to corrupted data values. The event detection system...

  3. Sulfur gas geochemical detection of hydrothermal systems. Final report

    SciTech Connect (OSTI)

    Rouse, G.E.

    1984-01-01T23:59:59.000Z

    The purpose of this investigation was to determine whether a system of exploration using sulfur gases was capable of detecting convecting hydrothermal systems. Three surveying techniques were used at the Roosevelt Hot Springs KGRA in Utah. These were (a) a sniffing technique, capable of instantaneous determinations of sulfur gas concentration, (b) an accumulator technique, capable of integrating the sulfur gas emanations over a 30 day interval, and (c) a method of analyzing the soils for vaporous sulfur compounds. Because of limitations in the sniffer technique, only a limited amount of surveying was done with this method. The accumulator and soil sampling techniques were conducted on a 1000 foot grid at Roosevelt Hot Springs, and each sample site was visited three times during the spring of 1980. Thus, three soil samples and two accumulator samples were collected at each site. The results are shown as averages of three soil and two accumulator determinations of sulfur gas concentrations at each site. Soil surveys and accumulator surveys were conducted at two additional KGRA's which were chosen based on the state of knowledge of these hydrothermal systems and upon their differences from Roosevelt Hot Springs in an effort to show that the exploration methods would be effective in detecting geothermal reservoirs in general. The results at Roosevelt Hot Springs, Utah show that each of the three surveying methods was capable of detecting sulfur gas anomalies which can be interpreted to be related to the source at depth, based on resistivity mapping of that source, and also correlatable with major structural features of the area which are thought to be controlling the geometry of the geothermal reservoir. The results of the surveys at Roosevelt did not indicate that either the soil sampling technique or the accumulator technique was superior to the other.

  4. Methods and systems for detecting abnormal digital traffic

    DOE Patents [OSTI]

    Goranson, Craig A [Kennewick, WA; Burnette, John R [Kennewick, WA

    2011-03-22T23:59:59.000Z

    Aspects of the present invention encompass methods and systems for detecting abnormal digital traffic by assigning characterizations of network behaviors according to knowledge nodes and calculating a confidence value based on the characterizations from at least one knowledge node and on weighting factors associated with the knowledge nodes. The knowledge nodes include a characterization model based on prior network information. At least one of the knowledge nodes should not be based on fixed thresholds or signatures. The confidence value includes a quantification of the degree of confidence that the network behaviors constitute abnormal network traffic.

  5. c Copyright by James Patrick Lyons, 2003 A REPLICATION PROTOCOL FOR AN INTRUSION-TOLERANT

    E-Print Network [OSTI]

    Illinois at Urbana-Champaign, University of

    c Copyright by James Patrick Lyons, 2003 #12;A REPLICATION PROTOCOL FOR AN INTRUSION-TOLERANT SYSTEM DESIGN BY JAMES PATRICK LYONS B.S., University of Pennsylvania, 2000 THESIS Submitted in partial and Family iii #12;Acknowledgments In writing this thesis many people have provided me with invaluable

  6. Seawater intrusion and aquifer freshening near reclaimed coastal area of Shenzhen

    E-Print Network [OSTI]

    Jiao, Jiu Jimmy

    to a modern city. Meanwhile, large-scale land reclamation was carried out to meet the needs of various. Keywords Coastal groundwater; land reclamation; seawater intrusion; Shenzhen Introduction The study area and land reclamation are believed to have significant impact on coastal groundwater flow systems both

  7. Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project

    E-Print Network [OSTI]

    Yang, Junfeng

    Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project Salvatore J. Stolfo by sensing a misuse or a breach of a security policy and alerting operators to an ongoing (or, at least on a weekly basis reporting that malicious users still succeed in attacking systems with sometimes devastating

  8. Spreader-Bar Radiation Detection System Enhancements: A Modeling and Simulation Study

    SciTech Connect (OSTI)

    Ely, James H.; Ashbaker, Eric D.; Batdorf, Michael T.; Baciak, James E.; Hensley, Walter K.; Jarman, Kenneth D.; Robinson, Sean M.; Sandness, Gerald A.; Schweppe, John E.

    2012-11-13T23:59:59.000Z

    This report provides the modeling and simulation results of the investigation of enhanced spreader bar radiation detection systems.

  9. The All Terrain Bio nano Gear for Space Radiation Detection System

    E-Print Network [OSTI]

    Mavroidis, Constantinos

    The All Terrain Bio nano Gear for Space Radiation Detection System Ajay Ummat, Constantinos and warn the astronaut of probable biological damage. A basic framework for radiation detection system which utilizes bio-nano machines is discussed. This radiation detection system is termed as "radiation

  10. Testing and Evaluation Protocol for Backpack-Based Radiation Detection Systems Used for Homeland

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland Radiation Detection Systems Used for Homeland Security EFF. DATE 2013-05-30 REV. 2.00 PAGE 1 of 10 Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland Security 1. Scope

  11. System and method for detection of dispersed broadband signals

    DOE Patents [OSTI]

    Qian, Shie (Austin, TX); Dunham, Mark E. (Los Alamos, NM)

    1999-06-08T23:59:59.000Z

    A system and method for detecting the presence of dispersed broadband signals in real time. The present invention utilizes a bank of matched filters for detecting the received dispersed broadband signals. Each matched filter uses a respective robust time template that has been designed to approximate the dispersed broadband signals of interest, and each time template varies across a spectrum of possible dispersed broadband signal time templates. The received dispersed broadband signal x(t) is received by each of the matched filters, and if one or more matches occurs, then the received data is determined to have signal data of interest. This signal data can then be analyzed and/or transmitted to Earth for analysis, as desired. The system and method of the present invention will prove extremely useful in many fields, including satellite communications, plasma physics, and interstellar research. The varying time templates used in the bank of matched filters are determined as follows. The robust time domain template is assumed to take the form w(t)=A(t)cos{2.phi.(t)}. Since the instantaneous frequency f(t) is known to be equal to the derivative of the phase .phi.(t), the trajectory of a joint time-frequency representation of x(t) is used as an approximation of .phi.'(t).

  12. System and method for detection of dispersed broadband signals

    DOE Patents [OSTI]

    Qian, S.; Dunham, M.E.

    1999-06-08T23:59:59.000Z

    A system and method for detecting the presence of dispersed broadband signals in real time are disclosed. The present invention utilizes a bank of matched filters for detecting the received dispersed broadband signals. Each matched filter uses a respective robust time template that has been designed to approximate the dispersed broadband signals of interest, and each time template varies across a spectrum of possible dispersed broadband signal time templates. The received dispersed broadband signal x(t) is received by each of the matched filters, and if one or more matches occurs, then the received data is determined to have signal data of interest. This signal data can then be analyzed and/or transmitted to Earth for analysis, as desired. The system and method of the present invention will prove extremely useful in many fields, including satellite communications, plasma physics, and interstellar research. The varying time templates used in the bank of matched filters are determined as follows. The robust time domain template is assumed to take the form w(t)=A(t)cos[l brace]2[phi](t)[r brace]. Since the instantaneous frequency f(t) is known to be equal to the derivative of the phase [phi](t), the trajectory of a joint time-frequency representation of x(t) is used as an approximation of [phi][prime](t). 10 figs.

  13. Non-intrusive ultrasonic liquid-in-line detector for small diameter tubes. [Patent application

    DOE Patents [OSTI]

    Piper, T.C.

    1980-09-24T23:59:59.000Z

    An arrangement for detecting liquids in a line, using non-intrusive ultrasonic techniques is disclosed. In this arrangement, four piezoelectric crystals are arranged in pairs about a 0.078 inch o.d. pipe. An ultrasonic tone burst is transmitted along the pipe, between crystal pairs, and the amplitude of the received tone burst indicates the absence/presence of liquid in the pipe.

  14. System and method for detecting a faulty object in a system

    DOE Patents [OSTI]

    Gunnels, John A. (Brewster, NY); Gustavson, Fred Gehrung (Briarcliff Manor, NY); Engle, Robert Daniel (St. Louis, MO)

    2010-12-14T23:59:59.000Z

    A method (and system) for detecting at least one faulty object in a system including a plurality of objects in communication with each other in an n-dimensional architecture, includes probing a first plane of objects in the n-dimensional architecture and probing at least one other plane of objects in the n-dimensional architecture which would result in identifying a faulty object in the system.

  15. System and method for detecting a faulty object in a system

    DOE Patents [OSTI]

    Gunnels, John A. (Brewster, NY); Gustavson, Fred Gehrung (Briarcliff Manor, NY); Engle, Robert Daniel (St. Louis, MO)

    2009-03-17T23:59:59.000Z

    A method (and system) for detecting at least one faulty object in a system including a plurality of objects in communication with each other in an n-dimensional architecture, includes probing a first plane of objects in the n-dimensional architecture and probing at least one other plane of objects in the n-dimensional architecture which would result in identifying a faulty object in the system.

  16. 'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State

    SciTech Connect (OSTI)

    Miles McQueen; Annarita Giani

    2011-09-01T23:59:59.000Z

    This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

  17. Profile-based adaptive anomaly detection for network security.

    SciTech Connect (OSTI)

    Zhang, Pengchu C. (Sandia National Laboratories, Albuquerque, NM); Durgin, Nancy Ann

    2005-11-01T23:59:59.000Z

    As information systems become increasingly complex and pervasive, they become inextricably intertwined with the critical infrastructure of national, public, and private organizations. The problem of recognizing and evaluating threats against these complex, heterogeneous networks of cyber and physical components is a difficult one, yet a solution is vital to ensuring security. In this paper we investigate profile-based anomaly detection techniques that can be used to address this problem. We focus primarily on the area of network anomaly detection, but the approach could be extended to other problem domains. We investigate using several data analysis techniques to create profiles of network hosts and perform anomaly detection using those profiles. The ''profiles'' reduce multi-dimensional vectors representing ''normal behavior'' into fewer dimensions, thus allowing pattern and cluster discovery. New events are compared against the profiles, producing a quantitative measure of how ''anomalous'' the event is. Most network intrusion detection systems (IDSs) detect malicious behavior by searching for known patterns in the network traffic. This approach suffers from several weaknesses, including a lack of generalizability, an inability to detect stealthy or novel attacks, and lack of flexibility regarding alarm thresholds. Our research focuses on enhancing current IDS capabilities by addressing some of these shortcomings. We identify and evaluate promising techniques for data mining and machine-learning. The algorithms are ''trained'' by providing them with a series of data-points from ''normal'' network traffic. A successful algorithm can be trained automatically and efficiently, will have a low error rate (low false alarm and miss rates), and will be able to identify anomalies in ''pseudo real-time'' (i.e., while the intrusion is still in progress, rather than after the fact). We also build a prototype anomaly detection tool that demonstrates how the techniques might be integrated into an operational intrusion detection framework.

  18. integration division Human Systems

    E-Print Network [OSTI]

    integration division Human Systems Eye-Movement Metrics: Non-Intrusive Quantitative Tools for Monitoring Human Visual Performance Objective Approach Impact A reliable quantitative yet non-intrusive methodologies that provide quantitative yet non-intrusive measures of human visual performance for use

  19. DimaSense™: A Novel Nucleic Acid Detection System

    SciTech Connect (OSTI)

    Stadler, A.

    2011-05-18T23:59:59.000Z

    Recently, we developed a suite of methods for the rational design and fabrication of well-defined nanoparticle architectures, including clusters using bio-encoded nanoscale building blocks and layer-by-layer stepwise assembly on a solid support. In particular, the Nano-Assembly platform using Encoded Solid Supports (NAESS) allows for controlled interactions, purification of side products, modularity of design, and the construction of complex nanoparticle architectures. This approach offers several advantages over the current art of designing nanoparticle clusters, which include the high-yield synthesis of desired architectures, a 'plug-and-play' design allowing for the introduction of a variety of sensing modalities, and ease of scalability in high-throughput and synthesis yield. As a utility proof of concept, we implemented our unique cluster fabrication platform to design gold nanoparticle dimers which are linked via a single-stranded DNA oligonucleotide recognition motif. The design of this motif is such that binding of complementary nucleic acids results in specific, selective and rapid dimer dissociation, which can be monitored by dynamic light scattering (DLS). We demonstrated single level mismatch selectivity using this approach. The limit of detection was determined to be 1011 molecules of synthetic target RNA or DNA within 30 minutes of incubation at 33 C. This detection limit is determined by the dimer's concentration which can be probed by currently used standard DLS instruments. We also demonstrated a specific detection of target RNA in a solution containing competing 1,000-fold excess of non-complementary DNA fragments, 10% BSA, and endonucleases. Molecular diagnostic companies, RNA-based technology developers, and personalized medicine companies have applications that could benefit from using DimaSense{trademark}. The technology represents a platform which enables the simple and reasonably inexpensive design and fabrication of highly selective genetic sensors. These sensors operate with very low concentrations of target, can utilize standard instrumentation, produce detection results rapidly, and are robust enough to function in the presence of many competing genetic targets. Many current genetic target detection products/approaches/technologies rely upon methods (such as qPCR) which are more complicated, cumbersome, and costly to perform, and are not well suited to point-of-care diagnostic applications. Several clinical diagnostic applications, particularly point-of-care (POC) diagnostics for infectious diseases, are possible and appear to be a good fit for the technology. In addition, the advent of personalized medicine will create opportunities for molecular diagnostic companies with the capabilities of rapidly and quantitatively detecting nucleic acid sequences. The global POC market was {approx}$7.7B in 2010, with a recent annual growth rate of {approx}7%. A specific disease or disease-class diagnostic would need to be identified before a more meaningful sub-market value could be stated. Additional validation of the technology to show that it displays appropriate performance parameters for a commercial application on 'real world' samples is required for true commercial readiness. In addition, optimization of sensor design parameters, to effect a 10-fold increase in sensitivity, may be required to produce a commercially ready sensor system. These validation and sensor design optimization are estimated to require 3-4 months and {approx}$75k. For an unregulated product to give this sensor system a distinct competitive advantage, 2-3 years of product development and $1.5-3M are likely required. For regulated markets, time to market (through clinic) and cost would depend upon the product.

  20. Technical specifications manual for the MARK-1 pulsed ionizing radiation detection system. Volume 1

    SciTech Connect (OSTI)

    Lawrence, R.S.; Harker, Y.D.; Jones, J.L.; Hoggan, J.M.

    1993-03-01T23:59:59.000Z

    The MARK-1 detection system was developed by the Idaho National Engineering Laboratory for the US Department of Energy Office of Arms Control and Nonproliferation. The completely portable system was designed for the detection and analysis of intense photon emissions from pulsed ionizing radiation sources. This manual presents the technical design specifications for the MARK-1 detection system and was written primarily to assist the support or service technician in the service, calibration, and repair of the system. The manual presents the general detection system theory, the MARK-1 component design specifications, the acquisition and control software, the data processing sequence, and the system calibration procedure. A second manual entitled: Volume 2: Operations Manual for the MARK-1 Pulsed Ionizing Radiation Detection System (USDOE Report WINCO-1108, September 1992) provides a general operational description of the MARK-1 detection system. The Operations Manual was written primarily to assist the field operator in system operations and analysis of the data.

  1. Protein- protein interaction detection system using fluorescent protein microdomains

    DOE Patents [OSTI]

    Waldo, Geoffrey S. (Santa Fe, NM); Cabantous, Stephanie (Los Alamos, NM)

    2010-02-23T23:59:59.000Z

    The invention provides a protein labeling and interaction detection system based on engineered fragments of fluorescent and chromophoric proteins that require fused interacting polypeptides to drive the association of the fragments, and further are soluble and stable, and do not change the solubility of polypeptides to which they are fused. In one embodiment, a test protein X is fused to a sixteen amino acid fragment of GFP (.beta.-strand 10, amino acids 198-214), engineered to not perturb fusion protein solubility. A second test protein Y is fused to a sixteen amino acid fragment of GFP (.beta.-strand 11, amino acids 215-230), engineered to not perturb fusion protein solubility. When X and Y interact, they bring the GFP strands into proximity, and are detected by complementation with a third GFP fragment consisting of GFP amino acids 1-198 (strands 1-9). When GFP strands 10 and 11 are held together by interaction of protein X and Y, they spontaneous association with GFP strands 1-9, resulting in structural complementation, folding, and concomitant GFP fluorescence.

  2. A ring system detected around the Centaur (10199) Chariklo

    E-Print Network [OSTI]

    Braga-Ribas, F; Ortiz, J L; Snodgrass, C; Roques, F; Vieira-Martins, R; Camargo, J I B; Assafin, M; Duffard, R; Jehin, E; Pollock, J; Leiva, R; Emilio, M; Machado, D I; Colazo, C; Lellouch, E; Skottfelt, J; Gillon, M; Ligier, N; Maquet, L; Benedetti-Rossi, G; Gomes, A Ramos; Kervella, P; Monteiro, H; Sfair, R; Moutamid, M El; Tancredi, G; Spagnotto, J; Maury, A; Morales, N; Gil-Hutton, R; Roland, S; Ceretta, A; Gu, S -h; Wang, X -b; Harpsře, K; Rabus, M; Manfroid, J; Opitom, C; Vanzi, L; Mehret, L; Lorenzini, L; Schneiter, E M; Melia, R; Lecacheux, J; Colas, F; Vachier, F; Widemann, T; Almenares, L; Sandness, R G; Char, F; Perez, V; Lemos, P; Martinez, N; Jřrgensen, U G; Dominik, M; Roig, F; Reichart, D E; LaCluyze, A P; Haislip, J B; Ivarsen, K M; Moore, J P; Frank, N R; Lambas, D G

    2014-01-01T23:59:59.000Z

    Until now, rings have been detected in the Solar System exclusively around the four giant planets. Here we report the discovery of the first minor-body ring system around the Centaur object (10199) Chariklo, a body with equivalent radius 124$\\pm$9 km. A multi-chord stellar occultation revealed the presence of two dense rings around Chariklo, with widths of about 7 km and 3 km, optical depths 0.4 and 0.06, and orbital radii 391 and 405 km, respectively. The present orientation of the ring is consistent with an edge-on geometry in 2008, thus providing a simple explanation for the dimming of Chariklo's system between 1997 and 2008, and for the gradual disappearance of ice and other absorption features in its spectrum over the same period. This implies that the rings are partially composed of water ice. These rings may be the remnants of a debris disk, which were possibly confined by embedded kilometre-sized satellites.

  3. Scoping study of SNM detection and indentification for adjunct on-site treaty monitoring. Final report

    SciTech Connect (OSTI)

    Murray, W.S.; Morgado, R.E.; Frankle, C.M.

    1995-07-01T23:59:59.000Z

    Following the fall of the Soviet Union, political pressure to negotiate meaningful nuclear arms agreements with Russia and the former soviet republics has increased. Anticipating the monitoring requirements of a future treaty for the decommissioning and disassembly of nuclear warheads presents opportunities to review existing monitoring technologies and to explore new methods to detect and analyze intrinsic radiation. Fully instrumented radiation-detection systems with a range of monitoring capabilities are available, but special-purpose instruments will still need to be developed to match increasing demands for high-confidence, low-intrusion monitoring in a specific scenario. As a guide to present capabilities in monitoring technologies, we have categorized their relevant attributes to detect and identify special nuclear material based on levels of confidence, intrusiveness, vulnerability, and other critical concerns. To add additional flexibility, we review emerging technologies and estimate the development time to bring them to operational status.

  4. Systems and methods for detecting x-rays

    DOE Patents [OSTI]

    Bross, Alan D.; Mellott, Kerry L.; Pla-Dalmau, Anna

    2006-05-02T23:59:59.000Z

    Systems and methods for detecting x-rays are disclosed herein. One or more x-ray-sensitive scintillators can be configured from a plurality of heavy element nano-sized particles and a plastic material, such as polystyrene. As will be explained in greater detail herein, the heavy element nano-sized particles (e.g., PbWO4) can be compounded into the plastic material with at least one dopant that permits the plastic material to scintillate. X-rays interact with the heavy element nano-sized particles to produce electrons that can deposit energy in the x-ray sensitive scintillator, which in turn can produce light.

  5. Detection of the Water Reservoir in a Forming Planetary System

    E-Print Network [OSTI]

    Hogerheijde, Michiel R; Brinch, Christian; Cleeves, L Ilsedore; Fogel, Jeffrey K J; Blake, Geoffrey A; Dominik, Carsten; Lis, Dariusz C; Melnick, Gary; Neufeld, David; Panic, Olja; Pearson, John C; Kristensen, Lars; Yildiz, Umut A; van Dishoeck, Ewine F

    2011-01-01T23:59:59.000Z

    Icy bodies may have delivered the oceans to the early Earth, yet little is known about water in the ice-dominated regions of extra-solar planet-forming disks. The Heterodyne Instrument for the Far-Infrared on-board the Herschel Space Observatory has detected emission from both spin isomers of cold water vapor from the disk around the young star TW Hydrae. This water vapor likely originates from ice-coated solids near the disk surface hinting at a water ice reservoir equivalent to several thousand Earth Oceans in mass. The water's ortho-to-para ratio falls well below that of Solar System comets, suggesting that comets contain heterogeneous ice mixtures collected across the entire solar nebula during the early stages of planetary birth.

  6. Comparison of enclosed space detection system with conventional methods

    SciTech Connect (OSTI)

    Kercel, S.W.; Baylor, V.M.; Labaj, L.E.

    1997-09-01T23:59:59.000Z

    Enclosed Space Detection System (ESDS) is a fast, inexpensive, and reliable device for detecting human occupants hidden in vehicles. Operation requires less than two minutes. ESDS is used to foil attempts at smuggling illegal aliens, terrorists, and escaping prisoners. It is being tested at nuclear weapons facilities and has been operated at several prisons and international border crossings. ESDS is the first practical electronic alternative to physical searches of vehicles for hidden passengers. At critical checkpoints, a thorough physical search of a single fully loaded truck requires a team of from two to six people, and may take as long as eight hours. Despite this level of security, experience has shown that the search can occasionally be foiled. Due to the enormous time and expense of thorough physical searches of vehicles, they are seldom conducted at any but the most critical of locations, simply leaving many sites vulnerable to crime and terrorism. Prior to the development of the ESDS, the only other effective alternative to physical search was the use of specially-trained canines, which can be vastly superior to the physical search in both time and accuracy. However, as discussed in this paper, canine inspection is not really a competitive substitute for ESDS because canine reliability (80% at most) is not as high as that of the ESDS (99%+), while the costs, training requirements, and operator skill needed are significantly higher with canines than with the ESDS. In addition, the ESDS has straightforward self-diagnostic tests to ensure the system is operating correctly; such tests are not currently available with either canine or human inspectors. ESDS offers an attractive supplement or alternative to meet current security requirements for vehicle searches at portals at government, nuclear, industrial, and other facilities where concealed persons may pose a threat either by entering or leaving.

  7. Termination Detection in an Asynchronous Distributed System with Crash-Recovery

    E-Print Network [OSTI]

    Mittal, Neeraj

    Termination Detection in an Asynchronous Distributed System with Crash-Recovery Failures Felix C 75083, USA 1 Termination Detection In practice, it cannot easily be detected whether a computation running in a distributed system has terminated or not. Thus, suitable observing algorithms are required

  8. Extended Research on Detection of Deception Using Volatile Organic Compound (VOC) Emissions

    SciTech Connect (OSTI)

    Center for Human Reliability Studies

    2006-06-01T23:59:59.000Z

    A system that captures and analyzes volatile organic compound (VOC) emissions from skin surfaces may offer a viable alternative method to the polygraph instrument currently in use for detecting deception in U.S. government settings. Like the involuntary autonomic central nervous system response data gathered during polygraph testing, VOC emissions from the skin may provide data that can be used to detect stress caused by deception. Detecting VOCs, then, may present a noninvasive, non-intrusive method for observing, recording, and quantifying evidence of stress or emotional change.

  9. Real-time system for imaging and object detection with a multistatic GPR array

    DOE Patents [OSTI]

    Paglieroni, David W; Beer, N Reginald; Bond, Steven W; Top, Philip L; Chambers, David H; Mast, Jeffrey E; Donetti, John G; Mason, Blake C; Jones, Steven M

    2014-10-07T23:59:59.000Z

    A method and system for detecting the presence of subsurface objects within a medium is provided. In some embodiments, the imaging and detection system operates in a multistatic mode to collect radar return signals generated by an array of transceiver antenna pairs that is positioned across the surface and that travels down the surface. The imaging and detection system pre-processes the return signal to suppress certain undesirable effects. The imaging and detection system then generates synthetic aperture radar images from real aperture radar images generated from the pre-processed return signal. The imaging and detection system then post-processes the synthetic aperture radar images to improve detection of subsurface objects. The imaging and detection system identifies peaks in the energy levels of the post-processed image frame, which indicates the presence of a subsurface object.

  10. ADECENTRALIZED APPROACH TOWARDS AUTONOMOUS FAULT DETECTION IN WIRELESS STRUCTURAL HEALTH MONITORING SYSTEMS

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ADECENTRALIZED APPROACH TOWARDS AUTONOMOUS FAULT DETECTION IN WIRELESS STRUCTURAL HEALTH MONITORING structural health monitoring (SHM) systems may reduce the monitoring quality and, if remaining undetected : Autonomous fault detection, structural health monitoring, wireless sensor networks, smart sensors, analytical

  11. Wavelet-based Burst Event Detection and Localization in Water Distribution Systems

    E-Print Network [OSTI]

    Srirangarajan, Seshan

    In this paper we present techniques for detecting and locating transient pipe burst events in water distribution systems. The proposed method uses multiscale wavelet analysis of high rate pressure data recorded to detect ...

  12. OPNET/Simulink Based Testbed for Disturbance Detection in the Smart Grid

    SciTech Connect (OSTI)

    Sadi, Mohammad A. H. [University of Memphis; Dasgupta, Dipankar [ORNL; Ali, Mohammad Hassan [University of Memphis; Abercrombie, Robert K [ORNL

    2015-01-01T23:59:59.000Z

    The important backbone of the smart grid is the cyber/information infrastructure, which is primarily used to communicate with different grid components. A smart grid is a complex cyber physical system containing a numerous and variety number of sources, devices, controllers and loads. Therefore, the smart grid is vulnerable to grid related disturbances. For such dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and Opnet based co-simulated platform to carry out a cyber-intrusion in cyber network for modern power systems and the smart grid. The IEEE 30 bus power system model is used to demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack. Different disturbance situations in the considered test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.

  13. anomaly intrusion detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Creation via Clustering Anomalies Gilbert R. Hendry and Shanchieh J. Yang apparent by the latency from day zero of an attack to the creation of an appropriate signature. This work...

  14. A Multiple Model Cost-Sensitive Approach for Intrusion Detection

    E-Print Network [OSTI]

    Lee, Wenke

    that are optimized for user-de#12;ned cost metrics. Empirical experiments in o#11;- line analysis show a reduction of approximately 97% in operational cost over a single model approach, and a reduction of approximately 30 the initial results of our current research in extending our data mining framework to build cost

  15. A Continuous Time Bayesian Network Approach for Intrusion Detection

    E-Print Network [OSTI]

    Xu, Jing

    2010-01-01T23:59:59.000Z

    3 for more details). The ESS for any variable X in a CTBNwhen event P i can happen. The ESS we need are M P i |U Pi :occur when U = U p i , the ESS M P i |U Pi is just M P i ,

  16. Automatic compilation framework for Bloom filter based intrusion detection

    E-Print Network [OSTI]

    Najjar, Walid A.

    the FPGA fabric of a CSoC device. In the execution model underlying ROCCC, sequential computations are carried out on the microprocessor in the CSoC, while the compute intensive code segments are mapped onto

  17. Intrusion Detecting Using Secure Signatures - Energy Innovation Portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn OtherEnergyBPA-Film-Collection Sign In

  18. Nuisance Source Population Modeling for Radiation Detection System Analysis

    SciTech Connect (OSTI)

    Sokkappa, P; Lange, D; Nelson, K; Wheeler, R

    2009-10-05T23:59:59.000Z

    A major challenge facing the prospective deployment of radiation detection systems for homeland security applications is the discrimination of radiological or nuclear 'threat sources' from radioactive, but benign, 'nuisance sources'. Common examples of such nuisance sources include naturally occurring radioactive material (NORM), medical patients who have received radioactive drugs for either diagnostics or treatment, and industrial sources. A sensitive detector that cannot distinguish between 'threat' and 'benign' classes will generate false positives which, if sufficiently frequent, will preclude it from being operationally deployed. In this report, we describe a first-principles physics-based modeling approach that is used to approximate the physical properties and corresponding gamma ray spectral signatures of real nuisance sources. Specific models are proposed for the three nuisance source classes - NORM, medical and industrial. The models can be validated against measured data - that is, energy spectra generated with the model can be compared to actual nuisance source data. We show by example how this is done for NORM and medical sources, using data sets obtained from spectroscopic detector deployments for cargo container screening and urban area traffic screening, respectively. In addition to capturing the range of radioactive signatures of individual nuisance sources, a nuisance source population model must generate sources with a frequency of occurrence consistent with that found in actual movement of goods and people. Measured radiation detection data can indicate these frequencies, but, at present, such data are available only for a very limited set of locations and time periods. In this report, we make more general estimates of frequencies for NORM and medical sources using a range of data sources such as shipping manifests and medical treatment statistics. We also identify potential data sources for industrial source frequencies, but leave the task of estimating these frequencies for future work. Modeling of nuisance source populations is only useful if it helps in understanding detector system performance in real operational environments. Examples of previous studies in which nuisance source models played a key role are briefly discussed. These include screening of in-bound urban traffic and monitoring of shipping containers in transit to U.S. ports.

  19. Survey of Event Correlation Techniques for Attack Detection in Early Warning Systems

    E-Print Network [OSTI]

    Breu, Ruth

    Survey of Event Correlation Techniques for Attack Detection in Early Warning Systems Tobias Limmer of early warning systems for detecting Internet worms and other attacks, event correlation techniques on early warning systems. We summarize and clarify the typical terminology used in this context and present

  20. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    SciTech Connect (OSTI)

    Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Hora, S.C. [Hawaii Univ., Hilo, HI (United States); Guzowski, R.V. [Science Applications International Corp., San Diego, CA (United States)

    1993-11-01T23:59:59.000Z

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

  1. In this project, we deal with the simulation and the optimisation of flows when uncertainties exist in the models and/or the data. We only consider non intrusive methods so that existing CFD softwares

    E-Print Network [OSTI]

    Abgrall, RĂ©mi

    uncertainties exist in the models and/or the data. We only consider non intrusive methods so that existing CFD. To this aim, we pursue the study of a non intrusive, accurate method, which is also non sensitive for very non linear systems of PDEs, where the solutions are often discontinuous and/or chaotic

  2. Making the Most of Thin Data: A Hardware-Software Approach

    E-Print Network [OSTI]

    Martin, Paul Daniel

    2013-01-01T23:59:59.000Z

    system for enabling non-intrusive water flow detection.designed to enable non-intrusive water flow monitoring.and dis- advantages. Non-intrusive disaggregation approaches

  3. BLIND MULTIUSER DETECTION AND INTERFERENCE CANCELLATION IN DSCDMA MOBILE RADIO SYSTEMS

    E-Print Network [OSTI]

    Huang, Yih-Fang

    BLIND MULTIUSER DETECTION AND INTERFERENCE CANCELLATION IN DS­CDMA MOBILE RADIO SYSTEMS Samir USA ABSTRACT This paper deals with blind adaptive multiuser detection and interference cancellation presents a two­stage blind adaptive receiver architecture which car­ ries out multiuser detection using

  4. A Review of Damage Detection and Health Monitoring of Mechanical Systems from Changes in

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Review of Damage Detection and Health Monitoring of Mechanical Systems from Changes of Damage Detection and Health Monitoring... 1 1. Introduction Damage are a main cause of structural failure of structural components by detection damage in structures in the early state. More specifically, structural

  5. AUTOMATIC VARIABLE VENTILATION CONTROL SYSTEMS BASED ON AIR QUALITY DETECTION

    E-Print Network [OSTI]

    Turiel, Isaac

    2011-01-01T23:59:59.000Z

    SUt1t1ARY Mechanical ventilation systems usually provide aof any 02 based ventilation system is that a ventilationwith type of ventilation system~ weather conditions, and

  6. AUTOMATIC VARIABLE VENTILATION CONTROL SYSTEMS BASED ON AIR QUALITY DETECTION

    E-Print Network [OSTI]

    Turiel, Isaac

    2011-01-01T23:59:59.000Z

    ~saon Automatic Variable Ventilation Control Systems Based79-3 Automatic variable ventilation control systems based onof automatic variable ventilation control systems, result in

  7. A Qualitive Modeling Approach for Fault Detection and Diagnosis on HVAC Systems

    E-Print Network [OSTI]

    Muller, T.; Rehault, N.; Rist, T.

    2013-01-01T23:59:59.000Z

    This paper describes the basics and first test results of a model based approach using qualitative modeling to perform Fault Detection and Diagnostics (FDD) on HVAC and R systems. A quantized system describing the qualitative behavior of a...

  8. Fast Detection and Mitigation of Cascading Outages in the Power System

    E-Print Network [OSTI]

    Pang, Chengzong

    2012-02-14T23:59:59.000Z

    This dissertation studies the causes and mechanism of power system cascading outages and proposes the improved interactive scheme between system-wide and local levels of monitoring and control to quickly detect, classify and mitigate the cascading...

  9. An In-Situ Ion Mobility Spectrometer Sensor System for Detecting Gaseous VOCs in Unsaturated Soils

    E-Print Network [OSTI]

    Baker, R. Jacob

    An In-Situ Ion Mobility Spectrometer Sensor System for Detecting Gaseous VOCs in Unsaturated Soils and will be ultimately equipped with water content, temperature, and pressure sensors. The proposed system is designed knowledge, an in-situ IMS for detection of subsurface gaseous VOCs has not been previously developed. VOCs

  10. DEVELOPMENT AND COMMISSIONING OF A PHOTON DETECTION SYSTEM FOR COLLINEAR LASER

    E-Print Network [OSTI]

    Mantica, Paul F.

    DEVELOPMENT AND COMMISSIONING OF A PHOTON DETECTION SYSTEM FOR COLLINEAR LASER SPECTROSCOPY AT NSCL of the requirements for the degree of Masters of Science Chemistry 2011 #12;ABSTRACT DEVELOPMENT AND COMMISSIONING. Simulations of the detection system were performed using FRED optical engineering software, and commissioning

  11. High-speed and high-fidelity system and method for collecting network traffic

    DOE Patents [OSTI]

    Weigle, Eric H. (Los Alamos, NM)

    2010-08-24T23:59:59.000Z

    A system is provided for the high-speed and high-fidelity collection of network traffic. The system can collect traffic at gigabit-per-second (Gbps) speeds, scale to terabit-per-second (Tbps) speeds, and support additional functions such as real-time network intrusion detection. The present system uses a dedicated operating system for traffic collection to maximize efficiency, scalability, and performance. A scalable infrastructure and apparatus for the present system is provided by splitting the work performed on one host onto multiple hosts. The present system simultaneously addresses the issues of scalability, performance, cost, and adaptability with respect to network monitoring, collection, and other network tasks. In addition to high-speed and high-fidelity network collection, the present system provides a flexible infrastructure to perform virtually any function at high speeds such as real-time network intrusion detection and wide-area network emulation for research purposes.

  12. Detection, Correlation, and Visualization of Attacks Against Critical Infrastructure Systems

    E-Print Network [OSTI]

    Briesemeister, Linda

    . Modern control systems are increasingly connected to other control systems as well as to corporate.lastname@sri.com Abstract--Digital control systems are essential to the safe and efficient operation of a variety from conventional enterprise systems. These trends can make control systems vulnerable to cyber attack

  13. Power System Extreme Event Detection: The Vulnerability Frontier

    E-Print Network [OSTI]

    Lesieutre, Bernard C.; Pinar, Ali; Roy, Sandip

    2007-01-01T23:59:59.000Z

    Screening in Electric Power Systems,” submitted to theIEEE Transactions on Power Systems. [3] Lesieutre, B.C. , S.Donde, and A. Pinar, “Power System Extreme Event Screening

  14. AUTOMATIC VARIABLE VENTILATION CONTROL SYSTEMS BASED ON AIR QUALITY DETECTION

    E-Print Network [OSTI]

    Turiel, Isaac

    2011-01-01T23:59:59.000Z

    saon Automatic Variable Ventilation Control Systems Based onL Kusuda, "Control Ventilation to Conserve Energy While t·79-3 Automatic variable ventilation control systems based on

  15. Element One Reduces Cost of Hydrogen Leak Detection Systems ...

    Office of Environmental Management (EM)

    Begins for "America's Next Top Energy Innovator" SiNode Systems - Advanced silicon graphene batteries. | Photo courtesy of Sinode Systems. Startup Success: Energy Department...

  16. Flight Testing of an Advanced Airborne Natural Gas Leak Detection System

    SciTech Connect (OSTI)

    Dawn Lenz; Raymond T. Lines; Darryl Murdock; Jeffrey Owen; Steven Stearns; Michael Stoogenke

    2005-10-01T23:59:59.000Z

    ITT Industries Space Systems Division (Space Systems) has developed an airborne natural gas leak detection system designed to detect, image, quantify, and precisely locate leaks from natural gas transmission pipelines. This system is called the Airborne Natural Gas Emission Lidar (ANGEL) system. The ANGEL system uses a highly sensitive differential absorption Lidar technology to remotely detect pipeline leaks. The ANGEL System is operated from a fixed wing aircraft and includes automatic scanning, pointing system, and pilot guidance systems. During a pipeline inspection, the ANGEL system aircraft flies at an elevation of 1000 feet above the ground at speeds of between 100 and 150 mph. Under this contract with DOE/NETL, Space Systems was funded to integrate the ANGEL sensor into a test aircraft and conduct a series of flight tests over a variety of test targets including simulated natural gas pipeline leaks. Following early tests in upstate New York in the summer of 2004, the ANGEL system was deployed to Casper, Wyoming to participate in a set of DOE-sponsored field tests at the Rocky Mountain Oilfield Testing Center (RMOTC). At RMOTC the Space Systems team completed integration of the system and flew an operational system for the first time. The ANGEL system flew 2 missions/day for the duration for the 5-day test. Over the course of the week the ANGEL System detected leaks ranging from 100 to 5,000 scfh.

  17. Attacks Against Process Control Systems: Risk Assessment, Detection, and Response

    E-Print Network [OSTI]

    Hu, Fei

    research problems for securing control systems when compared to securing traditional information technology technology (IT) systems connected to the physical world. Depending on the application, these control systems (DCS) or Cyber-Physical Systems (CPS) (to refer to embedded sensor and actuator networks). Control

  18. Systems and methods for detecting a flame in a fuel nozzle of a gas turbine

    DOE Patents [OSTI]

    Kraemer, Gilbert Otto; Storey, James Michael; Lipinski, John; Mestroni, Julio Enrique; Williamson, David Lee; Marshall, Jason Randolph; Krull, Anthony

    2013-05-07T23:59:59.000Z

    A system may detect a flame about a fuel nozzle of a gas turbine. The gas turbine may have a compressor and a combustor. The system may include a first pressure sensor, a second pressure sensor, and a transducer. The first pressure sensor may detect a first pressure upstream of the fuel nozzle. The second pressure sensor may detect a second pressure downstream of the fuel nozzle. The transducer may be operable to detect a pressure difference between the first pressure sensor and the second pressure sensor.

  19. A Remote Access Training System for the Detection of Colorectal Polyps at Computed

    E-Print Network [OSTI]

    Whelan, Paul F.

    A Remote Access Training System for the Detection of Colorectal Polyps at Computed Tomography that have the relevant CTC training. We have developed a novel remote access system for CTC training. Our of our remote access CTC training system. The evaluation of the system is also discussed

  20. The Nuclear Detonation Detection System on the GPS satellites

    SciTech Connect (OSTI)

    Higbie, P.R. [Los Alamos National Lab., NM (United States); Blocker, N.K. [Sandia National Labs., Albuquerque, NM (United States)

    1993-07-27T23:59:59.000Z

    This article begins with a historical perspective of satellite usage in monitoring nuclear detonations. Current capabilities of the 24 GPS satellites in detecting the light, gamma rays, x-rays and neutrons from a nuclear explosion are described. In particular, an optical radiometer developed at Sandia National Laboratories is characterized. Operational information and calibration procedures are emphasized.

  1. Data error detection and device controller failure detection in an input/output system

    SciTech Connect (OSTI)

    Katzman, J.A.; Bartlett, J.F.; Bixler, R.M.; Davidow, W.H.; Despotakis, J.A.; Graziano, P.J.; Green, M.D.; Greig, D.A.; Hayashi, S.J.; Mackie, D.R.

    1987-06-09T23:59:59.000Z

    This patent describes an input/output system for a multiprocessor system of the kind in which separate processor modules are interconnected for parallel processing, each of the processor modules having a central processing unit and a memory, at least some of the processor modules having an input/output channel, the input/output system comprising, at least one device controller for controlling the transfer of data between multiple different ones of the processor modules and a peripheral device.

  2. EDDY CURRENT SYSTEM FOR DETECTION OF CRACKING BENEATH BRAIDING IN CORRUGATED METAL HOSE

    SciTech Connect (OSTI)

    Wincheski, Buzz [NASA Langley Research Center, Hampton, VA 23681 (United States); Simpson, John [Lockheed Martin Space Operations, Hampton, VA 23681 (United States); Hall, George [George Washington University, Washington, D.C. 20052 (United States)

    2009-03-03T23:59:59.000Z

    In this paper an eddy current system for the detection of partially-through-the-thickness cracks in corrugated metal hose is presented. Design criteria based upon the geometry and conductivity of the part are developed and applied to the fabrication of a prototype inspection system. Experimental data are used to highlight the capabilities of the system and an image processing technique is presented to improve flaw detection capabilities. A case study for detection of cracking damage in a space shuttle radiator retract flex hoses is also presented.

  3. Systems and methods of detecting force and stress using tetrapod nanocrystal

    DOE Patents [OSTI]

    Choi, Charina L.; Koski, Kristie J.; Sivasankar, Sanjeevi; Alivisatos, A. Paul

    2013-08-20T23:59:59.000Z

    Systems and methods of detecting force on the nanoscale including methods for detecting force using a tetrapod nanocrystal by exposing the tetrapod nanocrystal to light, which produces a luminescent response by the tetrapod nanocrystal. The method continues with detecting a difference in the luminescent response by the tetrapod nanocrystal relative to a base luminescent response that indicates a force between a first and second medium or stresses or strains experienced within a material. Such systems and methods find use with biological systems to measure forces in biological events or interactions.

  4. An adaptive algorithm for the detection of high impedance faults on power distribution systems

    E-Print Network [OSTI]

    McCall, Kurt Eric

    1990-01-01T23:59:59.000Z

    of Science in Electrical Engineering. The objective is to design an adaptive algorithm that will automatically detect high impedance faults on a utility power distribution line or in other power systems. The algorithm is efficient enough to perform... it is impossible to have personnel continuously monitor many lines to detect these situations, an automated solution is needed. A fault detection device will have to be able to recognize abnormal situations by monitoring the electrical condition of the lines...

  5. Circuitry, systems and methods for detecting magnetic fields

    DOE Patents [OSTI]

    Kotter, Dale K. (Shelley, ID) [Shelley, ID; Spencer, David F. (Idaho Falls, ID) [Idaho Falls, ID; Roybal, Lyle G. (Idaho Falls, ID) [Idaho Falls, ID; Rohrbaugh, David T. (Idaho Falls, ID) [Idaho Falls, ID

    2010-09-14T23:59:59.000Z

    Circuitry for detecting magnetic fields includes a first magnetoresistive sensor and a second magnetoresistive sensor configured to form a gradiometer. The circuitry includes a digital signal processor and a first feedback loop coupled between the first magnetoresistive sensor and the digital signal processor. A second feedback loop which is discrete from the first feedback loop is coupled between the second magnetoresistive sensor and the digital signal processor.

  6. Project of the underwater system for chemical threat detection

    E-Print Network [OSTI]

    Silarski, M; Moskal, P; Smolis, M; Tadeja, S

    2015-01-01T23:59:59.000Z

    In this article we describe a novel method for the detection of explosives and other hazardous substances in the marine environment using neutron activation. Unlike the other considered methods based on this technique we propose to use guides forneutron and gamma quanta which speeds up and simplifies identification. Moreover, it may provide a determination of the density distribution of a dangerous substance. First preliminary results of Monte Carlo simulations dedicated for design of a device exploiting this method are also presented.

  7. Illicit substance detection using fast-neutron interrogation systems

    SciTech Connect (OSTI)

    Yule, T.J.; Micklich, B.J.; Fink, C.L.; Smith, D.L.

    1994-06-01T23:59:59.000Z

    Fast-neutron interrogation techniques are of interest for detecting illicit substances such as explosives and drugs because of their ability to identify light elements such as carbon, nitrogen, and oxygen, which are the primary constituents of these materials. Two particular techniques, Fast-Neutron Transmission Spectroscopy and Pulsed Fast-Neutron Analysis, are discussed. Examples of modeling studies are provided which illustrate the applications of these two techniques.

  8. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design

    E-Print Network [OSTI]

    Pasqualetti, Fabio; Bullo, Francesco

    2012-01-01T23:59:59.000Z

    Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone to malicious attacks so that specific analysis tools and monitoring mechanisms need to be developed to enforce system security and reliability. This paper builds upon the results presented in our companion paper [1] and proposes centralized and distributed monitors for attack detection and identification. First, we design optimal centralized attack detection and identification monitors. Optimality refers to the ability of detecting (respectively identifying) every detectable (respectively identifiable) attack. Second, we design an optimal distributed attack detection filter based upon a waveform relaxation technique. Third, we show that the attack identification problem is computationally hard, and we design a sub-optimal distributed attack identification procedure with performance guarantees. Finally, we illustr...

  9. Decentralized Fault Detection and Isolation in Wireless Structural Health Monitoring Systems using Analytical Redundancy

    E-Print Network [OSTI]

    Stanford University

    1/43 Decentralized Fault Detection and Isolation in Wireless Structural Health Monitoring Systems when deploying wireless sensor networks for long-term structural health monitoring (SHM) is the correct Fault detection and isolation, structural health monitoring, wireless sensing, smart structures

  10. Evaluation of Cost Effective Sensor Combinations for a Vehicle Precrash Detection System

    E-Print Network [OSTI]

    Birdsong, Charles

    Evaluation of Cost Effective Sensor Combinations for a Vehicle Precrash Detection System John the occurrence of an accident before it occurs. There are many different sensor technologies currently available for pre-crash detection. However no single sensor technology has demonstrated enough information gathering

  11. attack detection system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    is presented Autonoma de Madrid, Universidad 51 Stealthy Deception Attacks on Water SCADA Systems Computer Technologies and Information Sciences Websites Summary: (more than...

  12. Optically Detected Magnetic Resonance Studies on ?-conjugated semiconductor systems

    SciTech Connect (OSTI)

    Chen, Ying

    2011-12-06T23:59:59.000Z

    Optically Detected Magnetic Resonance (ODMR) techniques were used to investigate the dynamics of excitons and charge carriers in ?-conjugated organic semiconductors. Degradation behavior of the negative spin-1/2 electroluminescence-detected magnetic resonance (ELDMR) was observed in Alq3 devices. The increase in the resonance amplitude implies an increasing bipolaron formation during degradation, which might be the result of growth of charge traps in the device. The same behavior of the negative spin-1/2 ELDMR was observed in 2wt% Rubrene doped Tris(8-hydroxyquinolinato)aluminium (Alq3) devices. However, with increasing injection current, a positive spin-1/2 ELDMR, together with positive spin 1 triplet powder patterns at {delta}m{sub S}={+-}1 and {delta}m{sub S}={+-}2, emerges. Due to the similarities in the frequency dependences of single and double modulated ELDMR and the photoluminescence-detected magnetic resonance (PLDMR) results in poly[2-methoxy-5-(2 -ethyl-hexyloxy)-1,4-phenyl ene vinylene] (MEH-PPV) films, the mechanism for this positive spin-1/2 ELDMR was assigned to enhanced triplet-polaron quenching under resonance conditions. The ELDMR in rubrene doped Alq3 devices provides a path to investigate charge distribution in the device under operational conditions. Combining the results of several devices with different carrier blocking properties and the results from transient EL, it was concluded trions not only exist near buffer layer but also exist in the electron transport layer. This TPQ model can also be used to explain the positive spin-1/2 PLDMR in poly(3-hexylthiophene) (P3HT) films at low temperature and in MEH-PPV films at various temperatures up to room temperature. Through quantitative analysis, TE-polaron quenching (TPQ) model is shown having the ability to explain most behaviors of the positive spin-1/2 resonance. Photocurrent detected magnetic resonance (PCDMR) studies on MEH-PPV devices revealed a novel transient resonance signal. The signal may originate from the higher concentration of deep traps near cathode. A quantitative analysis based on this assumption was carried out and found to be consistent with the experimental results.

  13. FUEGO — Fire Urgency Estimator in Geosynchronous Orbit — A Proposed Early-Warning Fire Detection System

    E-Print Network [OSTI]

    Kelly, Maggi

    2013-01-01T23:59:59.000Z

    A Proposed Early-Warning Fire Detection System Carlton R.ability of a system to provide early outbreak warnings toearly-warning satellite, and then, using existing archival images of relevant background scenes and fires, have tested our algorithms and systems

  14. Using Explicit and Machine-Understandable Engineering Knowledge for Defect Detection in Automation Systems Engineering

    E-Print Network [OSTI]

    industrial complexes are very high. Traditional approaches for defect detection in automation systems and data models which are used within the engineering of industrial automation systems. Thus, some defects Nowadays, industrial automation systems have tendencies to become more and more complex and large

  15. A Multimodal Fuzzy Inference System Using a Continuous Facial Expression Representation for Emotion Detection

    E-Print Network [OSTI]

    Pelachaud, Catherine

    Pro- cessing and Computer Vision]: Image Representation; I.5.1 [Pattern Recognition]: ModelsA Multimodal Fuzzy Inference System Using a Continuous Facial Expression Representation for Emotion a multimodal fuzzy inference system for emotion detection. The system extracts and merges visual, acoustic

  16. The detection, prevention and mitigation of cascading outages in the power system

    E-Print Network [OSTI]

    Song, Hongbiao

    2009-05-15T23:59:59.000Z

    This dissertation studies the causes and mechanism of power system cascading outages and develops new methods and new tools to help detect, prevent and mitigate the outages. Three effective solutions: a steady state control scheme, a transient...

  17. Incipient fault detection and identification in process systems using artificial neural networks

    E-Print Network [OSTI]

    Muthusami, Jayakumar

    1992-01-01T23:59:59.000Z

    INCIPIENT FAULT DETECTION AND IDENTIFICATION IN PROCESS SYSTEMS USING ARTIFICIAL NEURAL NETWORKS A Thesis by JAYAKUMAR MUTHUSAMI Submitted to the Office of Graduate Studies of Texas A@M University in partial fulfillment of the requirements... for the degree of MASTER OF SCIENCE December 1992 Major Subject: Mechanical Engineering INCIPIENT FAULT DETECTION AND IDENTIFICATION IN PROCESS SYSTEMS USING ARTIFICIAL NEURAL NETWORKS A Thesis JAYAKHMAH MUTHTJSAMI Approved a. s to style and content, by...

  18. Design and evaluation of the ReKon : an integrated detection and assessment perimeter system.

    SciTech Connect (OSTI)

    Dabling, Jeffrey Glenn; Andersen, Jason Jann; McLaughlin, James O. [Stonewater Control Systems, Inc., Kannapolis, NC

    2013-02-01T23:59:59.000Z

    Kontek Industries (Kannapolis, NC) and their subsidiary, Stonewater Control Systems (Kannapolis, NC), have entered into a cooperative research and development agreement with Sandia to jointly develop and evaluate an integrated perimeter security system solution, one that couples access delay with detection and assessment. This novel perimeter solution was designed to be configurable for use at facilities ranging from high-security military sites to commercial power plants, to petro/chemical facilities of various kinds. A prototype section of the perimeter has been produced and installed at the Sandia Test and Evaluation Center in Albuquerque, NM. This prototype system integrated fiber optic break sensors, active infrared sensors, fence disturbance sensors, video motion detection, and ground sensors. This report documents the design, testing, and performance evaluation of the developed ReKon system. The ability of the system to properly detect pedestrian or vehicle attempts to bypass, breach, or otherwise defeat the system is characterized, as well as the Nuisance Alarm Rate.

  19. Leak detection systems for uranium mill tailings impoundments with synthetic liners

    SciTech Connect (OSTI)

    Myers, D.A.; Tyler, S.W.; Gutknecht, P.J.; Mitchell, D.H.

    1983-09-01T23:59:59.000Z

    This study evaluated the performance of existing and alternative leak detection systems for lined uranium mill tailings ponds. Existing systems for detecting leaks at uranium mill tailings ponds investigated in this study included groundwater monitoring wells, subliner drains, and lysimeters. Three alternative systems which demonstrated the ability to locate leaks in bench-scale tests included moisture blocks, soil moisture probes, and a soil resistivity system. Several other systems in a developmental stage are described. For proper performance of leak detection systems (other than groundwater wells and lysimeters), a subgrade is required which assures lateral dispersion of a leak. Methods to enhance dispersion are discussed. Cost estimates were prepared for groundwater monitoring wells, subliner drain systems, and the three experimental systems. Based on the results of this report, it is suggested that groundwater monitoring systems be used as the primary means of leak detection. However, if a more responsive system is required due to site characteristics and groundwater quality criteria, subliner drains are applicable for ponds with uncovered liners. Leak-locating systems for ponds with covered liners require further development. Other recommendations are discussed in the report.

  20. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    SciTech Connect (OSTI)

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01T23:59:59.000Z

    Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  1. Detecting and tolerating Byzantine faults in database systems

    E-Print Network [OSTI]

    Vandiver, Benjamin Mead, 1978-

    2008-01-01T23:59:59.000Z

    This thesis describes the design, implementation, and evaluation of a replication scheme to handle Byzantine faults in transaction processing database systems. The scheme compares answers from queries and updates on multiple ...

  2. Detecting and Tolerating Byzantine Faults in Database Systems

    E-Print Network [OSTI]

    Vandiver, Benjamin Mead

    2008-06-30T23:59:59.000Z

    This thesis describes the design, implementation, and evaluation of a replication scheme to handle Byzantine faults in transaction processing database systems. The scheme compares answers from queries and updates on multiple ...

  3. Robot design for leak detection in water-pipe systems

    E-Print Network [OSTI]

    Choi, Changrak

    2012-01-01T23:59:59.000Z

    Leaks are major problem that occur in the water pipelines all around the world. Several reports indicate loss of around 20 to 30 percent of water in the distribution of water through water pipe systems. Such loss of water ...

  4. Simulation and modeling for the stand-off radiation detection system (SORDS) using GEANT4

    SciTech Connect (OSTI)

    Hoover, Andrew S [Los Alamos National Laboratory; Wallace, Mark [Los Alamos National Laboratory; Galassi, Mark [Los Alamos National Laboratory; Mocko, Michal [Los Alamos National Laboratory; Palmer, David [Los Alamos National Laboratory; Schultz, Larry [Los Alamos National Laboratory; Tornga, Shawn [Los Alamos National Laboratory

    2009-01-01T23:59:59.000Z

    A Stand-Off Radiation Detection System (SORDS) is being developed through a joint effort by Raytheon, Los Alamos National Laboratory, Bubble Technology Industries, Radiation Monitoring Devices, and the Massachusetts Institute of Technology, for the Domestic Nuclear Detection Office (DNDO). The system is a mobile truck-based platform performing detection, imaging, and spectroscopic identification of gamma-ray sources. A Tri-Modal Imaging (TMI) approach combines active-mask coded aperture imaging, Compton imaging, and shadow imaging techniques. Monte Carlo simulation and modeling using the GEANT4 toolkit was used to generate realistic data for the development of imaging algorithms and associated software code.

  5. Radiation detection system for portable gamma-ray spectroscopy

    DOE Patents [OSTI]

    Rowland, Mark S. (Alamo, CA); Howard, Douglas E. (Livermore, CA); Wong, James L. (Dublin, CA); Jessup, James L. (Tracy, CA); Bianchini, Greg M. (Livermore, CA); Miller, Wayne O. (Livermore, CA)

    2006-06-20T23:59:59.000Z

    A portable gamma ray detection apparatus having a gamma ray detector encapsulated by a compact isolation structure having at least two volumetrically-nested enclosures where at least one is a thermal shield. The enclosures are suspension-mounted to each other to successively encapsulate the detector without structural penetrations through the thermal shields. A low power cooler is also provided capable of cooling the detector to cryogenic temperatures without consuming cryogens, due to the heat load reduction by the isolation structure and the reduction in the power requirements of the cooler. The apparatus also includes a lightweight portable power source for supplying power to the apparatus, including to the cooler and the processing means, and reducing the weight of the apparatus to enable handheld operation or toting on a user's person.

  6. From Measurements to Sustainable Choices: Non-intrusive Fine-grained Sensing of Resource Usage in Buildings

    E-Print Network [OSTI]

    Jalali. Bahram

    From Measurements to Sustainable Choices: Non-intrusive Fine- grained Sensing of Resource Usage. Example pictures of non-intrusive pipe level water monitoring test-bed and non- intrusive appliance power

  7. Power System Extreme Event Detection: The VulnerabilityFrontier

    SciTech Connect (OSTI)

    Lesieutre, Bernard C.; Pinar, Ali; Roy, Sandip

    2007-10-17T23:59:59.000Z

    In this work we apply graph theoretic tools to provide aclose bound on a frontier relating the number of line outages in a gridto the power disrupted by the outages. This frontier describes theboundary of a space relating the possible severity of a disturbance interms of power disruption, from zero to some maximum on the boundary, tothe number line outages involved in the event. We present the usefulnessof this analysis with a complete analysis of a 30 bus system, and presentresults for larger systems.

  8. PERFORMANCE OF A NOVEL FAST TRANSIENTS DETECTION SYSTEM

    SciTech Connect (OSTI)

    Clarke, Nathan [ICRAR/Curtin University, Bentley, WA 6845 (Australia)] [ICRAR/Curtin University, Bentley, WA 6845 (Australia); Macquart, Jean-Pierre; Trott, Cathryn, E-mail: N.Clarke@curtin.edu.au [ARC Centre of Excellence for All-Sky Astrophysics (CAASTRO) (Australia)] [ARC Centre of Excellence for All-Sky Astrophysics (CAASTRO) (Australia)

    2013-03-01T23:59:59.000Z

    We investigate the signal-to-noise ratio (S/N) of a new incoherent dedispersion algorithm optimized for FPGA-based architectures intended for deployment on the Australian SKA Pathfinder and other Square Kilometre Array precursors for fast transients surveys. Unlike conventional CPU- and GPU-optimized incoherent dedispersion algorithms, this algorithm has the freedom to maximize the S/N by way of programmable dispersion profiles that enable the inclusion of different numbers of time samples per spectral channel. This allows, for example, more samples to be summed at lower frequencies where intra-channel dispersion smearing is larger, or it could even be used to optimize the dedispersion sum for steep spectrum sources. Our analysis takes into account the intrinsic pulse width, scatter broadening, spectral index and dispersion measure of the signal, and the system's frequency range, spectral and temporal resolution, and number of trial dedispersions. We show that the system achieves better than 80% of the optimal S/N where the temporal resolution and the intra-channel smearing time are smaller than a quarter of the average width of the pulse across the system's frequency band (after including scatter smearing). Coarse temporal resolutions suffer a {Delta}t {sup -1/2} decay in S/N, and coarse spectral resolutions cause a {Delta}{nu}{sup -1/2} decay in S/N, where {Delta}t and {Delta}{nu} are the temporal and spectral resolutions of the system, respectively. We show how the system's S/N compares with that of matched filter and boxcar filter detectors. We further present a new algorithm for selecting trial dispersion measures for a survey that maintains a given minimum S/N performance across a range of dispersion measures.

  9. To provide high dependability in a multithreaded system despite hardware faults, the system must detect and cor-

    E-Print Network [OSTI]

    Balasubramonian, Rajeev

    , the system must detect and cor- rect errors in its shared memory system. Recent research has explored dynamic the commodity computing market. Second, the industrial roadmap [7] and recent research [17] fore- cast increases susceptible to having their charges dis- rupted by alpha particles or cosmic radiation [21]. Many researchers

  10. Submission to International Journal of Control, Automation and Systems Vol. , No. , 1 Robust Fault Detection and Estimation for Descriptor Systems

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    in a large class of technical process like mechanical, electrical and chemical systems [3,17]. With regard of the proposed fault detection and estimation method is successfully applied to an electrical circuit. Keywords lead to significant performance degradation, serious system damages and even loss of human life

  11. Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge

    SciTech Connect (OSTI)

    Ondrej Linda; Todd Vollmer; Milos Manic

    2012-08-01T23:59:59.000Z

    The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

  12. A new technique for non-intrusive in situ measurements of symbiotic

    E-Print Network [OSTI]

    Ilan, Micha

    A new technique for non-intrusive in situ measurements of symbiotic photosynthesis Symbiotic algae the Diving-PAM for underwater photosynthetic measurements lies in the method's non-intrusive nature

  13. AN IMPROVED SOFT FEEDBACK V-BLAST DETECTION TECHNIQUE FOR TURBO-MIMO SYSTEMS

    E-Print Network [OSTI]

    Singer, Andrew C

    AN IMPROVED SOFT FEEDBACK V-BLAST DETECTION TECHNIQUE FOR TURBO-MIMO SYSTEMS Jun Won Choi*, Andrew-demapper) and the channel decoder exchange soft (extrinsic) information to iteratively improve system perfor- mance. Hence In this paper, an improved minimum mean square error (MMSE) soft feedback detector, called the soft input, soft

  14. Low-cost multispectral vegetation imaging system for detecting leaking CO2 gas

    E-Print Network [OSTI]

    Shaw, Joseph A.

    Low-cost multispectral vegetation imaging system for detecting leaking CO2 gas Justin A. Hogan,1 sequestration sites for possible leaks of the CO2 gas from underground reservoirs, a low-cost multispectral are then flagged for closer inspection with in-situ CO2 sensors. The system is entirely self

  15. Malicious Code Execution Detection and Response Immune System inpired by the Danger Theory

    E-Print Network [OSTI]

    Aickelin, Uwe

    Malicious Code Execution Detection and Response Immune System inpired by the Danger Theory Jungwon an artificial immune system. A recently developed hypothesis in immunology, the Danger The- ory, states that our invaders, plus signals generated by the host indic- ating danger and damage. We propose the incorporation

  16. FAILURE DETECTION ROUTINE FOR GRID CONNECTED PV SYSTEMS AS PART OF THE PVSAT-2 PROJECT

    E-Print Network [OSTI]

    Heinemann, Detlev

    Dept. Of Electrical Engineering, University of Applied Science (FH) Magdeburg-Stendal. D-39114 failures, e.g. shading, string or module failure, part time outages, snow cover, soiling and wrong inverter, the maintenance effort of PV systems is reduced und system outage time is minimised. The Failure Detection Routine

  17. An expert system for detecting automobile insurance fraud using social network analysis

    E-Print Network [OSTI]

    Šubelj, Lovro; Bajec, Marko; 10.1016/j.eswa.2010.07.143

    2011-01-01T23:59:59.000Z

    The article proposes an expert system for detection, and subsequent investigation, of groups of collaborating automobile insurance fraudsters. The system is described and examined in great detail, several technical difficulties in detecting fraud are also considered, for it to be applicable in practice. Opposed to many other approaches, the system uses networks for representation of data. Networks are the most natural representation of such a relational domain, allowing formulation and analysis of complex relations between entities. Fraudulent entities are found by employing a novel assessment algorithm, \\textit{Iterative Assessment Algorithm} (\\textit{IAA}), also presented in the article. Besides intrinsic attributes of entities, the algorithm explores also the relations between entities. The prototype was evaluated and rigorously analyzed on real world data. Results show that automobile insurance fraud can be efficiently detected with the proposed system and that appropriate data representation is vital.

  18. An expert system for fault detection and diagnosis

    E-Print Network [OSTI]

    Spasojevic, Predrag

    1992-01-01T23:59:59.000Z

    to thank Dr. Ali Abur for his help in setting Eb1TP simulations. I would also lilre to thank Charles Fromen and Don Sevcik both with HLtrP Houston for providing invaluable expertise used in this thesis. TABLE OF CONTENTS CHAPTER Page INTRODUCTION . A... IV EXPERT SYSTEM DESIGN . . A. Introduction B. Rochester DFR Conversion C. EMTP Output File Conversion 46 46 47 54 vn1 CHAPTER Page VI D. Signal Analysis: MATI, AB . E. Fault Diagnosis: CLIPS F. Waveform Presentation: MATLAB G...

  19. Imaging System With Confocally Self-Detecting Laser.

    DOE Patents [OSTI]

    Webb, Robert H. (Lincoln, MA); Rogomentich, Fran J. (Concord, MA)

    1996-10-08T23:59:59.000Z

    The invention relates to a confocal laser imaging system and method. The system includes a laser source, a beam splitter, focusing elements, and a photosensitive detector. The laser source projects a laser beam along a first optical path at an object to be imaged, and modulates the intensity of the projected laser beam in response to light reflected from the object. A beam splitter directs a portion of the projected laser beam onto a photodetector. The photodetector monitors the intensity of laser output. The laser source can be an electrically scannable array, with a lens or objective assembly for focusing light generated by the array onto the object of interest. As the array is energized, its laser beams scan over the object, and light reflected at each point is returned by the lens to the element of the array from which it originated. A single photosensitive detector element can generate an intensity-representative signal for all lasers of the array. The intensity-representative signal from the photosensitive detector can be processed to provide an image of the object of interest.

  20. Statistically qualified neuro-analytic failure detection method and system

    DOE Patents [OSTI]

    Vilim, Richard B. (Aurora, IL); Garcia, Humberto E. (Idaho Falls, ID); Chen, Frederick W. (Naperville, IL)

    2002-03-02T23:59:59.000Z

    An apparatus and method for monitoring a process involve development and application of a statistically qualified neuro-analytic (SQNA) model to accurately and reliably identify process change. The development of the SQNA model is accomplished in two stages: deterministic model adaption and stochastic model modification of the deterministic model adaptation. Deterministic model adaption involves formulating an analytic model of the process representing known process characteristics, augmenting the analytic model with a neural network that captures unknown process characteristics, and training the resulting neuro-analytic model by adjusting the neural network weights according to a unique scaled equation error minimization technique. Stochastic model modification involves qualifying any remaining uncertainty in the trained neuro-analytic model by formulating a likelihood function, given an error propagation equation, for computing the probability that the neuro-analytic model generates measured process output. Preferably, the developed SQNA model is validated using known sequential probability ratio tests and applied to the process as an on-line monitoring system. Illustrative of the method and apparatus, the method is applied to a peristaltic pump system.

  1. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    SciTech Connect (OSTI)

    Feero, Amie J. [Washington River Protection Systems, Richland, WA (United States); Washenfelder, Dennis J. [Washington River Protection Systems, Richland, WA (United States); Johnson, Jeremy M. [USDOE Office of River Protection, Richland, WA (United States); Schofield, John S. [Washington River Protection Systems, Richland, WA (United States)

    2013-11-14T23:59:59.000Z

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106.

  2. Efficient model-based leak detection in boiler steam-water systems Xi Sun, Tongwen Chen *, Horacio J. Marquez

    E-Print Network [OSTI]

    Marquez, Horacio J.

    Efficient model-based leak detection in boiler steam-water systems Xi Sun, Tongwen Chen *, Horacio detection in boiler steam-water systems. The algorithm has been tested using real industrial data from Syncrude Canada, and has proven to be effective in detection of boiler tube or steam leaks; proper

  3. Photostimulated phosphor based image plate detection system for HRVUV beamline at Indus-1 synchrotron radiation source

    E-Print Network [OSTI]

    Haris, K; Shastri, Aparna; K., Sunanda; K., Babita; Rao, S V N Bhaskara; Ahmad, Shabbir; Tauheed, A

    2014-01-01T23:59:59.000Z

    A high resolution vacuum ultraviolet (HRVUV) beamline based on a 6.65 meter off-plane Eagle spectrometer is in operation at the Indus-1 synchrotron radiation source, RRCAT, Indore, India. To facilitate position sensitive detection and fast spectral recording, a new BaFBr:Eu2+ phosphor based image plate (IP) detection system interchangeable with the existing photomultiplier (PMT) scanning system has been installed on this beamline. VUV photoabsorption studies on Xe, O2, N2O and SO2 are carried out to evaluate the performance of the IP detection system. An FWHM of ~ 0.5 {\\AA} is achieved for the Xe atomic line at 1469.6 {\\AA}. Reproducibility of spectra is found to be within the experimental resolution. Compared to the PMT scanning system, the IP shows several advantages in terms of sensitivity, recording time and S/N ratio, which are highlighted in the paper. This is the first report of incorporation of an IP detection system in a VUV beamline using synchrotron radiation. Commissioning of the new detection sys...

  4. Ultrasonic imaging system for in-process fabric defect detection

    DOE Patents [OSTI]

    Sheen, Shuh-Haw (Naperville, IL); Chien, Hual-Te (Naperville, IL); Lawrence, William P. (Downers Grove, IL); Raptis, Apostolos C. (Downers Grove, IL)

    1997-01-01T23:59:59.000Z

    An ultrasonic method and system are provided for monitoring a fabric to identify a defect. A plurality of ultrasonic transmitters generate ultrasonic waves relative to the fabric. An ultrasonic receiver means responsive to the generated ultrasonic waves from the transmitters receives ultrasonic waves coupled through the fabric and generates a signal. An integrated peak value of the generated signal is applied to a digital signal processor and is digitized. The digitized signal is processed to identify a defect in the fabric. The digitized signal processing includes a median value filtering step to filter out high frequency noise. Then a mean value and standard deviation of the median value filtered signal is calculated. The calculated mean value and standard deviation are compared with predetermined threshold values to identify a defect in the fabric.

  5. Non-Intrusive Design of Concurrently Self-Testable FSMs Petros Drineas

    E-Print Network [OSTI]

    Drineas, Petros

    Non-Intrusive Design of Concurrently Self-Testable FSMs Petros DrineasŁ and Yiorgos Makris.makris @yale.edu Abstract We propose a methodology for non-intrusive design of concurrently self-testable FSMs parity-based state encoding, the proposed method is non-intrusive and does not interfere

  6. Non-intrusive coupling: an attempt to merge industrial and research software capabilities

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Non-intrusive coupling: an attempt to merge industrial and research software capabilities Olivier features required for "real-life" industrial simulations. Non-intrusive coupling is a tentative answer are the basis of most indus- trial computational environments. Non-intrusive coupling [11, 12] is a tentative

  7. Supporting Empirical Studies by Non-Intrusive Collection and Visualization of Fine-Grained Revision History

    E-Print Network [OSTI]

    Robillard, Martin

    Supporting Empirical Studies by Non-Intrusive Collection and Visualization of Fine-Grained Revision in empirical studies of pro- grammers. The revision history is collected non-intrusively, and does not depend. Studying these activities for the sake of finding patterns and analyzing their nature requires non-intrusive

  8. Using Hidden Markov Models for Iterative Non-intrusive Appliance Monitoring

    E-Print Network [OSTI]

    Southampton, University of

    Using Hidden Markov Models for Iterative Non-intrusive Appliance Monitoring Oliver Parson, Hampshire, SO17 1BJ, UK {op106,sg2,mjw,acr}@ecs.soton.ac.uk Abstract Non-intrusive appliance load monitoring appliances. 1 Introduction Non-intrusive appliance load monitoring (NIALM), or energy disaggregation, aims

  9. Non-intrusive coupling: an attempt to merge industrial and research software capabilities

    E-Print Network [OSTI]

    Non-intrusive coupling: an attempt to merge industrial and research software capabilities Olivier features required for "real-life" industrial simulations. Non-intrusive coupling is a tentative answer indus- trial computational environments. Non-intrusive coupling [11, 12] is a tentative answer

  10. A non-intrusive stochastic Galerkin approach for modeling uncertainty propagation in

    E-Print Network [OSTI]

    Zabaras, Nicholas J.

    A non-intrusive stochastic Galerkin approach for modeling uncertainty propagation in deformation or significant additions. In this paper we present an approach called Non-Intrusive Stochastic Galerkin (NISG-Carlo based stochastic analysis of de- formation process although relatively non-intrusive and trivial

  11. Method and apparatus for operating a powertrain system upon detecting a stuck-closed clutch

    DOE Patents [OSTI]

    Hansen, R. Anthony

    2014-02-18T23:59:59.000Z

    A powertrain system includes a multi-mode transmission having a plurality of torque machines. A method for controlling the powertrain system includes identifying all presently applied clutches including commanded applied clutches and the stuck-closed clutch upon detecting one of the torque-transfer clutches is in a stuck-closed condition. A closed-loop control system is employed to control operation of the multi-mode transmission accounting for all the presently applied clutches.

  12. Method and apparatus for detecting timing errors in a system oscillator

    DOE Patents [OSTI]

    Gliebe, Ronald J. (Library, PA); Kramer, William R. (Bethel Park, PA)

    1993-01-01T23:59:59.000Z

    A method of detecting timing errors in a system oscillator for an electronic device, such as a power supply, includes the step of comparing a system oscillator signal with a delayed generated signal and generating a signal representative of the timing error when the system oscillator signal is not identical to the delayed signal. An LED indicates to an operator that a timing error has occurred. A hardware circuit implements the above-identified method.

  13. Estimation of thermo-hydrodynamic parameters in energy production systems using non-stationary

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . The construction of such systems, as well as the operating conditions, impose the use of non-intrusive techniques of the propagation times. Keywords: Non-intrusive measurement, ultrasounds, temperature and flow rate estimation by the fact that it must work while the system is on, and without affecting its functioning. A non-intrusive

  14. Innovative Gamma Ray Spectrometer Detection Systems for Conducting Scanning Surveys on Challenging Terrain - 13583

    SciTech Connect (OSTI)

    Palladino, Carl; Mason, Bryan; Engle, Matt; LeVangie, James [The Palladino Company, Inc., 720 Fillmore St., San Francisco, CA 94117 (United States)] [The Palladino Company, Inc., 720 Fillmore St., San Francisco, CA 94117 (United States); Dempsey, Gregg [United States Environmental Protection Agency, P.O. Box 98517, Las Vegas, NV 89193-8517 (United States)] [United States Environmental Protection Agency, P.O. Box 98517, Las Vegas, NV 89193-8517 (United States); Klemovich, Ron [HydroGeoLogic, Inc., 6340 Glenwood, Suite 200, Building No. 7, Overland Park, KS 66202 (United States)] [HydroGeoLogic, Inc., 6340 Glenwood, Suite 200, Building No. 7, Overland Park, KS 66202 (United States)

    2013-07-01T23:59:59.000Z

    The Santa Susana Field Laboratory located near Simi Valley, California was investigated to determine the nature and extent of gamma radiation anomalies. The primary objective was to conduct gamma scanning surveys over 100 percent of the approximately 1,906,000 square meters (471 acre) project site with the most sensitive detection system possible. The site had challenging topography that was not conducive to traditional gamma scanning detection systems. Terrain slope varied from horizontal to 48 degrees and the ground surface ranged from flat, grassy meadows to steep, rocky hillsides. In addition, the site was home to many protected endangered plant and animal species, and archaeologically significant sites that required minimal to no disturbance of the ground surface. Therefore, four innovative and unique gamma ray spectrometer detection systems were designed and constructed to successfully conduct gamma scanning surveys of approximately 1,076,000 square meters (266 acres) of the site. (authors)

  15. Network Anomaly Detection: Flow-based or Packet-based Approach?

    E-Print Network [OSTI]

    Nguyen, Huy

    2010-01-01T23:59:59.000Z

    One of the most critical tasks for network administrator is to ensure system uptime and availability. For the network security, anomaly detection systems, along with firewalls and intrusion prevention systems are the must-have tools. So far in the field of network anomaly detection, people are working on two different approaches. One is flow-based; usually rely on network elements to make so-called flow information available for analysis. The second approach is packet-based; which directly analyzes the data packet information for the detection of anomalies. This paper describes the main differences between the two approaches through an in-depth analysis. We try to answer the question of when and why an approach is better than the other. The answer is critical for network administrators to make their choices in deploying a defending system, securing the network and ensuring business continuity.

  16. Detection and location of mechanical system degradation by using detector signal noise data

    SciTech Connect (OSTI)

    Damiano, B.; Blakeman, E.D.; Phillips, L.D.

    1994-06-01T23:59:59.000Z

    This report describes the investigation of a diagnostic method for detecting and locating the source of structural degradation in mechanical systems. The goal of this investigation was to determine whether the diagnostic method would be practically and successfully applied to detect and locate structural changes in a mechanical system. The diagnostic method uses a mathematical model of the mechanical system to define relationships between system parameters, such as spring rates and damping rates, and measurable spectral features, such as natural frequencies and mode shapes. These model-defined relationships are incorporated into a neural network, which is used to relate measured spectral features to system parameters. The diagnosis of the system`s condition is performed by presenting the neural network with measured spectral features and comparing the system parameters estimated by the neural network to previously estimated values. Changes in the estimated system parameters indicate the location and severity of degradation in the mechanical system. The investigation involved applying the method by using computer-simulated data and data collected from a bench-top mechanical system. The effects of neural network training set size and composition on the accuracy of the model parameter estimates were investigated by using computer-simulated data. The measured data were used to demonstrate that the method can be applied to estimate the parameters of a {open_quotes}real{close_quotes} mechanical system. The results show that this diagnostic method can be applied to successfully locate and estimate the magnitude of structural changes in a mechanical system. The average error in the estimated spring rate values of the bench-top mechanical system was approximately 5 to 10%. This degree of accuracy is sufficient to permit the use of this method for detecting and locating structural degradation in mechanical systems.

  17. An evaluation of various types of fire detection alarm systems to awaken the elderly

    E-Print Network [OSTI]

    Townley, Timothy Edward

    1985-01-01T23:59:59.000Z

    AN EVALUATION OF VARIOUS TYPES OF FIRE DETECTION ALARM SYSTEMS TO AWAKEN THE ELDERLY A Thesis by 1'IMOTHY EDWARD TOWNLEY Submitted to the Graduate Co11ege of Texas ASM University in partia1 fu1fi1 1ment of the requirements for the degree... of MASTER OF SCIENCE August 198S major Sub?'ect: Safety Engineering AN EVALUATION OF VARIOUS TYPES Of FIRE DETECTION ALARM SYSTEMS TO AWAKEN THE ELDERLY A Thesis by TIMOTHY EDWARD TOWNLEY Approved as to style and content by: (Chairm n of Committee...

  18. Method and apparatus for providing pulse pile-up correction in charge quantizing radiation detection systems

    DOE Patents [OSTI]

    Britton, Jr., Charles L. (Alcoa, TN); Wintenberg, Alan L. (Knoxville, TN)

    1993-01-01T23:59:59.000Z

    A radiation detection method and system for continuously correcting the quantization of detected charge during pulse pile-up conditions. Charge pulses from a radiation detector responsive to the energy of detected radiation events are converted to voltage pulses of predetermined shape whose peak amplitudes are proportional to the quantity of charge of each corresponding detected event by means of a charge-sensitive preamplifier. These peak amplitudes are sampled and stored sequentially in accordance with their respective times of occurrence. Based on the stored peak amplitudes and times of occurrence, a correction factor is generated which represents the fraction of a previous pulses influence on a preceding pulse peak amplitude. This correction factor is subtracted from the following pulse amplitude in a summing amplifier whose output then represents the corrected charge quantity measurement.

  19. The HIPROTECT system

    SciTech Connect (OSTI)

    Baker, J.; Modlin, C.W.; Frerking, C.J.

    1993-10-10T23:59:59.000Z

    HIPROTECT (pronounced High-protect) is a system designed to protect national archaeological and natural treasures from destruction by vandals or looters. The system is being developed jointly by the Lawrence Livermore National Laboratory and the University of California at Riverside under the DOD Legacy Resource Management Program. Thousands of archaeological sites are located on military bases and national park lands. Treasure hunters or vandals are pillaging and destroying these sites at will, since the sites are generally located in remote areas, unattended and unprotected. The HIPROTECT system is designed to detect trespassers at the protected sites and to alert park officials or military officials of intrusions. An array of sensors is used to detect trespassers. The sensors are triggered when a person or vehicle approaches the site. Alarm messages are transmitted to alert park officials or law enforcement officials by way of a cellular telephone link. A video and audio system is included to assist the officials in verifying that an intrusion has occurred and to allow two-way communication with the intruders.

  20. Nuclear power plant security systems - The need for upgrades

    SciTech Connect (OSTI)

    Murskyj, M.P.; Furlow, C.H.

    1989-01-01T23:59:59.000Z

    Most perimeter security systems for nuclear power plants were designed and installed in the late 1970s or early 1980s. This paper explores the need to regularly evaluate and possibly upgrade a security system in the area of perimeter intrusion detection and surveillance. this paper discusses US Nuclear Regulatory Commission audits and regulatory effectiveness reviews (RERs), which have raised issues regarding the performance of perimeter security systems. The audits and RERs identified various degrees of vulnerability in certain aspects of existing perimeter security systems. In addition to reviewing the regulatory concerns, this paper discusses other reasons to evaluate and/or upgrade a perimeter security system.

  1. A Data Driven Framework for Real Time Power System Event Detection and Visualization

    E-Print Network [OSTI]

    McCamish, Ben; Landford, Jordan; Bass, Robert; Cotilla-Sanchez, Eduardo; Chiu, David

    2015-01-01T23:59:59.000Z

    Increased adoption and deployment of phasor measurement units (PMU) has provided valuable fine-grained data over the grid. Analysis over these data can provide real-time insight into the health of the grid, thereby improving control over operations. Realizing this data-driven control, however, requires validating, processing and storing massive amounts of PMU data. This paper describes a PMU data management system that supports input from multiple PMU data streams, features an event-detection algorithm, and provides an efficient method for retrieving archival data. The event-detection algorithm rapidly correlates multiple PMU data streams, providing details on events occurring within the power system in real-time. The event-detection algorithm feeds into a visualization component, allowing operators to recognize events as they occur. The indexing and data retrieval mechanism facilitates fast access to archived PMU data. Using this method, we achieved over 30x speedup for queries with high selectivity. With th...

  2. Radiation sensitive devices and systems for detection of radioactive materials and related methods

    DOE Patents [OSTI]

    Kotter, Dale K

    2014-12-02T23:59:59.000Z

    Radiation sensitive devices include a substrate comprising a radiation sensitive material and a plurality of resonance elements coupled to the substrate. Each resonance element is configured to resonate responsive to non-ionizing incident radiation. Systems for detecting radiation from a special nuclear material include a radiation sensitive device and a sensor located remotely from the radiation sensitive device and configured to measure an output signal from the radiation sensitive device. In such systems, the radiation sensitive device includes a radiation sensitive material and a plurality of resonance elements positioned on the radiation sensitive material. Methods for detecting a presence of a special nuclear material include positioning a radiation sensitive device in a location where special nuclear materials are to be detected and remotely interrogating the radiation sensitive device with a sensor.

  3. The detection, prevention and mitigation of cascading outages in the power system 

    E-Print Network [OSTI]

    Song, Hongbiao

    2009-05-15T23:59:59.000Z

    all the time, and takes actions when needed to help detect, prevent and mitigate the possible cascading outage. Comprehensive simulation studies have been implemented using the IEEE 14- bus, 24-bus, 39-bus and 118-bus systems and promising results show...

  4. Neutron interrogation system using high gamma ray signature to detect contraband special nuclear materials in cargo

    DOE Patents [OSTI]

    Slaughter, Dennis R. (Oakland, CA); Pohl, Bertram A. (Berkeley, CA); Dougan, Arden D. (San Ramon, CA); Bernstein, Adam (Palo Alto, CA); Prussin, Stanley G. (Kensington, CA); Norman, Eric B. (Oakland, CA)

    2008-04-15T23:59:59.000Z

    A system for inspecting cargo for the presence of special nuclear material. The cargo is irradiated with neutrons. The neutrons produce fission products in the special nuclear material which generate gamma rays. The gamma rays are detecting indicating the presence of the special nuclear material.

  5. Methods, systems and devices for detecting threatening objects and for classifying magnetic data

    DOE Patents [OSTI]

    Kotter, Dale K. (Shelley, ID); Roybal, Lyle G. (Idaho Falls, ID); Rohrbaugh, David T. (Idaho Falls, ID); Spencer, David F. (Idaho Falls, ID)

    2012-01-24T23:59:59.000Z

    A method for detecting threatening objects in a security screening system. The method includes a step of classifying unique features of magnetic data as representing a threatening object. Another step includes acquiring magnetic data. Another step includes determining if the acquired magnetic data comprises a unique feature.

  6. Joint-Detection using Fast Fourier Transforms in TD-CDMA based Mobile Radio Systems

    E-Print Network [OSTI]

    Götze, Jürgen

    Joint-Detection using Fast Fourier Transforms in TD-CDMA based Mobile Radio Systems Marius Vollmer1,2 J¨urgen G¨otze2 Martin Haardt1 1. Siemens AG, ICN CA CTO 7 2. Information Processing Lab Dortmund, Germany Martin.Haardt@icn.siemens.de goetze@dt.e-technik.uni-dortmund.de Marius.Vollmer@icn.siemens

  7. Eye Finding via Face Detection for a Foveated, Active Vision System Brian Scassellati

    E-Print Network [OSTI]

    Eye Finding via Face Detection for a Foveated, Active Vision System Brian Scassellati 545 Technology Square MIT Artificial Intelligence Lab Cambridge, MA, 02139, USA scaz@ai.mit.edu Abstract Eye finding is the first step toward building a ma- chine that can recognize social cues, like eye contact

  8. Eye Finding via Face Detection for a Foveated, Active Vision System Brian Scassellati

    E-Print Network [OSTI]

    Eye Finding via Face Detection for a Foveated, Active Vision System Brian Scassellati 545 Technology Square MIT Artificial Intelligence Lab Cambridge, MA, 02139, USA scaz@ai.mit.edu Abstract Eye finding is the first step toward building a ma­ chine that can recognize social cues, like eye contact

  9. A WIRELESS SENSOR NETWORK SYSTEM DEPLOYMENT FOR DETECTING STICK SLIP MOTION IN GLACIERS

    E-Print Network [OSTI]

    Southampton, University of

    A WIRELESS SENSOR NETWORK SYSTEM DEPLOYMENT FOR DETECTING STICK SLIP MOTION IN GLACIERS K. Martinez, jhart@soton.ac.uk Keywords: Glaciers, Environmental sensor networks Abstract The behaviour of glaciers The current understanding of how glaciers and ice sheets respond to climate change is extremely limited

  10. System Problem Detection by Mining Console Logs Electrical Engineering and Computer Sciences

    E-Print Network [OSTI]

    Xu, Wei

    for mining console logs using a combination of program analysis, information retrieval, data mining logs. We then extract features, such as execution traces, from logs and use data mining and machineSystem Problem Detection by Mining Console Logs Wei Xu Electrical Engineering and Computer Sciences

  11. Invited Applications Paper Detecting Large-Scale System Problems by Mining Console Logs

    E-Print Network [OSTI]

    Xu, Wei

    . Researchers and operators have been using all kinds of mon- itoring data, from the simplest numerical metrics Problems by Mining Console Logs part operator, and charged with fixing the problem-- are usuallyInvited Applications Paper Detecting Large-Scale System Problems by Mining Console Logs Wei Xu xuw

  12. REAL-TIME STRUCTURAL DAMAGE DETECTION USING WIRELESS SENSING AND MONITORING SYSTEM

    E-Print Network [OSTI]

    Stanford University

    REAL-TIME STRUCTURAL DAMAGE DETECTION USING WIRELESS SENSING AND MONITORING SYSTEM Kung-Chun Lu1 Professor, Department of Civil & Environmental Engineering, University of Michigan, Ann Arbor, MI 48109, USA, jerlynch@umich.edu 5 Professor, Department of Civil & Environmental Engineering, Stanford University

  13. Design and evaluation of a novel breast cancer detection system combining both thermoacoustic ,,TA... and photoacoustic ,,PA... tomography

    E-Print Network [OSTI]

    Wang, Lihong

    Design and evaluation of a novel breast cancer detection system combining both thermoacoustic ,,TA thermoacoustic and photoacoustic techniques to achieve dual contrast microwave and light absorption imaging

  14. Addressing the Challenges of Anomaly Detection for Cyber Physical Energy Grid Systems

    SciTech Connect (OSTI)

    Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Melin, Alexander M [ORNL; Czejdo, Bogdan [ORNL

    2013-01-01T23:59:59.000Z

    The consolidation of cyber communications networks and physical control systems within the energy smart grid introduces a number of new risks. Unfortunately, these risks are largely unknown and poorly understood, yet include very high impact losses from attack and component failures. One important aspect of risk management is the detection of anomalies and changes. However, anomaly detection within cyber security remains a difficult, open problem, with special challenges in dealing with false alert rates and heterogeneous data. Furthermore, the integration of cyber and physical dynamics is often intractable. And, because of their broad scope, energy grid cyber-physical systems must be analyzed at multiple scales, from individual components, up to network level dynamics. We describe an improved approach to anomaly detection that combines three important aspects. First, system dynamics are modeled using a reduced order model for greater computational tractability. Second, a probabilistic and principled approach to anomaly detection is adopted that allows for regulation of false alerts and comparison of anomalies across heterogeneous data sources. Third, a hierarchy of aggregations are constructed to support interactive and automated analyses of anomalies at multiple scales.

  15. Electrical power system failure detection, isolation and recovery on the International Space Station Alpha

    SciTech Connect (OSTI)

    Aghabarari, E. [Rockwell International, Canoga Park, CA (United States). Rocketdyne Division; Varney, J. [McDonnell Douglas, Houston, TX (United States)

    1995-12-31T23:59:59.000Z

    The problem of how to detect, isolate, and recover from failures on the International Space Station Alpha (ISSA) is currently under study and development by NASA and a number of contractors including Rocketdyne Division of Rockwell International. The effort is planned to provide an advanced real-time failure detection system for the station. The autonomous power system project is designed to demonstrate the abilities of integrated intelligent diagnosis, control and scheduling techniques to space power distribution hardware. In this paper the latest failure detection, isolation, and recovery (FDIR) design, which provides an autonomous FDIR for the Electric Power System (EPS), will be described. The ISSA Concept of Operations and Utilization (COU) defines the ability of the vehicle to ``survive 24 hours of operation without crew or ground intervention``. This results in a necessity to design and develop automatic failure detection techniques to accomplish such autonomous operation without routine commanding. This paper addresses the current EPS FDIR design concept and concentrates on how to resolve the FDIR issues and come up with a robust design to recover from abnormal behavior.

  16. Radiation detection method and system using the sequential probability ratio test

    DOE Patents [OSTI]

    Nelson, Karl E. (Livermore, CA); Valentine, John D. (Redwood City, CA); Beauchamp, Brock R. (San Ramon, CA)

    2007-07-17T23:59:59.000Z

    A method and system using the Sequential Probability Ratio Test to enhance the detection of an elevated level of radiation, by determining whether a set of observations are consistent with a specified model within a given bounds of statistical significance. In particular, the SPRT is used in the present invention to maximize the range of detection, by providing processing mechanisms for estimating the dynamic background radiation, adjusting the models to reflect the amount of background knowledge at the current point in time, analyzing the current sample using the models to determine statistical significance, and determining when the sample has returned to the expected background conditions.

  17. Restoration of cross sections above intrusive salt domes

    SciTech Connect (OSTI)

    Brewer, R.C.; Groshong, R.H. Jr. (Univ. of Alabama, Tuscaloosa, AL (United States))

    1993-10-01T23:59:59.000Z

    The applicability of bed-length restoration to the sequence above a vertical intrusion of salt was tested on an experimental model that included deposition of units during uplift. Restoration of the model resulted in an apparently unbalanced cross section due to excess bed length in the pre-growth interval. The excess bed length was due to significant internal strain. For a correct restoration, it is thus important to distinguish between the growth and pre-growth sequences. The thinning index, which quantifies the thinning onto the uplift, aids in making this distinction. A thinning index vs. depth curve has a sharp inflection at the top of the pre-growth sequence. The pre-growth sequence is restored by area balancing. The growth sequence deforms mainly by formation of a crestal graben, with little other strain. Sequential restoration of growth intervals shows the growth history of the dome. When applied to the Pool Creek salt dome from the Mississippi Interior Salt basin, the methods developed for the model served to separate the pre-growth from the growth sequence and to indicate a growth history of vertical intrusion changing through time to vertical intrusion plus regional extension.

  18. Method Apparatus And System For Detecting Seismic Waves In A Borehole

    DOE Patents [OSTI]

    West, Phillip B. (Idaho Falls, ID); Sumstine, Roger L. (St. George, UT)

    2006-03-14T23:59:59.000Z

    A method, apparatus and system for detecting seismic waves. A sensing apparatus is deployed within a bore hole and may include a source magnet for inducing a magnetic field within a casing of the borehole. An electrical coil is disposed within the magnetic field to sense a change in the magnetic field due to a displacement of the casing. The electrical coil is configured to remain substantially stationary relative to the well bore and its casing along a specified axis such that displacement of the casing induces a change within the magnetic field which may then be sensed by the electrical coil. Additional electrical coils may be similarly utilized to detect changes in the same or other associated magnetic fields along other specified axes. The additional sensor coils may be oriented substantially orthogonally relative to one another so as to detect seismic waves along multiple orthogonal axes in three dimensional space.

  19. Intrusion-Tolerant Protection for Critical Infrastructures

    E-Print Network [OSTI]

    Neves, Nuno

    of an organization in the face of accidents and attacks. How- ever, they are not simple firewalls but distributed]. In recent years these systems evolved in several aspects that greatly increased their exposure to cyber-attacks, a critical information infrastructure is formed by facilities, like power transformation substations or cor

  20. 3D cloud detection and tracking system for solar forecast using multiple sky imagers

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Peng, Zhenzhou; Yu, Dantong; Huang, Dong; Heiser, John; Yoo, Shinjae; Kalb, Paul

    2015-08-01T23:59:59.000Z

    We propose a system for forecasting short-term solar irradiance based on multiple total sky imagers (TSIs). The system utilizes a novel method of identifying and tracking clouds in three-dimensional space and an innovative pipeline for forecasting surface solar irradiance based on the image features of clouds. First, we develop a supervised classifier to detect clouds at the pixel level and output cloud mask. In the next step, we design intelligent algorithms to estimate the block-wise base height and motion of each cloud layer based on images from multiple TSIs. This information is then applied to stitch images together into largermore »views, which are then used for solar forecasting. We examine the system’s ability to track clouds under various cloud conditions and investigate different irradiance forecast models at various sites. We confirm that this system can 1) robustly detect clouds and track layers, and 2) extract the significant global and local features for obtaining stable irradiance forecasts with short forecast horizons from the obtained images. Finally, we vet our forecasting system at the 32-megawatt Long Island Solar Farm (LISF). Compared with the persistent model, our system achieves at least a 26% improvement for all irradiance forecasts between one and fifteen minutes.« less

  1. Qualification of the ITER CS Quench Detection System using Numerical Modeling

    SciTech Connect (OSTI)

    Martovetsky, Nicolai N [ORNL; Radovinsky, Alexey L [ORNL

    2013-01-01T23:59:59.000Z

    Abstract The ITER Central Solenoid (CS) magnet needs to be protected against overheating of the conductor in the event of the occurrence of a normal zone (NZ). Due to a large amount of stored energy and slow NZ propagation, the NZ needs to be detected and the switchyard needs to open the breakers within 2 s after detection of the NZ. The CS will be discharged on a dump resistor with a time constant of 7.5 s. During operation of the CS and its interaction with the poloidal field (PF) coils and plasma current, the CS experiences large inductive voltages from multiple sources, including nonlinear signals from eddy currents in the vacuum vessel and plasma current variation, that make the task of detecting the resistive signal even more difficult. This inductive voltage needs to be cancelled by quench detection (QD) hardware (e.g., bridges, converters, filters, processors) and appropriate processing of the QD signals to reliably detect NZ initiation and propagation. Two redundant schemes are proposed as the baseline for the CS QD System: 1) A scheme with Regular Voltage Taps (RVT) from triads of Double Pancakes (DP) supplemented by Central Difference Averaging (CDA) and by digital suppression of the inductive voltage from all active coils (the CS and PF coils). Voltage taps are taken from helium outlets at the CS outer diameter. 2)A scheme with Cowound Voltage Taps (CVT) taken from cowound wires routed from the helium inlet at the CS inner diameter. Summary of results of the numerical modeling of the performance of both baseline CS QD systems is presented in this paper. Index Terms Quench detection, Central Solenoid, ITER

  2. Exploring the effects of a factory-type test-bed on a painted slate defect detection system.

    E-Print Network [OSTI]

    Whelan, Paul F.

    Exploring the effects of a factory-type test-bed on a painted slate defect detection system. TIM to detect visual defects on painted slates using an automated visual inspection system. The inspection work of the slate surface profile and conveying non-idealities (vibration and slate drift) on image capture and how

  3. Low background high efficiency radiocesium detection system based on positron emission tomography technology

    SciTech Connect (OSTI)

    Yamamoto, Seiichi; Ogata, Yoshimune [Department of Radiological and Medical Laboratory Sciences, Nagoya University Graduate School of Medicine, 1-1-20 Daiko-Minami, Higashi-ku, Nagoya 461-8673 (Japan)] [Department of Radiological and Medical Laboratory Sciences, Nagoya University Graduate School of Medicine, 1-1-20 Daiko-Minami, Higashi-ku, Nagoya 461-8673 (Japan)

    2013-09-15T23:59:59.000Z

    After the 2011 nuclear power plant accident at Fukushima, radiocesium contamination in food became a serious concern in Japan. However, low background and high efficiency radiocesium detectors are expensive and huge, including semiconductor germanium detectors. To solve this problem, we developed a radiocesium detector by employing positron emission tomography (PET) technology. Because {sup 134}Cs emits two gamma photons (795 and 605 keV) within 5 ps, they can selectively be measured with coincidence. Such major environmental gamma photons as {sup 40}K (1.46 MeV) are single photon emitters and a coincidence measurement reduces the detection limit of radiocesium detectors. We arranged eight sets of Bi{sub 4}Ge{sub 3}O{sub 12} (BGO) scintillation detectors in double rings (four for each ring) and measured the coincidence between these detectors using PET data acquisition system. A 50 × 50 × 30 mm BGO was optically coupled to a 2 in. square photomultiplier tube (PMT). By measuring the coincidence, we eliminated most single gamma photons from the energy distribution and only detected those from {sup 134}Cs at an average efficiency of 12%. The minimum detectable concentration of the system for the 100 s acquisition time is less than half of the food monitor requirements in Japan (25 Bq/kg). These results show that the developed radiocesium detector based on PET technology is promising to detect low level radiocesium.

  4. Application of black-box models to HVAC systems for fault detection

    SciTech Connect (OSTI)

    Peitsman, H.C. [TNO Building and Construction Research, Delft (Netherlands). Dept. of Indoor Environment, Building Physics and Systems; Bakker, V.E. [Univ. of Twente, Enschede (Netherlands). Dept. of Computer Science

    1996-11-01T23:59:59.000Z

    This paper describes the application of black-box models for fault detection and diagnosis (FDD) in heating, ventilating, and air-conditioning (HVAC) systems. In this study, multiple-input/single-output (MISO) ARX models and artificial neural network (ANN) models are used. The ARX models are examined for different processes and subprocesses and compared with each other. Two types of models are established--system models and component models. In the case of system models, the HVAC system as a whole is regarded as a black box instead of as a collection of component models. With the component model type, the components of the HVAC system are regarded as separate black boxes.

  5. Development of an automated Red Light Violation Detection System (RLVDS) for Indian vehicles

    E-Print Network [OSTI]

    Saha, Satadal; Nasipuri, Mita; Basu, Dipak Kumar

    2010-01-01T23:59:59.000Z

    Integrated Traffic Management Systems (ITMS) are now implemented in different cities in India to primarily address the concerns of road-safety and security. An automated Red Light Violation Detection System (RLVDS) is an integral part of the ITMS. In our present work we have designed and developed a complete system for generating the list of all stop-line violating vehicle images automatically from video snapshots of road-side surveillance cameras. The system first generates adaptive background images for each camera view, subtracts captured images from the corresponding background images and analyses potential occlusions over the stop-line in a traffic signal. Considering round-the-clock operations in a real-life test environment, the developed system could successfully track 92% images of vehicles with violations on the stop-line in a "Red" traffic signal.

  6. Hot spot detection system for vanes or blades of a combustion turbine

    DOE Patents [OSTI]

    Twerdochlib, M.

    1999-02-02T23:59:59.000Z

    This invention includes a detection system that can determine if a turbine component, such as a turbine vane or blade, has exceeded a critical temperature, such as a melting point, along any point along the entire surface of the vane or blade. This system can be employed in a conventional combustion turbine having a compressor, a combustor and a turbine section. Included within this system is a chemical coating disposed along the entire interior surface of a vane or blade and a closed loop cooling system that circulates a coolant through the interior of the vane or blade. If the temperature of the vane or blade exceeds a critical temperature, the chemical coating will be expelled from the vane or blade into the coolant. Since while traversing the closed loop cooling system the coolant passes through a detector, the presence of the chemical coating in the coolant will be sensed by the system. If the chemical coating is detected, this indicates that the vane or blade has exceeded a critical temperature. 5 figs.

  7. A Tutorial on Detection and Characterization of Special Behavior in Large Electric Power Systems

    SciTech Connect (OSTI)

    Hauer, John F.; DeSteese, John G.

    2004-08-20T23:59:59.000Z

    The objective of this document is to report results in the detection and characterization of special behavior in large electric power systems. Such behavior is usually dynamic in nature, but not always. This is also true for the underlying sources of special behavior. At the device level, a source of special behavior might be an automatic control system, a dynamic load, or even a manual control system that is operated according to some sharply defined policy. Other possible sources include passive system conditions, such as the state of a switched device or the amount of power carried on some critical line. Detection and characterization are based upon “signature information” that is extracted from the behavior observed. Characterization elements include the signature information itself, the nature of the behavior and its likely causes, and the associated implications for the system or for the public at large. With sufficient data and processing, this characterization may directly identify a particular condition or device at a specific location. Such conclusive results cannot always be done from just one observation, however. Information environments that are very sparse may require multiple observations, comparative model studies, and even direct testing of the system.

  8. Hot spot detection system for vanes or blades of a combustion turbine

    DOE Patents [OSTI]

    Twerdochlib, Michael (Oviedo, FL)

    1999-01-01T23:59:59.000Z

    This invention includes a detection system that can determine if a turbine component, such as a turbine vane or blade, has exceeded a critical temperature, such as a melting point, along any point along the entire surface of the vane or blade. This system can be employed in a conventional combustion turbine having a compressor, a combustor and a turbine section. Included within this system is a chemical coating disposed along the entire interior surface of a vane or blade and a closed loop cooling system that circulates a coolant through the interior of the vane or blade. If the temperature of the vane or blade exceeds a critical temperature, the chemical coating will be expelled from the vane or blade into the coolant. Since while traversing the closed loop cooling system the coolant passes through a detector, the presence of the chemical coating in the coolant will be sensed by the system. If the chemical coating is detected, this indicates that the vane or blade has exceeded a critical temperature.

  9. An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications

    SciTech Connect (OSTI)

    Beaver, Justin M [ORNL] [ORNL; Borges, Raymond Charles [ORNL] [ORNL; Buckner, Mark A [ORNL] [ORNL

    2013-01-01T23:59:59.000Z

    Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in a critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.

  10. Systems and methods for detecting nuclear radiation in the presence of backgrounds

    DOE Patents [OSTI]

    Bross, Alan D.; Mellott, Kerry L.; Pla-Dalmau, Anna

    2005-06-21T23:59:59.000Z

    Systems and methods for the simultaneous detection and identification of radiation species, including neutrons, gammas/x-rays and minimum ionizing particles (MIPs). A plurality of rectangular and/or triangularly shaped radiation sensitive scintillators can be configured from a plurality of nano-sized particles, dopants and an extruded plastic material. A wavelength-shifting fiber can then be located within a central hole of each extruded scintillator, wherein the wavelength-shifting fiber absorbs scintillation light and re-emits the light at a longer wavelength, thereby piping the light to a photodetector whose response to the light indicates the presence of radiation The resulting method and system can simultaneously detect neutrons, gamma rays, x-rays and cosmic rays (MIPs) and identify each.

  11. Hand-held, mechanically cooled, radiation detection system for gamma-ray spectroscopy

    DOE Patents [OSTI]

    Burks, Morgan Thomas; Eckels, Joel Del

    2010-06-08T23:59:59.000Z

    In one embodiment, a radiation detection system is provided including a radiation detector and a first enclosure encapsulating the radiation detector, the first enclosure including a low-emissivity infra-red (IR) reflective coating used to thermally isolate the radiation detector. Additionally, a second enclosure encapsulating the first enclosure is included, the first enclosure being suspension mounted to the second enclosure. Further, a cooler capable of cooling the radiation detector is included. Still yet, a first cooling interface positioned on the second enclosure is included for coupling the cooler and the first enclosure. Furthermore, a second cooling interface positioned on the second enclosure and capable of coupling the first enclosure to a cooler separate from the radiation detection system is included. Other embodiments are also presented.

  12. System and method for bearing fault detection using stator current noise cancellation

    SciTech Connect (OSTI)

    Zhou, Wei (Los Angeles, CA); Lu, Bin (Kenosha, WI); Habetler, Thomas G. (Snellville, GA); Harley, Ronald G. (Lawrenceville, GA); Theisen, Peter J. (West Bend, WI)

    2010-08-17T23:59:59.000Z

    A system and method for detecting incipient mechanical motor faults by way of current noise cancellation is disclosed. The system includes a controller configured to detect indicia of incipient mechanical motor faults. The controller further includes a processor programmed to receive a baseline set of current data from an operating motor and define a noise component in the baseline set of current data. The processor is also programmed to repeatedly receive real-time operating current data from the operating motor and remove the noise component from the operating current data in real-time to isolate any fault components present in the operating current data. The processor is then programmed to generate a fault index for the operating current data based on any isolated fault components.

  13. System and method for motor fault detection using stator current noise cancellation

    DOE Patents [OSTI]

    Zhou, Wei (Los Angeles, CA); Lu, Bin (Kenosha, WI); Nowak, Michael P. (Menomonee Falls, WI); Dimino, Steven A. (Wauwatosa, WI)

    2010-12-07T23:59:59.000Z

    A system and method for detecting incipient mechanical motor faults by way of current noise cancellation is disclosed. The system includes a controller configured to detect indicia of incipient mechanical motor faults. The controller further includes a processor programmed to receive a baseline set of current data from an operating motor and define a noise component in the baseline set of current data. The processor is also programmed to acquire at least on additional set of real-time operating current data from the motor during operation, redefine the noise component present in each additional set of real-time operating current data, and remove the noise component from the operating current data in real-time to isolate any fault components present in the operating current data. The processor is then programmed to generate a fault index for the operating current data based on any isolated fault components.

  14. Numerical modeling of seawater intrusion into endorheic hydrological systems

    E-Print Network [OSTI]

    Lyakhovsky, Vladimir

    concentration to brine through evaporation, the dense brine starts to flow below the encroaching seawater body. Below it an interface is recognized between the encroaching seawater body and a brine body underneath

  15. Method and apparatus for distributed intrusion protection system...

    Office of Scientific and Technical Information (OSTI)

    for ultra high bandwidth networks Re-direct Destination: A method for providing security to a network having a data stream with a plurality of portions of data, each having...

  16. Methods for non-intrusive sensing and system monitoring

    E-Print Network [OSTI]

    Schantz, Christopher James

    2014-01-01T23:59:59.000Z

    Improving the efficiency of collection, transmission, and consumption of resources is the focus of a wide swath of engineering research. Current technological solutions for capturing or mitigating energy and resource waste ...

  17. V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic...

    Energy Savers [EERE]

    to be dropped. Additionally, if the Cisco ASA with a Cisco IPS SSP software module running an affected version of software is configured in High-Availability mode (HA), a...

  18. Method of remote powering and detecting multiple UWB passive tags in an RFID system

    DOE Patents [OSTI]

    Dowla, Farid U. (Castro Valley, CA); Nekoogar, Faranak (San Ramon, CA); Benzel, David M. (Livermore, CA); Dallum, Gregory E. (Livermore, CA); Spiridon, Alex (Palo Alto, CA)

    2012-05-29T23:59:59.000Z

    A new Radio Frequency Identification (RFID), tracking, powering apparatus/system and method using coded Ultra-wideband (UWB) signaling is introduced. The proposed hardware and techniques disclosed herein utilize a plurality of passive UWB transponders in a field of an RFID-radar system. The radar system itself enables multiple passive tags to be remotely powered (activated) at about the same time frame via predetermined frequency UWB pulsed formats. Once such tags are in an activated state, an UWB radar transmits specific "interrogating codes" to put predetermined tags in an awakened status. Such predetermined tags can then communicate by a unique "response code" so as to be detected by an UWB system using radar methods.

  19. Methods, media, and systems for detecting attack on a digital processing device

    DOE Patents [OSTI]

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22T23:59:59.000Z

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  20. Performance Evaluation of DCA and SRC on a Single Bot Detection

    E-Print Network [OSTI]

    Aickelin, Uwe

    a better performance in detecting malicious activities. Keywords: Security, Intrusion Detection, Botnet/bot techniques use different types of signatures-based detection by analysing network traffic in order to detect or encrypting the bot's traffic when communicating with the attacker. In addition, a bot can connect to non

  1. Neutronic analysis of the 1D and 1E banks reflux detection system

    SciTech Connect (OSTI)

    Blanchard, A.

    1999-12-21T23:59:59.000Z

    Two H Canyon neutron monitoring systems for early detection of postulated abnormal reflux conditions in the Second Uranium Cycle 1E and 1D Mixer-Settle Banks have been designed and built. Monte Carlo neutron transport simulations using the general purpose, general geometry, n-particle MCNP code have been performed to model expected response of the monitoring systems to varying conditions.The confirmatory studies documented herein conclude that the 1E and 1D neutron monitoring systems are able to achieve adequate neutron count rates for various neutron source and detector configurations, thereby eliminating excessive integration count time. Neutron count rate sensitivity studies are also performed. Conversely, the transport studies concluded that the neutron count rates are statistically insensitive to nitric acid content in the aqueous region and to the transition region length. These studies conclude that the 1E and 1D neutron monitoring systems are able to predict the postulated reflux conditions for all examined perturbations in the neutron source and detector configurations. In the cases examined, the relative change in the neutron count rates due to postulated transitions from normal {sup 235}U concentration levels to reflux levels remain satisfactory detectable.

  2. Medium-resolution Autonomous in situ Gamma Detection System for Marine and Coastal Waters

    SciTech Connect (OSTI)

    Schwantes, Jon M.; Addleman, Raymond S.; Davidson, Joseph D.; Douglas, Matthew; Meier, David E.; Mullen, O Dennis; Myjak, Mitchell J.; Jones, Mark E.; Woodring, Mitchell L.; Johnson, Bryce; Santschi, Peter H.

    2009-12-01T23:59:59.000Z

    We are developing a medium-resolution autonomous in situ gamma detection system for marine and coastal waters. The system is designed to extract and preconcentrate isotopes of interest from natural waters prior to detection in order to eliminate signal attenuation of the gamma rays traveling through water and lower the overall background due to the presence of naturally occurring radioactive isotopes (40K and U/Th series radionuclides). Filtration is used to preconcentrate target isotopes residing on suspended particles, while chemosorption is employed to preferentially extract truly dissolved components from the water column. A variety of commercial and in-house nano-porus chemosorbents have been selected, procured or produced, and tested. Used filter and chemosorbent media are counted autonomously using two LaBr3 detectors in a near 4-pi configuration around the samples. A compact digital pulse processing system developed in-house and capable of running in coincidence mode is used to process the signal from the detectors to a small on-board computer. The entire system is extremely compact (9” dia. x 30” len.) and platform independent, but designed for initial deployment on a research buoy.

  3. Detection system for high-resolution gamma radiation spectroscopy with neutron time-of-flight filtering

    DOE Patents [OSTI]

    Dioszegi, Istvan; Salwen, Cynthia; Vanier, Peter

    2014-12-30T23:59:59.000Z

    A .gamma.-radiation detection system that includes at least one semiconductor detector such as HPGe-Detector, a position-sensitive .alpha.-Detector, a TOF Controller, and a Digitizer/Integrator. The Digitizer/Integrator starts to process the energy signals of a .gamma.-radiation sent from the HPGe-Detector instantly when the HPGe-Detector detects the .gamma.-radiation. Subsequently, it is determined whether a coincidence exists between the .alpha.-particles and .gamma.-radiation signal, based on a determination of the time-of-flight of neutrons obtained from the .alpha.-Detector and the HPGe-Detector. If it is determined that the time-of-flight falls within a predetermined coincidence window, the Digitizer/Integrator is allowed to continue and complete the energy signal processing. If, however, there is no coincidence, the Digitizer/Integrator is instructed to be clear and reset its operation instantly.

  4. Optical methods and systems for detecting a constituent in a gas containing oxygen in harsh environments

    DOE Patents [OSTI]

    Carpenter, Michael A. (Scotia, NY); Sirinakis, George (Bronx, NY)

    2011-01-04T23:59:59.000Z

    A method for detecting a gas phase constituent such as carbon monoxide, nitrogen dioxide, hydrogen, or hydrocarbons in a gas comprising oxygen such as air, includes providing a sensing material or film having a metal embedded in a catalytically active matrix such as gold embedded in a yttria stabilized zirconia (YSZ) matrix. The method may include annealing the sensing material at about 900.degree. C., exposing the sensing material and gas to a temperature above 400.degree. C., projecting light onto the sensing material, and detecting a change in the absorption spectrum of the sensing material due to the exposure of the sensing material to the gas in air at the temperature which causes a chemical reaction in the sensing material compared to the absorption spectrum of the sensing material in the absence of the gas. Systems employing such a method are also disclosed.

  5. Sensing system for detection and control of deposition on pendant tubes in recovery and power boilers

    DOE Patents [OSTI]

    Kychakoff, George; Afromowitz, Martin A; Hugle, Richard E

    2005-06-21T23:59:59.000Z

    A system for detection and control of deposition on pendant tubes in recovery and power boilers includes one or more deposit monitoring sensors operating in infrared regions and about 4 or 8.7 microns and directly producing images of the interior of the boiler. An image pre-processing circuit (95) in which a 2-D image formed by the video data input is captured, and includes a low pass filter for performing noise filtering of said video input. An image segmentation module (105) for separating the image of the recovery boiler interior into background, pendant tubes, and deposition. An image-understanding unit (115) matches derived regions to a 3-D model of said boiler. It derives a 3-D structure the deposition on pendant tubes in the boiler and provides the information about deposits to the plant distributed control system (130) for more efficient operation of the plant pendant tube cleaning and operating systems.

  6. DEVELOPMENT OF DEPOSIT DETECTION SYSTEM IN PIPELINES OF THE STEELWORKS USING CS-137 GAMMA-RAY

    SciTech Connect (OSTI)

    Song, Won-Joon; Lee, Seung-Hee; Jeong, Hee-Dong [Research Institute of Industrial Science and Technology, 32 Hyoja-Dong, Nam-Ku, Pohang, 790-330 (Korea, Republic of)

    2008-02-28T23:59:59.000Z

    The deposit is built up in the pipeline of the steelworks by the chemical reaction among COG (coke oven gas), BFG (blast furnace gas), moisture, and steel in the high temperature environment and obstructs the smooth gas flow. In this study a gamma-ray system is developed to detect the deposit accumulated in pipelines and calculate the accumulation rate with respect to the cross section area of pipes. Cs-137 is used as the gamma-ray source and the system is designed to apply to pipes of various diameters. This system also includes the DB for storage and display of the measurement results so that it can be used for the efficient management of the pipelines.

  7. AN INTELLIGENT SYSTEM FOR DETECTION OF NON-TECHNICAL LOSSES IN TENAGA NASIONAL BERHAD (TNB) MALAYSIA LOW VOLTAGE

    E-Print Network [OSTI]

    Ducatelle, Frederick

    Electricity consumer dishonesty is a problem faced by all power utilities worldwide. Finding efficient. This thesis presents a new approach towards Non-Technical Loss (NTL) detection in power utilities usingAN INTELLIGENT SYSTEM FOR DETECTION OF NON-TECHNICAL LOSSES IN TENAGA NASIONAL BERHAD (TNB

  8. Sequence Alignment for Masquerade Detection Scott E. Coull1

    E-Print Network [OSTI]

    Bystroff, Chris

    , however, these state-of-the-art security technologies are rendered useless. For instance, once a user has, administrators rely on security technologies such as firewalls, network and host-based intrusion detection technologies. Clearly, such attacks pose a serious threat, and their detection often occurs long after

  9. Methods, microfluidic devices, and systems for detection of an active enzymatic agent

    DOE Patents [OSTI]

    Sommer, Gregory J; Hatch, Anson V; Singh, Anup K; Wang, Ying-Chih

    2014-10-28T23:59:59.000Z

    Embodiments of the present invention provide methods, microfluidic devices, and systems for the detection of an active target agent in a fluid sample. A substrate molecule is used that contains a sequence which may cleave in the presence of an active target agent. A SNAP25 sequence is described, for example, that may be cleaved in the presence of Botulinum Neurotoxin. The substrate molecule includes a reporter moiety. The substrate molecule is exposed to the sample, and resulting reaction products separated using electrophoretic separation. The elution time of the reporter moiety may be utilized to identify the presence or absence of the active target agent.

  10. Non-Intrusive Cognitive Radio Networks based on Smart Antenna Technology

    E-Print Network [OSTI]

    Liu, Xin

    spectral efficiency. We investigate a flexible non-intrusive cognitive radio network based on smart antenna to the primary receiver (PR) is either minimized or constrained. Combined with transmission power controlNon-Intrusive Cognitive Radio Networks based on Smart Antenna Technology Senhua Huang, Zhi Ding

  11. Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu

    E-Print Network [OSTI]

    Ning, Peng

    Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu Cyber Defense Laboratory@csc.ncsu.edu, dxu@unity.ncsu.edu Abstract Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks

  12. SEIF: Secure and Efficient Intrusion-Fault tolerant routing protocol for wireless sensor networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 SEIF: Secure and Efficient Intrusion-Fault tolerant routing protocol for wireless sensor networks Informatique Algiers, Algeria Email: lnoureddine4@gmail.com Abstract--In wireless sensor networks, reliability network, Security, Intrusion tolerance, Fault tolerance, Secure routing. I. INTRODUCTION Wireless Sensor

  13. Nonlinear Propagation of Orbit Uncertainty Using Non-Intrusive Polynomial Chaos

    E-Print Network [OSTI]

    Born, George

    Nonlinear Propagation of Orbit Uncertainty Using Non-Intrusive Polynomial Chaos Brandon A. Jones1. Results presented in this paper use non-intrusive, i.e., sampling-based, methods in combination the use of polynomial chaos expansions (PCEs) for the non- linear, non-Gaussian propagation of orbit state

  14. NON-INTRUSIVE TEMPERATURE DIAGNOSTIC FOR A NON-NEUTRAL PLASMA

    E-Print Network [OSTI]

    Hart, Gus

    NON-INTRUSIVE TEMPERATURE DIAGNOSTIC FOR A NON-NEUTRAL PLASMA by Michael Takeshi Nakata A thesis, Associate Dean College of Physical and Mathematical Sciences #12;ABSTRACT NON-INTRUSIVE TEMPERATURE DIAGNOSTIC FOR A NON-NEUTRAL PLASMA M. Takeshi Nakata Department of Physics and Astronomy Master of Science

  15. COMPRESSIVE SAMPLING FOR NON-INTRUSIVE APPLIANCE LOAD MONITORING (NALM) USING CURRENT WAVEFORMS

    E-Print Network [OSTI]

    Leus, Geert

    COMPRESSIVE SAMPLING FOR NON-INTRUSIVE APPLIANCE LOAD MONITORING (NALM) USING CURRENT WAVEFORMS advanced services like dynamic electricity pricing. The non-intrusive appliance load monitoring (NALM) [1/off status of each appliance from the compressed measurement as if the original non-compressed measurement

  16. Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang*

    E-Print Network [OSTI]

    Lang, Sheau-Dong

    by the security managers is how to identify network intrusions and how to evaluate the effectiveness of IDS. 31 Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School and network security are important issues faced by the IT industry. Hackers apply an array of techniques

  17. INSENS: Intrusion-tolerant routing for wireless sensor networks Jing Deng*, Richard Han, Shivakant Mishra

    E-Print Network [OSTI]

    Han, Richard Y.

    to evaluate the cost incurred. q 2005 Published by Elsevier B.V. Keywords: Sensor network; Security; Intrusion an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently, accommodates multipath routing to multiple base stations, enables secure joining/leaving, and incorporates

  18. Nuclear data needs for non-intrusive inspection.

    SciTech Connect (OSTI)

    Smith, D. L.; Michlich, B. J.

    2000-11-29T23:59:59.000Z

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute nuclear technology and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested.

  19. Development of an Integrated Sensor System for Obstacle Detection and Terrain Evaluation for Application to Unmanned Ground

    E-Print Network [OSTI]

    Florida, University of

    Development of an Integrated Sensor System for Obstacle Detection and Terrain Evaluation field of view of 50 degrees and 38 degrees, respectively. Two sensor systems were utilized to evaluate., Wexford Pennsylvania ABSTRACT This paper describes the development and performance of a sensor system

  20. LOW-COST BACTERIAL DETECTION SYSTEM FOR FOOD SAFETY BASED ON AUTOMATED DNA EXTRACTION, AMPLIFICATION AND READOUT

    E-Print Network [OSTI]

    Hoehl, Melanie Margarete

    To ensure food, medical and environmental safety and quality, rapid, low-cost and easy-to-use detection methods are desirable. Here, the LabSystem is introduced for integrated, automated DNA purification and amplification. ...

  1. System for detecting and limiting electrical ground faults within electrical devices

    DOE Patents [OSTI]

    Gaubatz, Donald C. (Cupertino, CA)

    1990-01-01T23:59:59.000Z

    An electrical ground fault detection and limitation system for employment with a nuclear reactor utilizing a liquid metal coolant. Elongate electromagnetic pumps submerged within the liquid metal coolant and electrical support equipment experiencing an insulation breakdown occasion the development of electrical ground fault current. Without some form of detection and control, these currents may build to damaging power levels to expose the pump drive components to liquid metal coolant such as sodium with resultant undesirable secondary effects. Such electrical ground fault currents are detected and controlled through the employment of an isolated power input to the pumps and with the use of a ground fault control conductor providing a direct return path from the affected components to the power source. By incorporating a resistance arrangement with the ground fault control conductor, the amount of fault current permitted to flow may be regulated to the extent that the reactor may remain in operation until maintenance may be performed, notwithstanding the existence of the fault. Monitors such as synchronous demodulators may be employed to identify and evaluate fault currents for each phase of a polyphase power, and control input to the submerged pump and associated support equipment.

  2. Detection and location of leaks in district heating steam systems: Survey and review of current technology and practices

    SciTech Connect (OSTI)

    Kupperman, D.S.; Raptis, A.C.; Lanham, R.N.

    1992-03-01T23:59:59.000Z

    This report presents the results of a survey undertaken to identify and characterize current practices for detecting and locating leaks in district heating systems, particular steam systems. Currently used technology and practices are reviewed. In addition, the survey was used to gather information that may be important for the application of acoustic leak detection. A few examples of attempts to locate leaks in steam and hot water pipes by correlation of acoustic signals generated by the leaks are also discussed.

  3. Magnetophoretic bead trapping in a high-flowrate biological detection system.

    SciTech Connect (OSTI)

    Galambos, Paul C.; Hopkins, Matthew Morgan; Rahimian, Kamayar; Martin, James Ellis; Anderson, G. Ronald; Clem, Paul Gilbert; Rohwer, Lauren Elizabeth Shea; Lemp, Thomas; Derzon, Mark Steven; James, Conrad D.

    2005-03-01T23:59:59.000Z

    This report contains the summary of the 'Magnetophoretic Bead Trapping in a High-Flowrate Biological Detection System' LDRD project 74795. The objective of this project is to develop a novel biodetection system for high-throughput sample analysis. The chief application of this system is in detection of very low concentrations of target molecules from a complex liquid solution containing many different constituents--some of which may interfere with identification of the target molecule. The system is also designed to handle air sampling by using an aerosol system (for instance a WESP - Wet Electro-Static Precipitator, or an impact spray system) to get air sample constituents into the liquid volume. The system described herein automatically takes the raw liquid sample, whether air converted or initially liquid matrix, and mixes in magnetic detector beads that capture the targets of interest and then performs the sample cleanup function, allowing increased sensitivity and eliminating most false positives and false negatives at a downstream detector. The surfaces of the beads can be functionalized in a variety of ways in order to maximize the number of targets to be captured and concentrated. Bacteria and viruses are captured using antibodies to surface proteins on bacterial cell walls or viral particle coats. In combination with a cell lysis or PCR (Polymerase Chain Reaction), the beads can be used as a DNA or RNA probe to capture nucleic acid patterns of interest. The sample cleanup capability of this system would allow different raw biological samples, such as blood or saliva to be analyzed for the presence of different infectious agents (e.g. smallpox or SARS). For future studies, we envision functionalizing bead surfaces to bind to chemical weapons agents, radio-isotopes, and explosives. The two main objectives of this project were to explore methods for enhancing the mixing of the capture microspheres in the sample, and to develop a novel high-throughput magnetic microsphere trap. We have developed a novel technique using the magnetic capture microspheres as 'stirrer bars' in a fluid sample to enhance target binding to the microsphere surfaces. We have also made progress in developing a polymer-MEMS electromagnet for trapping magnetic spheres in a high-flowrate fluid format.

  4. Ion mobility spectrometer, spectrometer analyte detection and identification verification system, and method

    DOE Patents [OSTI]

    Atkinson, David A. (Idaho Falls, ID)

    2002-01-01T23:59:59.000Z

    Methods and apparatus for ion mobility spectrometry and analyte detection and identification verification system are disclosed. The apparatus is configured to be used in an ion mobility spectrometer and includes a plurality of reactant reservoirs configured to contain a plurality of reactants which can be reacted with the sample to form adducts having varying ion mobilities. A carrier fluid, such as air or nitrogen, is used to carry the sample into the spectrometer. The plurality of reactants are configured to be selectively added to the carrier stream by use inlet and outlet manifolds in communication with the reagent reservoirs, the reservoirs being selectively isolatable by valves. The invention further includes a spectrometer having the reagent system described. In the method, a first reactant is used with the sample. Following a positive result, a second reactant is used to determine whether a predicted response occurs. The occurrence of the second predicted response tends to verify the existence of a component of interest within the sample. A third reactant can also be used to provide further verification of the existence of a component of interest. A library can be established of known responses of compounds of interest with various reactants and the results of a specific multi-reactant survey of a sample can be compared against the library to determine whether a component detected in the sample is likely to be a specific component of interest.

  5. Sensing system for detection and control of deposition on pendant tubes in recovery and power boilers

    DOE Patents [OSTI]

    Kychakoff, George (Maple Valley, WA); Afromowitz, Martin A. (Mercer Island, WA); Hogle, Richard E. (Olympia, WA)

    2008-10-14T23:59:59.000Z

    A system for detection and control of deposition on pendant tubes in recovery and power boilers includes one or more deposit monitoring sensors operating in infrared regions of about 4 or 8.7 microns and directly producing images of the interior of the boiler, or producing feeding signals to a data processing system for information to enable a distributed control system by which the boilers are operated to operate said boilers more efficiently. The data processing system includes an image pre-processing circuit in which a 2-D image formed by the video data input is captured, and includes a low pass filter for performing noise filtering of said video input. It also includes an image compensation system for array compensation to correct for pixel variation and dead cells, etc., and for correcting geometric distortion. An image segmentation module receives a cleaned image from the image pre-processing circuit for separating the image of the recovery boiler interior into background, pendant tubes, and deposition. It also accomplishes thresholding/clustering on gray scale/texture and makes morphological transforms to smooth regions, and identifies regions by connected components. An image-understanding unit receives a segmented image sent from the image segmentation module and matches derived regions to a 3-D model of said boiler. It derives a 3-D structure the deposition on pendant tubes in the boiler and provides the information about deposits to the plant distributed control system for more efficient operation of the plant pendant tube cleaning and operating systems.

  6. Effective detective quantum efficiency for two mammography systems: Measurement and comparison against established metrics

    SciTech Connect (OSTI)

    Salvagnini, Elena [UZ Gasthuisberg, Medical Imaging Research Center and Department of Radiology, Herestraat 49, B-3000 Leuven, Belgium and SCK-CEN, Boeretang 200, B-2400 Mol (Belgium)] [UZ Gasthuisberg, Medical Imaging Research Center and Department of Radiology, Herestraat 49, B-3000 Leuven, Belgium and SCK-CEN, Boeretang 200, B-2400 Mol (Belgium); Bosmans, Hilde; Marshall, Nicholas W. [UZ Gasthuisberg, Medical Imaging Research Center and Department of Radiology, Herestraat 49, B-3000 Leuven (Belgium)] [UZ Gasthuisberg, Medical Imaging Research Center and Department of Radiology, Herestraat 49, B-3000 Leuven (Belgium); Struelens, Lara [SCK-CEN, Boeretang 200, B-2400 Mol (Belgium)] [SCK-CEN, Boeretang 200, B-2400 Mol (Belgium)

    2013-10-15T23:59:59.000Z

    Purpose: The aim of this paper was to illustrate the value of the new metric effective detective quantum efficiency (eDQE) in relation to more established measures in the optimization process of two digital mammography systems. The following metrics were included for comparison against eDQE: detective quantum efficiency (DQE) of the detector, signal difference to noise ratio (SdNR), and detectability index (d?) calculated using a standard nonprewhitened observer with eye filter.Methods: The two systems investigated were the Siemens MAMMOMAT Inspiration and the Hologic Selenia Dimensions. The presampling modulation transfer function (MTF) required for the eDQE was measured using two geometries: a geometry containing scattered radiation and a low scatter geometry. The eDQE, SdNR, and d? were measured for poly(methyl methacrylate) (PMMA) thicknesses of 20, 40, 60, and 70 mm, with and without the antiscatter grid and for a selection of clinically relevant target/filter (T/F) combinations. Figures of merit (FOMs) were then formed from SdNR and d? using the mean glandular dose as the factor to express detriment. Detector DQE was measured at energies covering the range of typical clinically used spectra.Results: The MTF measured in the presence of scattered radiation showed a large drop at low spatial frequency compared to the low scatter method and led to a corresponding reduction in eDQE. The eDQE for the Siemens system at 1 mm{sup ?1} ranged between 0.15 and 0.27, depending on T/F and grid setting. For the Hologic system, eDQE at 1 mm{sup ?1} varied from 0.15 to 0.32, again depending on T/F and grid setting. The eDQE results for both systems showed that the grid increased the system efficiency for PMMA thicknesses of 40 mm and above but showed only small sensitivity to T/F setting. While results of the SdNR and d? based FOMs confirmed the eDQE grid position results, they were also more specific in terms of T/F selection. For the Siemens system at 20 mm PMMA, the FOMs indicated Mo/Mo (grid out) as optimal while W/Rh (grid in) was the optimal configuration at 40, 60, and 70 mm PMMA. For the Hologic, the FOMs pointed to W/Rh (grid in) at 20 and 40 mm of PMMA while W/Ag (grid in) gave the highest FOM at 60 and 70 mm PMMA. Finally, DQE at 1 mm{sup ?1} averaged for the four beam qualities studied was 0.44 ± 0.02 and 0.55 ± 0.03 for the Siemens and Hologic detectors, respectively, indicating only a small influence of energy on detector DQE.Conclusions: Both the DQE and eDQE data showed only a small sensitivity to T/F setting for these two systems. The eDQE showed clear preferences in terms of scatter reduction, being highest for the grid-in geometry for PMMA thicknesses of 40 mm and above. The SdNR and d? based figures of merit, which contain additional weighting for contrast and dose, pointed to specific T/F settings for both systems.

  7. Mining Building Energy Management System Data Using Fuzzy Anomaly Detection and Linguistic Descriptions

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Ondrej Linda; Milos Manic; Craig Rieger

    2014-08-01T23:59:59.000Z

    Building Energy Management Systems (BEMSs) are essential components of modern buildings that utilize digital control technologies to minimize energy consumption while maintaining high levels of occupant comfort. However, BEMSs can only achieve these energy savings when properly tuned and controlled. Since indoor environment is dependent on uncertain criteria such as weather, occupancy, and thermal state, performance of BEMS can be sub-optimal at times. Unfortunately, the complexity of BEMS control mechanism, the large amount of data available and inter-relations between the data can make identifying these sub-optimal behaviors difficult. This paper proposes a novel Fuzzy Anomaly Detection and Linguistic Description (Fuzzy-ADLD) based method for improving the understandability of BEMS behavior for improved state-awareness. The presented method is composed of two main parts: 1) detection of anomalous BEMS behavior and 2) linguistic representation of BEMS behavior. The first part utilizes modified nearest neighbor clustering algorithm and fuzzy logic rule extraction technique to build a model of normal BEMS behavior. The second part of the presented method computes the most relevant linguistic description of the identified anomalies. The presented Fuzzy-ADLD method was applied to real-world BEMS system and compared against a traditional alarm based BEMS. In six different scenarios, the Fuzzy-ADLD method identified anomalous behavior either as fast as or faster (an hour or more), that the alarm based BEMS. In addition, the Fuzzy-ADLD method identified cases that were missed by the alarm based system, demonstrating potential for increased state-awareness of abnormal building behavior.

  8. Large Monitoring Systems: Data Analysis, Design and Deployment

    E-Print Network [OSTI]

    Rajagopal, Ram

    2009-01-01T23:59:59.000Z

    groups: intrusive and non-intrusive. Intrusive sensors arefor traffic monitoring. Non-intrusive sensors require lessones. An example of a non-intrusive sensor is a digital

  9. FUEGO — Fire Urgency Estimator in Geosynchronous Orbit — A Proposed Early-Warning Fire Detection System

    E-Print Network [OSTI]

    Kelly, Maggi

    2013-01-01T23:59:59.000Z

    Remote Sens. 2013, 5 satellite with modern imaging detectors, software, and algorithms able to detect heat

  10. Experiments using non-intrusive particle tracing techniques for granular chute flows. Final report

    SciTech Connect (OSTI)

    Rosato, A.D.; Dave, R.N.; Fischer, I.S.

    1998-12-31T23:59:59.000Z

    The objective of this contract was to develop a system capable of non-intrusively tracking the motion of an individual particle for the study of granular flows down inclined chutes. The result of the project is a system capable of following the three-dimensional translational and rotational motion of an individual particle embedded with a flowing granular material. The basic system consists of a sphere embedded with three orthogonal transmitters emitting at different frequencies which induce voltages in an antenna array surrounding the flow regime. Analysis of the induced voltage signals within the framework of a derived model yields both the position and orientation of the sphere. Tests were performed in a small scale model chute as well as in a cylindrical vibrated granular bed, which clearly demonstrates the capability of the system. As a result of discussions at meetings held semi-annually for the Granular Flow Advanced Research Objectives (GFARO) contractors, it was deemed necessary to pursue an additional experimental program as part of this contract related to the measurement of sphere collision properties. The outcome of the work (reported in Appendix C) is the determination of certain properties which are needed for use in computer simulations and theory.

  11. Methods and systems for low frequency seismic and infrasound detection of geo-pressure transition zones

    DOE Patents [OSTI]

    Shook, G. Michael; LeRoy, Samuel D.; Benzing, William M.

    2006-07-18T23:59:59.000Z

    Methods for determining the existence and characteristics of a gradational pressurized zone within a subterranean formation are disclosed. One embodiment involves employing an attenuation relationship between a seismic response signal and increasing wavelet wavelength, which relationship may be used to detect a gradational pressurized zone and/or determine characteristics thereof. In another embodiment, a method for analyzing data contained within a response signal for signal characteristics that may change in relation to the distance between an input signal source and the gradational pressurized zone is disclosed. In a further embodiment, the relationship between response signal wavelet frequency and comparative amplitude may be used to estimate an optimal wavelet wavelength or range of wavelengths used for data processing or input signal selection. Systems for seismic exploration and data analysis for practicing the above-mentioned method embodiments are also disclosed.

  12. Physics-based, Bayesian sequential detection method and system for radioactive contraband

    DOE Patents [OSTI]

    Candy, James V; Axelrod, Michael C; Breitfeller, Eric F; Chambers, David H; Guidry, Brian L; Manatt, Douglas R; Meyer, Alan W; Sale, Kenneth E

    2014-03-18T23:59:59.000Z

    A distributed sequential method and system for detecting and identifying radioactive contraband from highly uncertain (noisy) low-count, radionuclide measurements, i.e. an event mode sequence (EMS), using a statistical approach based on Bayesian inference and physics-model-based signal processing based on the representation of a radionuclide as a monoenergetic decomposition of monoenergetic sources. For a given photon event of the EMS, the appropriate monoenergy processing channel is determined using a confidence interval condition-based discriminator for the energy amplitude and interarrival time and parameter estimates are used to update a measured probability density function estimate for a target radionuclide. A sequential likelihood ratio test is then used to determine one of two threshold conditions signifying that the EMS is either identified as the target radionuclide or not, and if not, then repeating the process for the next sequential photon event of the EMS until one of the two threshold conditions is satisfied.

  13. Multi-sensor system for the detection and characterization of unexploded ordnance

    DOE Patents [OSTI]

    Morrison, Frank H. (Berkeley, CA); Gasperikova, Erika (Berkeley, CA)

    2011-08-16T23:59:59.000Z

    To fully characterize the inductive response of an isolated conductive object, such as buried unexploded ordinance, one needs to measure its response to stimulation by primary magnetic fields in three linearly independent (e.g., approximately orthogonal) directions. In one embodiment this is achieved by measuring the response to magnetic fields of three independent transmitters arranged to have magnetic fields that are linearly independent. According to the apparatus and methods employing the system of this invention, multiple transmitters and receivers of known relative position and orientation on a single platform are used. In a preferred embodiment, matched sets of receiver pairs connected in gradient mode are positioned adjacent to closely spaced pairs of transmitting coils, such that a minor displacement of one or both of the receiver coil pairs relative to the paired transmitting coils will not affect the detected secondary signals emitted by a buried metallic object.

  14. Method and system for early detection of incipient faults in electric motors

    DOE Patents [OSTI]

    Parlos, Alexander G; Kim, Kyusung

    2003-07-08T23:59:59.000Z

    A method and system for early detection of incipient faults in an electric motor are disclosed. First, current and voltage values for one or more phases of the electric motor are measured during motor operations. A set of current predictions is then determined via a neural network-based current predictor based on the measured voltage values and an estimate of motor speed values of the electric motor. Next, a set of residuals is generated by combining the set of current predictions with the measured current values. A set of fault indicators is subsequently computed from the set of residuals and the measured current values. Finally, a determination is made as to whether or not there is an incipient electrical, mechanical, and/or electromechanical fault occurring based on the comparison result of the set of fault indicators and a set of predetermined baseline values.

  15. Systems for low frequency seismic and infrasound detection of geo-pressure transition zones

    DOE Patents [OSTI]

    Shook, G. Michael (Idaho Falls, ID); LeRoy, Samuel D. (Houston, TX); Benzing, William M. (Tulsa, OK)

    2007-10-16T23:59:59.000Z

    Methods for determining the existence and characteristics of a gradational pressurized zone within a subterranean formation are disclosed. One embodiment involves employing an attenuation relationship between a seismic response signal and increasing wavelet wavelength, which relationship may be used to detect a gradational pressurized zone and/or determine characteristics thereof. In another embodiment, a method for analyzing data contained within a response signal for signal characteristics that may change in relation to the distance between an input signal source and the gradational pressurized zone is disclosed. In a further embodiment, the relationship between response signal wavelet frequency and comparative amplitude may be used to estimate an optimal wavelet wavelength or range of wavelengths used for data processing or input signal selection. Systems for seismic exploration and data analysis for practicing the above-mentioned method embodiments are also disclosed.

  16. S3A: Secure System Simplex Architecture for Enhanced Security of Cyber-Physical Systems

    E-Print Network [OSTI]

    Mohan, Sibin; Betti, Emiliano; Yun, Heechul; Sha, Lui; Caccamo, Marco

    2012-01-01T23:59:59.000Z

    Until recently, cyber-physical systems, especially those with safety-critical properties that manage critical infrastructure (e.g. power generation plants, water treatment facilities, etc.) were considered to be invulnerable against software security breaches. The recently discovered 'W32.Stuxnet' worm has drastically changed this perception by demonstrating that such systems are susceptible to external attacks. Here we present an architecture that enhances the security of safety-critical cyber-physical systems despite the presence of such malware. Our architecture uses the property that control systems have deterministic execution behavior, to detect an intrusion within 0.6 {\\mu}s while still guaranteeing the safety of the plant. We also show that even if an attack is successful, the overall state of the physical system will still remain safe. Even if the operating system's administrative privileges have been compromised, our architecture will still be able to protect the physical system from coming to harm.

  17. Detection of Volatile Organics Using a Surface Acoustic Wave Array System

    SciTech Connect (OSTI)

    ANDERSON, LAWRENCE F.; BARTHOLOMEW, JOHN W.; CERNOSEK, RICHARD W.; COLBURN, CHRISTOPHER W.; CROOKS, R.M.; MARTINEZ, R.F.; OSBOURN, GORDON C.; RICCO, A.J.; STATON, ALAN W.; YELTON, WILLIAM G.

    1999-10-14T23:59:59.000Z

    A chemical sensing system based on arrays of surface acoustic wave (SAW) delay lines has been developed for identification and quantification of volatile organic compounds (VOCs). The individual SAW chemical sensors consist of interdigital transducers patterned on the surface of an ST-cut quartz substrate to launch and detect the acoustic waves and a thin film coating in the SAW propagation path to perturb the acoustic wave velocity and attenuation during analyte sorption. A diverse set of material coatings gives the sensor arrays a degree of chemical sensitivity and selectivity. Materials examined for sensor application include the alkanethiol-based self-assembled monolayer, plasma-processed films, custom-synthesized conventional polymers, dendrimeric polymers, molecular recognition materials, electroplated metal thin films, and porous metal oxides. All of these materials target a specific chemical fi.mctionality and the enhancement of accessible film surface area. Since no one coating provides absolute analyte specificity, the array responses are further analyzed using a visual-empirical region-of-influence (VERI) pattern recognition algorithm. The chemical sensing system consists of a seven-element SAW array with accompanying drive and control electronics, sensor signal acquisition electronics, environmental vapor sampling hardware, and a notebook computer. Based on data gathered for individual sensor responses, greater than 93%-accurate identification can be achieved for any single analyte from a group of 17 VOCs and water.

  18. Improved TPB-coated Light Guides for Liquid Argon TPC Light Detection Systems

    E-Print Network [OSTI]

    Z. Moss; L. Bugel; G. Collin; J. M. Conrad; B. J. P. Jones; J. Moon; M. Toups; T. Wongjirad

    2015-03-25T23:59:59.000Z

    Scintillation light produced in liquid argon (LAr) must be shifted from 128 nm to visible wavelengths in light detection systems used for liquid argon time-projection chambers (LArTPCs). To date, LArTPC light collection systems have employed tetraphenyl butadiene (TPB) coatings on photomultiplier tubes (PMTs) or plates placed in front of the PMTs. Recently, a new approach using TPB-coated light guides was proposed. In this paper, we report on light guides with improved attenuation lengths above 100 cm when measured in air. This is an important step in the development of meter-scale light guides for future LArTPCs. Improvements come from using a new acrylic-based coating, diamond-polished cast UV transmitting acrylic bars, and a hand-dipping technique to coat the bars. We discuss a model for connecting bar response in air to response in liquid argon and compare this to data taken in liquid argon. The good agreement between the prediction of the model and the measured response in liquid argon demonstrates that characterization in air is sufficient for quality control of bar production. This model can be used in simulations of light guides for future experiments.

  19. Establishment of a facility for intrusive characterization of transuranic waste at the Nevada Test Site

    SciTech Connect (OSTI)

    Foster, B.D.; Musick, R.G.; Pedalino, J.P.; Cowley, J.L. [Bechtel Nevada Corp., Las Vegas, NV (United States); Karney, C.C. [Dept. of Energy, Las Vegas, NV (United States); Kremer, J.L.

    1998-01-01T23:59:59.000Z

    This paper describes design and construction, project management, and testing results associated with the Waste Examination Facility (WEF) recently constructed at the Nevada Test Site (NTS). The WEF and associated systems were designed, procured, and constructed on an extremely tight budget and within a fast track schedule. Part 1 of this paper focuses on design and construction activities, Part 2 discusses project management of WEF design and construction activities, and Part 3 describes the results of the transuranic (TRU) waste examination pilot project conducted at the WEF. In Part 1, the waste examination process is described within the context of Waste Isolation Pilot Plant (WIPP) characterization requirements. Design criteria are described from operational and radiological protection considerations. The WEF engineered systems are described. These systems include isolation barriers using a glove box and secondary containment structure, high efficiency particulate air (HEPA) filtration and ventilation systems, differential pressure monitoring systems, and fire protection systems. In Part 2, the project management techniques used for ensuring that stringent cost/schedule requirements were met are described. The critical attributes of these management systems are described with an emphasis on team work. In Part 3, the results of a pilot project directed at performing intrusive characterization (i.e., examination) of TRU waste at the WEF are described. Project activities included cold and hot operations. Cold operations included operator training, facility systems walk down, and operational procedures validation. Hot operations included working with plutonium contaminated TRU waste and consisted of waste container breaching, waste examination, waste segregation, data collection, and waste repackaging.

  20. Effects of droplet size on intrusion of sub-surface oil spills

    E-Print Network [OSTI]

    Chan, Godine Kok Yan

    2013-01-01T23:59:59.000Z

    This thesis explores the effects of droplet size on droplet intrusion in sub-surface oil spills. Laboratory experiments were performed where glass beads of various sizes, which serve to simulate oil droplets in deepsea oil ...

  1. Interpreting human activity from electrical consumption data through non-intrusive load monitoring

    E-Print Network [OSTI]

    Gillman, Mark Daniel

    2014-01-01T23:59:59.000Z

    Non-intrusive load monitoring (NILM) has three distinct advantages over today's smart meters. First, it offers accountability. Few people know where their kWh's are going. Second, it is a maintenance tool. Signs of wear ...

  2. Evaluation of non-intrusive monitoring for condition based maintenance applications on US Navy propulsion plants

    E-Print Network [OSTI]

    Greene, William C. (William Calvin)

    2005-01-01T23:59:59.000Z

    The thesis explores the use of the Non-intrusive Load Monitor (NILM) in Condition Based Maintenance (CBM) applications on US Navy ships as part of the Office of Naval Research Electric Ship Integration (ESI) Initiative. ...

  3. Does sea-level rise have an impact on saltwater intrusion? Sun Woo Chang a

    E-Print Network [OSTI]

    Clement, Prabhakar

    of the major environmental issues faced by several coastal cit- ies in India, China, and Mexico [3 intrusion in coastal aquifers and its interconnection to anthropogenic activities is an important envi

  4. Stratovolcano growth by coeruptive intrusion: The 2008 eruption of Tungurahua Ecuador

    E-Print Network [OSTI]

    Biggs, Juliet

    Stratovolcano growth by coeruptive intrusion: The 2008 eruption of Tungurahua Ecuador J. Biggs,1 of the edifice, or temporary, in which case the magma will be released in a future eruption. Citation: Biggs, J

  5. Assessment of Seawater Intrusion Potential From Sea-level Rise in Coastal Aquifers of California

    E-Print Network [OSTI]

    Loáiciga, Hugo A; Pingel, Thomas J; Garcia, Elizabeth S

    2009-01-01T23:59:59.000Z

    2009). Impact of Sea-Level Rise on Sea Water Intrusion inC. (1997). Global Sea Level Rise: A Redetermination. Surveys2007). Effects of sea-level rise on groundwater flow in a

  6. Non-intrusive water utility monitoring and free-space load monitoring

    E-Print Network [OSTI]

    Neuman, Sabrina M

    2011-01-01T23:59:59.000Z

    This work presents a non-intrusive, single-point sensing scheme to monitor the water usage for various loads on a water utility pipe network through the vibration of a pipe near the water intake source. Experiments with ...

  7. Chemical and petrological characteristics of the intrusive rocks of the Quitman Mountains, Texas 

    E-Print Network [OSTI]

    Seay, Christopher Sidney

    1973-01-01T23:59:59.000Z

    differentiated rock types from the diorite (1) to the last emplaced granite (9). 42 7. Calcium concentration and fluorine concentration vs. the various differentiated rock types from the diorite (1) to the last emplaced granite (9) 8. Ca percentage plotted... concentration for the various rock types from the diorite (1) to the final granite (9). . . . . . . ~ 53 13. Rb/Sr ratios for the intrusive rock types 56 14. Uranium concentrations for the intrusive rock types for the initially emplaced diorite (1...

  8. Cosmic Rays to Acoustics: Non-intrusive Monitoring for Nuclear Applications

    SciTech Connect (OSTI)

    Stanley, S.J.; Scully, P. [Nexia Solutions, H260 Hinton House, Risley, Warrington, WA6 3AS (United Kingdom)

    2007-07-01T23:59:59.000Z

    The radioactive nature of the material handled during nuclear reprocessing or fuel manufacture often makes both process monitoring and process diagnostics most challenging. Fox example, quantifying material inside a radiation shielded storage vessel, locating sediment layers and the associated interfaces represents a difficult challenge. Alternatively, measuring the extent of sludge re-suspension and quantifying the amounts of sludge transferred during a sludge movement campaign also represents a re-occurring problem. Remote non-invasive process monitoring and imaging techniques are most applicable in the nuclear sector as they provide a means to monitor or image the given process, container or vessel allowing a remote interrogation whilst reducing operator dosage uptake. A number of currently used types of non-intrusive process monitoring and imaging techniques are discussed in this paper, each with their associated applications. Firstly, the use of (very) high energy naturally occurring cosmic ray muons for imaging the internal contents of large or radiation shielded vessels is discussed. Secondly, the use of non-invasive acoustic monitoring techniques to detect the presence of a gas-core inside a stirred vessel as well as the detection of flowing solids is described. Finally, the use of electrical resistance tomography for imaging the ease of sludge re-suspension in a storage vessel is also discussed. Within the UK Nuclear Sector, the use of non-invasive imaging and process monitoring techniques in recent years has shown a marked increase. Being able to 'see inside' the process represents a powerful tool allowing the quantification, location and characterisation of material whilst increasing the overall understanding of the given process providing significant safety, economical and operational benefits. (authors)

  9. Automated High-Pressure Titration System with In Situ Infrared Spectroscopic Detection

    SciTech Connect (OSTI)

    Thompson, Christopher J.; Martin, Paul F.; Chen, Jeffrey; Benezeth, Pascale; Schaef, Herbert T.; Rosso, Kevin M.; Felmy, Andrew R.; Loring, John S.

    2014-04-17T23:59:59.000Z

    A fully automated titration system with infrared detection was developed for investigating interfacial chemistry at high pressures. The apparatus consists of a high-pressure fluid generation and delivery system coupled to a high-pressure cell with infrared optics. A manifold of electronically actuated valves is used to direct pressurized fluids into the cell. Precise reagent additions to the pressurized cell are made with calibrated tubing loops that are filled with reagent and placed in-line with the cell and a syringe pump. The cell’s infrared optics facilitate both transmission and attenuated total reflection (ATR) measurements to monitor bulk-fluid composition and solid-surface phenomena such as adsorption, desorption, complexation, dissolution, and precipitation. Switching between the two measurement modes is accomplished with moveable mirrors that direct radiation from a Fourier transform infrared spectrometer into the cell along transmission or ATR light paths. The versatility of the high-pressure IR titration system is demonstrated with three case studies. First, we titrated water into supercritical CO2 (scCO2) to generate an infrared calibration curve and determine the solubility of water in CO2 at 50 °C and 90 bar. Next, we characterized the partitioning of water between a montmorillonite clay and scCO2 at 50 °C and 90 bar. Transmission-mode spectra were used to quantify changes in the clay’s sorbed water concentration as a function of scCO2 hydration, and ATR measurements provided insights into competitive residency of water and CO2 on the clay surface and in the interlayer. Finally, we demonstrated how time-dependent studies can be conducted with the system by monitoring the carbonation reaction of forsterite (Mg2SiO4) in water-bearing scCO2 at 50 °C and 90 bar. Immediately after water dissolved in the scCO2, a thin film of adsorbed water formed on the mineral surface, and the film thickness increased with time as the forsterite began to dissolve. However, after approximately 2.5 hours, the trend reversed, and a carbonate precipitate began to form on the forsterite surface, exposing dramatic chemical changes in the thin-water film. Collectively, these applications illustrate how the high-pressure IR titration system can provide molecular-level information about the interactions between variably wet scCO2 and minerals relevant to underground storage of CO2 (geologic carbon sequestration). The apparatus could also be utilized to study high-pressure interfacial chemistry in other areas such as catalysis, polymerization, food processing, and oil and gas recovery.

  10. Automated high-pressure titration system with in situ infrared spectroscopic detection

    SciTech Connect (OSTI)

    Thompson, Christopher J., E-mail: chris.thompson@pnnl.gov; Martin, Paul F.; Chen, Jeffrey; Schaef, Herbert T.; Rosso, Kevin M.; Felmy, Andrew R.; Loring, John S. [Pacific Northwest National Laboratory, Richland, Washington 99352 (United States)] [Pacific Northwest National Laboratory, Richland, Washington 99352 (United States); Benezeth, Pascale [Géosciences Environnement Toulouse (GET), CNRS-Université de Toulouse, 31400 Toulouse (France)] [Géosciences Environnement Toulouse (GET), CNRS-Université de Toulouse, 31400 Toulouse (France)

    2014-04-15T23:59:59.000Z

    A fully automated titration system with infrared detection was developed for investigating interfacial chemistry at high pressures. The apparatus consists of a high-pressure fluid generation and delivery system coupled to a high-pressure cell with infrared optics. A manifold of electronically actuated valves is used to direct pressurized fluids into the cell. Precise reagent additions to the pressurized cell are made with calibrated tubing loops that are filled with reagent and placed in-line with the cell and a syringe pump. The cell's infrared optics facilitate both transmission and attenuated total reflection (ATR) measurements to monitor bulk-fluid composition and solid-surface phenomena such as adsorption, desorption, complexation, dissolution, and precipitation. Switching between the two measurement modes is accomplished with moveable mirrors that direct the light path of a Fourier transform infrared spectrometer into the cell along transmission or ATR light paths. The versatility of the high-pressure IR titration system was demonstrated with three case studies. First, we titrated water into supercritical CO{sub 2} (scCO{sub 2}) to generate an infrared calibration curve and determine the solubility of water in CO{sub 2} at 50?°C and 90 bar. Next, we characterized the partitioning of water between a montmorillonite clay and scCO{sub 2} at 50?°C and 90 bar. Transmission-mode spectra were used to quantify changes in the clay's sorbed water concentration as a function of scCO{sub 2} hydration, and ATR measurements provided insights into competitive residency of water and CO{sub 2} on the clay surface and in the interlayer. Finally, we demonstrated how time-dependent studies can be conducted with the system by monitoring the carbonation reaction of forsterite (Mg{sub 2}SiO{sub 4}) in water-bearing scCO{sub 2} at 50?°C and 90 bar. Immediately after water dissolved in the scCO{sub 2}, a thin film of adsorbed water formed on the mineral surface, and the film thickness increased with time as the forsterite began to dissolve. However, after approximately 2.5 h, the trend reversed, and a carbonate precipitate began to form on the forsterite surface, exposing dramatic chemical changes in the thin-water film. Collectively, these applications illustrate how the high-pressure IR titration system can provide molecular-level information about the interactions between variably wet scCO{sub 2} and minerals relevant to underground storage of CO{sub 2} (geologic carbon sequestration). The apparatus could also be utilized to study high-pressure interfacial chemistry in other areas such as catalysis, polymerization, food processing, and oil and gas recovery.

  11. System and method for constructing filters for detecting signals whose frequency content varies with time

    DOE Patents [OSTI]

    Qian, S.; Dunham, M.E.

    1996-11-12T23:59:59.000Z

    A system and method are disclosed for constructing a bank of filters which detect the presence of signals whose frequency content varies with time. The present invention includes a novel system and method for developing one or more time templates designed to match the received signals of interest and the bank of matched filters use the one or more time templates to detect the received signals. Each matched filter compares the received signal x(t) with a respective, unique time template that has been designed to approximate a form of the signals of interest. The robust time domain template is assumed to be of the order of w(t)=A(t)cos(2{pi}{phi}(t)) and the present invention uses the trajectory of a joint time-frequency representation of x(t) as an approximation of the instantaneous frequency function {phi}{prime}(t). First, numerous data samples of the received signal x(t) are collected. A joint time frequency representation is then applied to represent the signal, preferably using the time frequency distribution series. The joint time-frequency transformation represents the analyzed signal energy at time t and frequency f, P(t,f), which is a three-dimensional plot of time vs. frequency vs. signal energy. Then P(t,f) is reduced to a multivalued function f(t), a two dimensional plot of time vs. frequency, using a thresholding process. Curve fitting steps are then performed on the time/frequency plot, preferably using Levenberg-Marquardt curve fitting techniques, to derive a general instantaneous frequency function {phi}{prime}(t) which best fits the multivalued function f(t). Integrating {phi}{prime}(t) along t yields {phi}{prime}(t), which is then inserted into the form of the time template equation. A suitable amplitude A(t) is also preferably determined. Once the time template has been determined, one or more filters are developed which each use a version or form of the time template. 7 figs.

  12. Detection technique and front-end RF tunable filter for cognitive radio systems

    E-Print Network [OSTI]

    Park, Sanghoon

    2010-01-01T23:59:59.000Z

    Introduction to Microelectromechanical Systems Engineer-high reliability. 2. Microelectromechanical system filters [73–80]: Microelectromechanical systems (MEMS) is the

  13. The role of the total entropy production in dynamics of open quantum systems in detection of non-Markovianity

    E-Print Network [OSTI]

    S. Salimi; S. Haseli; A. S. Khorashad

    2015-04-19T23:59:59.000Z

    In the theory of open quantum systems interaction is a fundamental concepts in the review of the dynamics of open quantum systems. Correlation, both classical and quantum one, is generated due to interaction between system and environment. Here, we recall the quantity which well known as total entropy production. Appearance of total entropy production is due to the entanglement production between system an environment. In this work, we discuss about the role of the total entropy production for detecting non-Markovianity. By utilizing the relation between total entropy production and total correlation between subsystems, one can see a temporary decrease of total entropy production is a signature of non-Markovianity.

  14. Apparatus for detecting a magnetic anomaly contiguous to remote location by squid gradiometer and magnetometer systems

    DOE Patents [OSTI]

    Overton, Jr., William C. (Los Alamos, NM); Steyert, Jr., William A. (Los Alamos, NM)

    1984-01-01T23:59:59.000Z

    A superconducting quantum interference device (SQUID) magnetic detection apparatus detects magnetic fields, signals, and anomalies at remote locations. Two remotely rotatable SQUID gradiometers may be housed in a cryogenic environment to search for and locate unambiguously magnetic anomalies. The SQUID magnetic detection apparatus can be used to determine the azimuth of a hydrofracture by first flooding the hydrofracture with a ferrofluid to create an artificial magnetic anomaly therein.

  15. Detecting Large-Scale System Problems by Mining Console Logs Wei Xu xuw@cs.berkeley.edu

    E-Print Network [OSTI]

    Jordan, Michael I.

    . Researchers and operators have been using all kinds of mon- itoring data, from the simplest numerical metrics Problems by Mining Console Logs part operator, and charged with fixing the problem-- are usuallyDetecting Large-Scale System Problems by Mining Console Logs Wei Xu xuw@cs.berkeley.edu EECS

  16. Oil and gas exploration system and method for detecting trace amounts of hydrocarbon gases in the atmosphere

    DOE Patents [OSTI]

    Wamsley, Paula R. (Littleton, CO); Weimer, Carl S. (Littleton, CO); Nelson, Loren D. (Evergreen, CO); O'Brien, Martin J. (Pine, CO)

    2003-01-01T23:59:59.000Z

    An oil and gas exploration system and method for land and airborne operations, the system and method used for locating subsurface hydrocarbon deposits based upon a remote detection of trace amounts of gases in the atmosphere. The detection of one or more target gases in the atmosphere is used to indicate a possible subsurface oil and gas deposit. By mapping a plurality of gas targets over a selected survey area, the survey area can be analyzed for measurable concentration anomalies. The anomalies are interpreted along with other exploration data to evaluate the value of an underground deposit. The system includes a differential absorption lidar (DIAL) system with a spectroscopic grade laser light and a light detector. The laser light is continuously tunable in a mid-infrared range, 2 to 5 micrometers, for choosing appropriate wavelengths to measure different gases and avoid absorption bands of interference gases. The laser light has sufficient optical energy to measure atmospheric concentrations of a gas over a path as long as a mile and greater. The detection of the gas is based on optical absorption measurements at specific wavelengths in the open atmosphere. Light that is detected using the light detector contains an absorption signature acquired as the light travels through the atmosphere from the laser source and back to the light detector. The absorption signature of each gas is processed and then analyzed to determine if a potential anomaly exists.

  17. Test-Bed of a Real Time Detection System for L/H & H/L Transitions Implemented with the ITMS Platform

    E-Print Network [OSTI]

    Test-Bed of a Real Time Detection System for L/H & H/L Transitions Implemented with the ITMS Platform

  18. Insider Attacker Detection in Wireless Sensor Fang Liu & Xiuzhen Cheng

    E-Print Network [OSTI]

    Cheng, Xiuzhen "Susan"

    to be low-cost and lack of tamper resistance. The compromise or capture of a sensor releases all the intrusion detection techniques developed for a fixed wired network. A typical low-cost sensor has limited working towards securing sensor networks in the fields of pairwise key establishment [13

  19. 856 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS--PART C: APPLICATIONS AND REVIEWS, VOL. 38, NO. 6, NOVEMBER 2008 Designing Effective Alarms for Radiation Detection

    E-Print Network [OSTI]

    Parasuraman, Raja

    ://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TSMCC.2008.2001708 concern is the detection and interdiction of illicit, NO. 6, NOVEMBER 2008 Designing Effective Alarms for Radiation Detection in Homeland Security, the human factors involved in the de- sign of effective homeland security threat detection systems

  20. Method of analyzing multiple sample simultaneously by detecting absorption and systems for use in such a method

    DOE Patents [OSTI]

    Yeung, Edward S.; Gong, Xiaoyi

    2004-09-07T23:59:59.000Z

    The present invention provides a method of analyzing multiple samples simultaneously by absorption detection. The method comprises: (i) providing a planar array of multiple containers, each of which contains a sample comprising at least one absorbing species, (ii) irradiating the planar array of multiple containers with a light source and (iii) detecting absorption of light with a detetion means that is in line with the light source at a distance of at leaat about 10 times a cross-sectional distance of a container in the planar array of multiple containers. The absorption of light by a sample indicates the presence of an absorbing species in it. The method can further comprise: (iv) measuring the amount of absorption of light detected in (iii) indicating the amount of the absorbing species in the sample. Also provided by the present invention is a system for use in the abov metho.The system comprises; (i) a light source comrnpising or consisting essentially of at leaat one wavelength of light, the absorption of which is to be detected, (ii) a planar array of multiple containers, and (iii) a detection means that is in line with the light source and is positioned in line with and parallel to the planar array of multiple contiainers at a distance of at least about 10 times a cross-sectional distance of a container.

  1. Implementation of a Dual Containment/Surveillance System utilizing scene-change detection and radio frequency technology

    SciTech Connect (OSTI)

    FITZGERALD, ERIC; KOENIG, RICHARD

    2005-06-27T23:59:59.000Z

    This paper will examine the implementation of scene-change detection and radio frequency technology within a Dual Containment/Surveillance (C/S) System. Additionally, this paper will examine the human performance factors in the operation of these systems. Currently, Westinghouse Savannah River Company utilizes the Continuous Item Monitoring and Surveillance System (CIMS) in the performance of Dual C/S to monitor special nuclear materials within International Atomic Energy Agency (IAEA) Safeguards and Domestic Safeguards. CIMS is comprised of the Material Monitoring System (MMS) (R), a multi-media electronic surveillance system developed by Sandia National Laboratory which incorporates the use of active seals commonly called Radio Frequency Tamper Indicating Devices (RFTIDs), NT Vision (R) as developed by Los Alamos National Laboratory, a Microsoft Windows NT (R) based operating system providing for domestic scene-change detection and the Digital Multi-Camera Optical Surveillance System (DMOS) (R) which provides scene-change detection for IAEA. Although this paper will focus on the implementation of Dual C/S utilizing the Continuous Item Monitoring and Surveillance System, the necessity for a thorough review of Safeguards and Security requirements with organizations and personnel having minimal to no prior MPC&A training will also be covered. Successful Dual C/S implementation plans must consider not only system design and failure modes, but must also be accompanied with the appropriate ''mind shift'' within operations and technical personnel. This is required to ensure completion of both physical and electronic activities, and system design changes are performed conscientiously and with full awareness of MPC&A requirements.

  2. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware

    E-Print Network [OSTI]

    Tierney, Brian L

    2008-01-01T23:59:59.000Z

    Mai, M. , Paxson, V. , Sommer, R. : Dynamic Application-24) (1999) 2435–2463 3. Sommer, R. , Paxson, V. : ExploitingA. , Paxson, V. , Sommer, R. : Operational Experiences with

  3. An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks

    E-Print Network [OSTI]

    California at Santa Barbara, University of

    University of California, Santa Barbara {vigna,sumitg,kavitha,ebelding,kemm}@cs.ucsb.edu Abstract Mobile ad. These techniques prevent a range of attacks against routing protocols but are expensive to de- ploy on energy the stream of audit data to identify evidence of the occurrence of the modeled attacks. Misuse and anomaly

  4. An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks

    E-Print Network [OSTI]

    Belding-Royer, Elizabeth M.

    University of California, Santa Barbara vigna,sumitg,kavitha,ebelding,kemm¡ @cs.ucsb.edu Abstract Mobile ad. These techniques prevent a range of attacks against routing protocols but are expensive to de- ploy on energy "signatures") that are matched against the stream of audit data to identify evidence of the oc- currence

  5. A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions

    E-Print Network [OSTI]

    Lee, Wenke

    , Rahul A. Nimbalkar 1 , Kam K. Yee 1 , Sunil B. Patil 1 , Pragneshkumar H. Desai 1 , Thuan T. Tran 1

  6. Intrusion Detection in SCADA Networks Rafael Ramos Regis Barbosa and Aiko Pras

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    facilities such as water distribution infrastructures, electricity generation plants and oil refineries need industrial facilities, such as water dis- tribution infrastructures. With the goal of reducing costs industry and government, leading to several efforts to increase secu- rity in these industrial networks

  7. Comparison of Two Intrusion Detection Schemes for Sparsely Connected Ad Hoc Networks M. Chuah, P. Yang

    E-Print Network [OSTI]

    Chuah, Mooi-Choo "Mooi"

    ] uses a variant of Telsa [8] to provide source authentication for DSR. All the above approaches suggest

  8. Fault Detection and Diagnostics for Non-Intrusive Monitoring Using Motor Harmonics

    E-Print Network [OSTI]

    Orji, Uzoma A.

    Harmonic analysis of motor current has been used to track the speed of motors for sensorless control. Algorithms exist that track the speed of a motor given a dedicated stator current measurement, for example. Harmonic ...

  9. Appears in 8th International Symposium on Recent Advances in Intrusion Detection (RAID 2005)

    E-Print Network [OSTI]

    and computing re- sources, worms provide potential vehicles for DDoS at- tacks, as seen in the case of So. A recent analyti- cal study also showed that when deployed at appropriate points in the network, rate of the various schemes. Our study is based on real traffic traces collected from the border of a network

  10. Neutrino Solar Flare detection for a saving alert system of satellites and astronauts

    E-Print Network [OSTI]

    Fargion, Daniele

    2011-01-01T23:59:59.000Z

    Largest Solar Neutrino Flare may be soon detectable by Deep Core neutrino detector immediately and comunicate to satellites or astronauts. Its detection is the fastest manifestation of a later (tens minutes,hours) dangerous cosmic shower. The precursor trigger maybe saving satellites and even long flight astronauts lives. We shall suggest how. Moreover their detection may probe the inner solar flare acceleration place as well as the neutrino flavor mixing in a new different parameter windows. We show the updated expected rate and signature of neutrinos and antineutrinos in largest solar flare for present tens Megaton Deep Core telescope at tens Gev range. Speculation for additional Icecube gigaton array signals are also considered.

  11. Neutrino Solar Flare detection for a saving alert system of satellites and astronauts

    E-Print Network [OSTI]

    Daniele Fargion

    2011-06-19T23:59:59.000Z

    Largest Solar Neutrino Flare may be soon detectable by Deep Core neutrino detector immediately and comunicate to satellites or astronauts. Its detection is the fastest manifestation of a later (tens minutes,hours) dangerous cosmic shower. The precursor trigger maybe saving satellites and even long flight astronauts lives. We shall suggest how. Moreover their detection may probe the inner solar flare acceleration place as well as the neutrino flavor mixing in a new different parameter windows. We show the updated expected rate and signature of neutrinos and antineutrinos in largest solar flare for present tens Megaton Deep Core telescope at tens Gev range. Speculation for additional Icecube gigaton array signals are also considered.

  12. Piezoelectric-based in-situ damage detection of composite materials for structural health monitoring systems

    E-Print Network [OSTI]

    Kessler, Seth Stovack, 1977-

    2002-01-01T23:59:59.000Z

    Cost-effective and reliable damage detection is critical for the utilization of composite materials. This thesis presents the conclusions of an analytical and experimental survey of candidate methods for in-situ damage ...

  13. Improvements to a queue and delay estimation algorithm utilized in video imaging vehicle detection systems

    E-Print Network [OSTI]

    Cheek, Marshall Tyler

    2007-09-17T23:59:59.000Z

    , then utilizing the frequency and power of the spectrum associated with images produced within this analysis window (8, 9). Furthermore, methods developed by Hoose utilized a full frame approach for queue detection (9). The full frame method is able...

  14. A Comparison of Fault Detection Methods For a Transcritical Refrigeration System

    E-Print Network [OSTI]

    Janecke, Alex Karl

    2012-10-19T23:59:59.000Z

    pairings of four faults: over/undercharge, evaporator fouling, gas cooler fouling, and compressor valve leakage. This technique allows for low cost measurement and independent detection of individual faults even when multiple faults are present. Results...

  15. Towards the development of an explosives detection system using Neutron Resonance Radiography

    E-Print Network [OSTI]

    Raas, Whitney

    2007-01-01T23:59:59.000Z

    Detection of conventional explosives remains a challenge to air security, as indicated by recent reports detailing lapses in security screening and new requirements that mandate screening 100% of checked luggage. Neutron ...

  16. Broken Bar Detection in Synchronous Machines Based Wind Energy Conversion System 

    E-Print Network [OSTI]

    Rahimian, Mina Mashhadi

    2012-10-19T23:59:59.000Z

    Electrical machines are subject to different types of failures. Early detection of the incipient faults and fast maintenance may prevent costly consequences. Fault diagnosis of wind turbine is especially important because they are situated...

  17. A system for the detection of concealed nuclear weapons and fissile material aboard cargo cotainerships

    E-Print Network [OSTI]

    Gallagher, Shawn P., S.M. Massachusetts Institute of Technology

    2005-01-01T23:59:59.000Z

    A new approach to the detection of concealed nuclear weapons and fissile material aboard cargo containerships is proposed. The ship-based approach removes the constraints of current thinking by addressing the threat of ...

  18. Decision-feedback multiple differential detection for space-time coded OFDM systems

    E-Print Network [OSTI]

    Liu, Yan

    2001-01-01T23:59:59.000Z

    Differential detection (DD) is an attractive simple technique in flat-fading environments since it is very robust and does not require carrier phase tracking. However, performance of the conventional DD method in flat-fading channels is limited...

  19. Detection and Analysis of Threats to the Energy Sector: DATES

    SciTech Connect (OSTI)

    Alfonso Valdes

    2010-03-31T23:59:59.000Z

    This report summarizes Detection and Analysis of Threats to the Energy Sector (DATES), a project sponsored by the United States Department of Energy and performed by a team led by SRI International, with collaboration from Sandia National Laboratories, ArcSight, Inc., and Invensys Process Systems. DATES sought to advance the state of the practice in intrusion detection and situational awareness with respect to cyber attacks in energy systems. This was achieved through adaptation of detection algorithms for process systems as well as development of novel anomaly detection techniques suited for such systems into a detection suite. These detection components, together with third-party commercial security systems, were interfaced with the commercial Security Information Event Management (SIEM) solution from ArcSight. The efficacy of the integrated solution was demonstrated on two testbeds, one based on a Distributed Control System (DCS) from Invensys, and the other based on the Virtual Control System Environment (VCSE) from Sandia. These achievements advance the DOE Cybersecurity Roadmap [DOE2006] goals in the area of security monitoring. The project ran from October 2007 until March 2010, with the final six months focused on experimentation. In the validation phase, team members from SRI and Sandia coupled the two test environments and carried out a number of distributed and cross-site attacks against various points in one or both testbeds. Alert messages from the distributed, heterogeneous detection components were correlated using the ArcSight SIEM platform, providing within-site and cross-site views of the attacks. In particular, the team demonstrated detection and visualization of network zone traversal and denial-of-service attacks. These capabilities were presented to the DistribuTech Conference and Exhibition in March 2010. The project was hampered by interruption of funding due to continuing resolution issues and agreement on cost share for four months in 2008. This resulted in delays in finalizing agreements with commercial partners, and in particular the Invensys testbed was not installed until December 2008 (as opposed to the March 2008 plan). The project resulted in a number of conference presentations and publications, and was well received when presented at industry forums. In spite of some interest on the part of the utility sector, we were unfortunately not able to engage a utility for a full-scale pilot deployment.

  20. Nuclear reactor with internal thimble-type delayed neutron detection system

    SciTech Connect (OSTI)

    Gross, K.C.; Poloncsik, J.; Lambert, J.D.B.

    1990-07-03T23:59:59.000Z

    This paper describes a liquid-metal cooled nuclear reactor. It comprises: a housing having a core containing nuclear material, a shell and tube heat exchanger positioned within the housing. The shell and tube heat exchanger have the tubes thereof arranged in parallel, a primary coolant within the shell and tube heat exchanger, means for detecting positioned within a tube in the shell and tube heat exchanger for generating a signal in response to a reaction detected by the means for detecting, the means for detecting including signal detectors D-1, D-2, and D-3 selectively spaced from one another along the coolant flow within the shell and tube heat exchanger so that the total time lapsed after the occurrence of the reaction and a delayed-neutron is detected is: TOTAL = T{sub h} + T{sub t} + T{sub d}. Where: T{sub h} = isotopic holdup time for the delayed-neutron traveling from the reaction spot to the coolant T{sub t} = transit time for the delayed-neutron traveling from the coolant to the heat exchanger inlet T{sub d} = constant transit time for the delayed-neutrons to reach each of the delayed-neutron detectors D-1, D-2, and D-3, which is dependent upon the position of the delayed-neutron detector; and a mechanism remotely connected to the signal detectors to record the reaction detected thereby.