National Library of Energy BETA

Sample records for intrusion detection systems

  1. Interior intrusion detection systems

    SciTech Connect (OSTI)

    Rodriguez, J.R.; Matter, J.C. ); Dry, B. )

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  2. Intrusion Detection 1 02/09/00 Computer System Intrusion Detection

    E-Print Network [OSTI]

    Lee, Ruby B.

    Intrusion Detection 1 02/09/00 Computer System Intrusion Detection: A Survey1 Anita K. Jones in computer systems increases in importance as computers are increasingly integrated into the systems that we detection as performed in software in the context of operating systems for a single computer, a distributed

  3. Characterizing and Improving Distributed Intrusion Detection Systems.

    SciTech Connect (OSTI)

    Hurd, Steven A.; Proebstel, Elliot P.

    2007-11-01

    Due to ever-increasing quantities of information traversing networks, network administrators are developing greater reliance upon statistically sampled packet information as the source for their intrusion detection systems (IDS). Our research is aimed at understanding IDS performance when statistical packet sampling is used. Using the Snort IDS and a variety of data sets, we compared IDS results when an entire data set is used to the results when a statistically sampled subset of the data set is used. Generally speaking, IDS performance with statistically sampled information was shown to drop considerably even under fairly high sampling rates (such as 1:5). Characterizing and Improving Distributed Intrusion Detection Systems4AcknowledgementsThe authors wish to extend our gratitude to Matt Bishop and Chen-Nee Chuah of UC Davis for their guidance and support on this work. Our thanks are also extended to Jianning Mai of UC Davis and Tao Ye of Sprint Advanced Technology Labs for their generous assistance.We would also like to acknowledge our dataset sources, CRAWDAD and CAIDA, without which this work would not have been possible. Support for OC48 data collection is provided by DARPA, NSF, DHS, Cisco and CAIDA members.

  4. Visual monitoring environments, such as intrusion detection systems, debugging

    E-Print Network [OSTI]

    Erbacher, Robert F.

    Abstract Visual monitoring environments, such as intrusion detection systems, debugging Database Visualization, On-Line Monitoring 1. Introduction Most environments developed by or with the aid environments, and feature extraction systems, require that a user familiar with the target domain examine, most

  5. Neural Network Based Intrusion Detection System for Critical Infrastructures

    SciTech Connect (OSTI)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  6. Guide to Intrusion Detection and Prevention Systems

    E-Print Network [OSTI]

    's responsibilities include the development of management, administrative, technical, and physical standards Institute of Standards and Technology KarenScarfone PeterMell Special Publication 800-94 Revision 1 (Draft Systems (IDPS) (Draft) Recommendations of the National Institute of Standards and Technology Karen

  7. Anomaly Intrusion Detection in Dynamic Execution Environments

    E-Print Network [OSTI]

    New Mexico, University of

    of Microsoft's .NET project [10]. These technologies will further decouple hardware and software, allowing intrusion detection with extremely low performance penal- ties. Because each virtual machine (VM to improve intrusion detection[27, 36, 3]. Several such systems have been constructed, many with the idea

  8. Intrusion Detection using Sequences of System Calls Steven A. Hofmeyr

    E-Print Network [OSTI]

    New Mexico, University of

    Somayaji Dept. of Computer Science University of New Mexico Albuquerque, NM 87131-1386 steveah buffer overflow or bug in Microsoft Internet Explorer, our applications and operating systems are full

  9. HPNAIDM: The High-Performance Network Anomaly/Intrusion Detection and Mitigation System

    SciTech Connect (OSTI)

    Chen, Yan [Northwesten University] [Northwesten University

    2013-12-05

    Identifying traffic anomalies and attacks rapidly and accurately is critical for large network operators. With the rapid growth of network bandwidth, such as the next generation DOE UltraScience Network, and fast emergence of new attacks/virus/worms, existing network intrusion detection systems (IDS) are insufficient because they: • Are mostly host-based and not scalable to high-performance networks; • Are mostly signature-based and unable to adaptively recognize flow-level unknown attacks; • Cannot differentiate malicious events from the unintentional anomalies. To address these challenges, we proposed and developed a new paradigm called high-performance network anomaly/intrustion detection and mitigation (HPNAIDM) system. The new paradigm is significantly different from existing IDSes with the following features (research thrusts). • Online traffic recording and analysis on high-speed networks; • Online adaptive flow-level anomaly/intrusion detection and mitigation; • Integrated approach for false positive reduction. Our research prototype and evaluation demonstrate that the HPNAIDM system is highly effective and economically feasible. Beyond satisfying the pre-set goals, we even exceed that significantly (see more details in the next section). Overall, our project harvested 23 publications (2 book chapters, 6 journal papers and 15 peer-reviewed conference/workshop papers). Besides, we built a website for technique dissemination, which hosts two system prototype release to the research community. We also filed a patent application and developed strong international and domestic collaborations which span both academia and industry.

  10. Intrusion detection using secure signatures

    DOE Patents [OSTI]

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  11. Toward Cost-Sensitive Modeling for Intrusion Detection Computer Science Department

    E-Print Network [OSTI]

    Toward Cost-Sensitive Modeling for Intrusion Detection Wenke Lee Computer Science Department North,ezk,weaselg@cs.columbia.edu Abstract Intrusion detection systems need to maximize security while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion detection models. We examine the major cost

  12. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems

    E-Print Network [OSTI]

    Chen, Ing-Ray

    within radio range Na b (t) Attacker strength detected at time t in Beta(, ) in Beta(, ) Number of ranging operations per node per TIDS Et Energy for transmission per node Er Energy for reception per node Ea Energy for analyzing data per node Es Energy for sensing per node Eo Initial system energy TIDS

  13. LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED

    E-Print Network [OSTI]

    Smith, Sean W.

    challenge, since on top of the resource restrictions inherent to embedded devices, SCADA systems must to intrusion detection for SCADA systems, and are currently porting Autoscopy to actual power hardware to test operating as part of a SCADA system, where this logic applies to the control of potentially hazardous

  14. Analysis and Application of Node Layout Algorithms for Intrusion Detection

    E-Print Network [OSTI]

    Erbacher, Robert F.

    monitoring environment aids system administrators in keeping track of the activities on such systems for complete analysis and monitoring of the environment. Developing an effective organization of the nodes or inconsequential. Our intrusion detection monitoring environment [6, 7] is geared towards aiding in this analysis

  15. Formalizing Sensitivity in Static Analysis for Intrusion Detection Henry Hanping Feng # , Jonathon T. Giffin + , Yong Huang # ,

    E-Print Network [OSTI]

    Miller, Barton P.

    of Electrical and Computer Engineering University of Massachusetts--Amherst {hfeng­based intrusion detection system (HIDS) monitors execution of a process to identify potentially mali­ cious

  16. SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA

    E-Print Network [OSTI]

    Gu, Guofei

    SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA Yong Wang1 to the Supervisory Con- trol And Data Acquisition (SCADA) system. Several intrusion detection schemes have been-graph-based detection scheme to defeat false data injec- tion attacks at the SCADA system, even when injected data may

  17. Multi-Level Alert Clustering for Intrusion Detection Sensor Data*

    E-Print Network [OSTI]

    Siraj, Ambareen

    multiple, diverse sensors. Intelligent sensor fusion of runtime behavior data is critical for such systemsMulti-Level Alert Clustering for Intrusion Detection Sensor Data* Ambareen Siraj Rayford B. Vaughn sensors that monitor security violations throughout the network. The outputs of the sensors must be fused

  18. Artificial Intelligence and Intrusion Detection: Current and Future Jeremy Frank

    E-Print Network [OSTI]

    Yoo, S. J. Ben

    Artificial Intelligence and Intrusion Detection: Current and Future Directions Jeremy Frank frank. Artificial Intelligence techniques can reduce the human effort required to build these systems and can data. We survey uses of artificial intelligence methods in ID, and present an example using feature

  19. Special Publication 800-94 Guide to Intrusion Detection

    E-Print Network [OSTI]

    of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical) Recommendations of the National Institute of Standards and Technology KarenScarfone PeterMell #12;Guide to Intrusion Detection and Prevention Systems (IDPS) Recommendations of the National Institute of Standards

  20. Non-intrusive fault detection in reciprocating compressors

    E-Print Network [OSTI]

    Schantz, Christopher James

    2011-01-01

    This thesis presents a set of techniques for non-intrusive sensing and fault detection in reciprocating compressors driven by induction motors. The procedures developed here are "non-intrusive" because they rely only on ...

  1. c 2013 David Raymond Grochocki Jr DEPLOYMENT CONSIDERATIONS FOR INTRUSION DETECTION SYSTEMS IN

    E-Print Network [OSTI]

    Sanders, William H.

    detect attacks. Using the information taken from the failure scenarios and knowledge of how encrypted Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security

  2. Distributed fiber optic moisture intrusion sensing system

    DOE Patents [OSTI]

    Weiss, Jonathan D. (Albuquerque, NM)

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  3. Bloom Filter Based Intrusion Detection for Smart Grid 

    E-Print Network [OSTI]

    Parthasarathy, Saranya

    2012-07-16

    This thesis addresses the problem of local intrusion detection for SCADA (Supervisory Control and Data Acquisition) field devices in the smart grid. A methodology is proposed to detect anomalies in the communication patterns using a combination of n...

  4. Intrusion Detection, Diagnosis, and Recovery with SelfSecuring Storage

    E-Print Network [OSTI]

    Intrusion Detection, Diagnosis, and Recovery with Self­Securing Storage John Strunk, Garth Goodson Carnegie Mellon University Pittsburgh, 15213 Abstract Self­securing storage turns storage devices active parts of intrusion survival strategy. From behind storage interface (e.g., SCSI CIFS), a self

  5. Challenges and Solutions for Intrusion Detection in Wireless Mesh Networks 

    E-Print Network [OSTI]

    Hassanzadeh, Amin

    2014-05-03

    The problem of intrusion detection in wireless mesh networks (WMN) is challenging, primarily because of lack of single vantage points where traffic can be analyzed and the limited resources available to participating nodes. Although the problem has...

  6. 29.01.03. M1.11 Information Resources Intrusion Detection Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03. M1.11 Information Resources ­ Intrusion Detection Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.11 Information Resources ­ Intrusion Detection Approved July 18, 2005 Revised April 27 security policy. As information systems grow in complexity, effective security systems must evolve

  7. The evolution of Interior Intrusion Detection Technology at Sandia National Laboratories

    SciTech Connect (OSTI)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems.

  8. Abstract--Intrusion detection is a mechanism used to detect various attacks on a wired or wireless network. Port scanning is

    E-Print Network [OSTI]

    Aloul, Fadi

    precedence. Because, it is not feasible to build a secure system with no vulnerabilities, intrusion detection becomes an important area of research. An intrusion detection system (IDS) is an automated system designed Systems (IDS) is to protect the availability, confidentiality and integrity of critical networked

  9. Minimally intrusive strategies for fault detection and energy monitoring

    E-Print Network [OSTI]

    Cox, Robert Williams, 1979-

    2006-01-01

    This thesis addresses the need for automated monitoring systems that rely on minimally intrusive sensor arrays. The monitoring techniques employed in this thesis require fewer sensors because they take a different approach ...

  10. Learning Cost-Sensitve Classification Rules for Network Intrusion Detection using RIPPER

    E-Print Network [OSTI]

    Yang, Junfeng

    Report CUCS-035-1999 Advanced Intelligent Systems CS4721 Spring 1999 Final Project Matthew Miller which can be used to test live network stream input in order to detect intrusions. This is done connections to build a set of connection profile records that can be useful in detection [Lee 99

  11. Intrusion Detection in SCADA Networks Rafael Ramos Regis Barbosa and Aiko Pras

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    of a novel flow-based intrusion detection system. Based on the assumption that SCADA net- works are well facilities such as water distribution infrastructures, electricity generation plants and oil refineries need proposal to address the problem of intru- sion detection in SCADA networks. Based on the assumption

  12. Real-time processing of a long perimeter fiber optic intrusion system 

    E-Print Network [OSTI]

    Snider, William Timothy

    2009-09-30

    This thesis reports on recent advances made in real-time intruder detection for an intrusion system developed at Texas A&M University that utilizes a phase-sensitive optical time-domain reflectometer. The system uses light ...

  13. Evaluation of Non-intrusive Traffic Detection Technologies Phase III

    E-Print Network [OSTI]

    Minnesota, University of

    TPF-5(171) Evaluation of Non-intrusive Traffic Detection Technologies Ð Phase III #12 not intrude into pavement for installation. ·! Sensors above, below or to the side of the roadway qualify;Miovision #12;Miovision #12;Laser-based sensors #12;PEEK AxleLight #12;TIRTL #12;TIRTL #12;#12;#12;#12;

  14. Detection and diagnosis of faults and energy monitoring of HVAC systems with least-intrusive power analysis

    E-Print Network [OSTI]

    Luo, Dong, 1966-

    2001-01-01

    Faults indicate degradation or sudden failure of equipment in a system. Widely existing in heating, ventilating, and air conditioning (HVAC) systems, faults always lead to inefficient energy consumption, undesirable indoor ...

  15. Non-intrusive cooling system

    DOE Patents [OSTI]

    Morrison, Edward F. (Burnt Hills, NY); Bergman, John W. (Barrington, NH)

    2001-05-22

    A readily replaceable heat exchange cooling jacket for applying fluid to a system conduit pipe. The cooling jacket comprises at least two members, separable into upper and lower portions. A chamber is formed between the conduit pipe and cooling jacket once the members are positioned about the pipe. The upper portion includes a fluid spray means positioned above the pipe and the bottom portion includes a fluid removal means. The heat exchange cooling jacket is adaptable with a drain tank, a heat exchanger, a pump and other standard equipment to provide a system for removing heat from a pipe. A method to remove heat from a pipe, includes the steps of enclosing a portion of the pipe with a jacket to form a chamber between an outside surface of the pipe and the cooling jacket; spraying cooling fluid at low pressure from an upper portion of the cooling jacket, allowing the fluid to flow downwardly by gravity along the surface of the pipe toward a bottom portion of the chamber; and removing the fluid at the bottom portion of the chamber.

  16. Cybersecurity Intrusion Detection and Security Monitoring for...

    Office of Environmental Management (EM)

    tools to provide visibility into wireless FAN communications. Project Description This project conducts research to accelerate development of a utility monitoring system to...

  17. Smart container UWB sensor system for situational awareness of intrusion alarms

    DOE Patents [OSTI]

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.; Leach, Jr., Richard R.; Vigars, Mark L.

    2013-06-11

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability may also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system

  18. BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur

    E-Print Network [OSTI]

    Kundur, Deepa

    BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur for implementation across multiple resource constrained SCADA field devices in the smart grid. The predictable and regular nature of the SCADA communication patterns is exploited to detect intrusions in the field devices

  19. Using Model-based Intrusion Detection for SCADA Networks Steven Cheung Bruno Dutertre Martin Fong Ulf Lindqvist Keith Skinner

    E-Print Network [OSTI]

    Cheung, Steven

    Using Model-based Intrusion Detection for SCADA Networks Steven Cheung Bruno Dutertre Martin Fong In a model-based intrusion detection approach for protecting SCADA networks, we construct models and a prototype implementation of them for monitoring Modbus TCP networks. Keywords: SCADA security, intrusion

  20. WIND: Workload-aware INtrusion Detection Sushant Sinha, Farnam Jahanian, and Jignesh M. Patel

    E-Print Network [OSTI]

    Jahanian, Farnam

    WIND: Workload-aware INtrusion Detection Sushant Sinha, Farnam Jahanian, and Jignesh M. Patel an adaptive algorithm that systematically profiles attack signatures and network traffic to generate a high

  1. Sensing Danger: Innate Immunology for Intrusion Detection Uwe Aickelin and Julie Greensmith

    E-Print Network [OSTI]

    Aickelin, Uwe

    Sensing Danger: Innate Immunology for Intrusion Detection Uwe Aickelin and Julie Greensmith School years ago through the so called `Danger Project' (EPSRC GR/S47809/01). Our conclusion then was that AIS developed as part of the Danger Project - the Dendritic Cell Algorithm (DCA) and the Toll-like Receptor

  2. Federated Access Control and Intrusion Detection for Grid Computing Li Zhou Clifford Neuman

    E-Print Network [OSTI]

    Hwang, Kai

    , the management of access control and provision of intrusion detection is critical for grid services. Security a virtual #12;organization. Version 3 of Globus Toolkit (GT3) [8] and its accompanying Grid Security incorporate multiple grid security mechanisms and local security mechanisms together. The interrelation (AND

  3. Cognitive Radio Network as Wireless Sensor Network (III): Passive Target Intrusion Detection

    E-Print Network [OSTI]

    Qiu, Robert Caiming

    --A Cognitive Radio Network (CRN) based Wireless Sensor Network (WSN), as an extension of CRN, is explored for radio frequency (RF) passive target intrusion detection. Compared to a cheap WSN, the CRN based WSN data col- lected by the CRN based WSN. Preliminary experimental results are quite encouraging

  4. Diagnostic indicators for shipboard mechanical systems using Non-Intrusive Load Monitoring

    E-Print Network [OSTI]

    McKay, Thomas Duncan

    2006-01-01

    This thesis examines the use of Non-intrusive Load Monitoring (NILM) in auxiliary shipboard systems, such as a low pressure air system, to determine the state of equipment in larger connected systems, such as the main ...

  5. An analog and digital data acquisition system for Non-Intrusive Load Monitoring

    E-Print Network [OSTI]

    Clifford, Zachary Alan

    2009-01-01

    Non-Intrusive Load Monitoring (NILM) is a method for characterizing and monitoring discrete loads connected to a power distribution system. This can include a ship, a car, or a utility distribution system. The entire concept ...

  6. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware

    SciTech Connect (OSTI)

    Tierney, Brian L; Vallentin, Matthias; Sommer, Robin; Lee, Jason; Leres, Craig; Paxson, Vern; Tierney, Brian

    2007-09-19

    In this work we present a NIDS cluster as a scalable solution for realizing high-performance, stateful network intrusion detection on commodity hardware. The design addresses three challenges: (i) distributing traffic evenly across an extensible set of analysis nodes in a fashion that minimizes the communication required for coordination, (ii) adapting the NIDS's operation to support coordinating its low-level analysis rather than just aggregating alerts; and (iii) validating that the cluster produces sound results. Prototypes of our NIDS cluster now operate at the Lawrence Berkeley National Laboratory and the University of California at Berkeley. In both environments the clusters greatly enhance the power of the network security monitoring.

  7. Diagnostic indicators for shipboard systems using non-intrusive load monitoring

    E-Print Network [OSTI]

    DeNucci, Thomas W

    2005-01-01

    Field studies have demonstrated that the Non-Intrusive Load monitor (NILM) can provide real-time indication of the condition of electro-mechanical systems on board naval vessels. Results from data collected from engineering ...

  8. WG Intrusion and Fraud Detection for Web Services Marc Dacir, Ulrich Flegel (chair), Ralph Holz, Norbert Luttenberger

    E-Print Network [OSTI]

    Flegel, Ulrich

    , among them e.g. value added service composition, Web 2.0-enhanced communication sys- tems (e.g. basedWG Intrusion and Fraud Detection for Web Services Marc Daciér, Ulrich Flegel (chair), Ralph Holz, Norbert Luttenberger Motivation Web services (WS) technology bears the promise to finally bring the power

  9. Towards a non-Intrusive Recognition of Anomalous System Behavior in Data Centers

    E-Print Network [OSTI]

    Roma "La Sapienza", Università di

    Towards a non-Intrusive Recognition of Anomalous System Behavior in Data Centers Roberto Baldoni1 system of a data cen- ter that is able to infer when the data center is getting into an anoma- lous behavior by analyzing the power consumption at each server and the data center network traffic

  10. Experimental and numerical investigation of saltwater intrusion dynamics in flux-controlled groundwater systems

    E-Print Network [OSTI]

    Clement, Prabhakar

    -controlled groundwater systems Sun Woo Chang1 and T. Prabhakar Clement1 Received 13 March 2012; revised 25 June 2012; accepted 12 July 2012; published 19 September 2012. [1] Sea level rise and reduction of groundwater fluxes change­induced hydrological variables, groundwater flux, on saltwater intrusion process. We have

  11. Design and Implementation of an Android Host-based Intrusion Prevention System

    E-Print Network [OSTI]

    Lui, John C.S.

    Design and Implementation of an Android Host-based Intrusion Prevention System Mingshen Sun , Min University {mssun, mzheng, cslui}@cse.cuhk.edu.hk, jiang@cs.ncsu.edu ABSTRACT Android has a dominating share in the mobile market and there is a significant rise of mobile malware targeting An- droid devices. Android

  12. Distributed fiber optic intrusion sensor system for monitoring long perimeters 

    E-Print Network [OSTI]

    Juarez, Juan C.

    2009-06-02

    A distributed sensor using an optical fiber for detecting and locating intruders over long perimeters (>10 km) is described. Phase changes resulting from either the pressure of the intruder on the ground immediately above the buried fiber or from...

  13. Shipboard fluid system diagnostics using non-intrusive load monitoring

    E-Print Network [OSTI]

    Mitchell, Gregory R. (Gregory Reed)

    2007-01-01

    Systems on modem naval vessels are becoming exclusively dependent on electrical power. One example of this is the replacement of distilling and evaporator plants with reverse osmosis units. As the system is in continuous ...

  14. Resilient Control and Intrusion Detection for SCADA Systems

    E-Print Network [OSTI]

    Zhu, Xia Bonnie

    2011-01-01

    California iso wind generation forecast- ing service designto obtain accurate forecasts. Advancements in wind and solar

  15. Resilient Control and Intrusion Detection for SCADA Systems

    E-Print Network [OSTI]

    Zhu, Xia Bonnie

    2011-01-01

    Sets – Real Wind Power Data . . . . . . . . . . . . . . .to the anomaly size N Wind Power Hourly Measurements: (Up)short-term prediction of wind power: A literature overview.

  16. Computationally Efficient Neural Network Intrusion Security Awareness

    SciTech Connect (OSTI)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  17. Portable modular detection system

    DOE Patents [OSTI]

    Brennan, James S. (Rodeo, CA); Singh, Anup (Danville, CA); Throckmorton, Daniel J. (Tracy, CA); Stamps, James F. (Livermore, CA)

    2009-10-13

    Disclosed herein are portable and modular detection devices and systems for detecting electromagnetic radiation, such as fluorescence, from an analyte which comprises at least one optical element removably attached to at least one alignment rail. Also disclosed are modular detection devices and systems having an integrated lock-in amplifier and spatial filter and assay methods using the portable and modular detection devices.

  18. Network Intrusion Detection and Visualization using Aggregations in a Cyber Security Data Warehouse

    SciTech Connect (OSTI)

    Czejdo, Bogdan; Ferragut, Erik M; Goodall, John R; Laska, Jason A

    2012-01-01

    The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our pro-posed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.

  19. Automatic intrusion recovery with system-wide history B.S., Korea Advanced Institute of Science and Technology (2009)

    E-Print Network [OSTI]

    2009-01-01

    Automatic intrusion recovery with system-wide history by Taesoo Kim B.S., Korea Advanced Institute of Science and Technology (2009) S.M., Massachusetts Institute of Technology (2011) Submitted for the degree of Doctor of Philosophy at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2014 c Massachusetts

  20. Formalizing Sensitivity in Static Analysis for Intrusion Detection Henry Hanping Feng

    E-Print Network [OSTI]

    Jha, Somesh

    . Giffin , Yong Huang , Somesh Jha , Wenke Lee , and Barton P. Miller Department of Electrical of a process to identify potentially mali- cious behavior. An anomaly detection HIDS identifies vari- ations

  1. Evaluation of Non-Intrusive Load Monitoring for shipboard cycling system diagnostics

    E-Print Network [OSTI]

    Mosman, James P. (James Paul)

    2006-01-01

    The Non-Intrusive Load Monitor (NILM) is a device that utilizes voltage and current measurements to determine the operating schedule of all of the major loads on an electrical service. Additionally, the NILM can use its ...

  2. A Survey of Intrusion Detection in Wireless Network Applications Robert Mitchell and Ing-Ray Chen

    E-Print Network [OSTI]

    Cao, Yong

    these systems increases. Because of lower installation and maintenance costs, many of these systems are largely on insulin pumps [3] and cardiac de- vices [4], the DoS attack on a German power grid operator [5

  3. A survey of intrusion detection in wireless network applications Robert Mitchell, Ing-Ray Chen

    E-Print Network [OSTI]

    Chen, Ing-Ray

    and maintenance costs, many of these systems are largely networked by wireless means. In order to identify gaps area or critical resource (power substation, water treat- ment plant, center of government). Malicious

  4. Idaho Explosive Detection System

    ScienceCinema (OSTI)

    Klinger, Jeff

    2013-05-28

    Learn how INL researchers are making the world safer by developing an explosives detection system that can inspect cargo. For more information about INL security research, visit http://www.facebook.com/idahonationallaboratory

  5. Solar system fault detection

    DOE Patents [OSTI]

    Farrington, R.B.; Pruett, J.C. Jr.

    1984-05-14

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  6. Solar system fault detection

    DOE Patents [OSTI]

    Farrington, Robert B. (Wheatridge, CO); Pruett, Jr., James C. (Lakewood, CO)

    1986-01-01

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  7. Acoustic emission intrusion detector

    DOE Patents [OSTI]

    Carver, Donald W. (Knoxville, TN); Whittaker, Jerry W. (Knoxville, TN)

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal.

  8. Incipient Transient Detection in Reactor Systems: Experimental and Theoretical Investigation

    SciTech Connect (OSTI)

    Lefteri H. Tsoukalas; S.T. Revankar; X Wang; R. Sattuluri

    2005-09-27

    The main goal of this research was to develop a method for detecting reactor system transients at the earliest possible time through a comprehensive experimental, testing and benchmarking program. This approach holds strong promise for developing new diagnostic technologies that are non-intrusive, generic and highly portable across different systems. It will help in the design of new generation nuclear power reactors, which utilize passive safety systems with a reliable and non-intrusive multiphase flow diagnostic system to monitor the function of the passive safety systems. The main objective of this research was to develop an improved fuzzy logic based detection method based on a comprehensive experimental testing program to detect reactor transients at the earliest possible time, practically at their birth moment. A fuzzy logic and neural network based transient identification methodology and implemented in a computer code called PROTREN was considered in this research and was compared with SPRT (Sequentially Probability Ratio Testing) decision and Bayesian inference. The project involved experiment, theoretical modeling and a thermal-hydraulic code assessment. It involved graduate and undergraduate students participation providing them with exposure and training in advanced reactor concepts and safety systems. In this final report, main tasks performed during the project period are summarized and the selected results are presented. Detailed descriptions for the tasks and the results are presented in previous yearly reports (Revankar et al 2003 and Revankar et al 2004).

  9. Arc fault detection system

    DOE Patents [OSTI]

    Jha, Kamal N. (Bethel Park, PA)

    1999-01-01

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard.

  10. Arc fault detection system

    DOE Patents [OSTI]

    Jha, K.N.

    1999-05-18

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard. 1 fig.

  11. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  12. Real-time analysis of aggregate network traffic for anomaly detection 

    E-Print Network [OSTI]

    Kim, Seong Soo

    2005-08-29

    .........................................................................82 2. Identification of Attackers? and Victims? Entire IP Address..........84 F. Comparison with IDS .............................................................................86 1. Intrusion Detection System and Snort... resources. Attack propagation could be slowed through early detection of attacks. Traditionally, Intrusion detection system (IDS) tools that rely upon operating system logs, process behaviors and firewall logs have been employed to monitor the network...

  13. Intrusive gravity currents

    E-Print Network [OSTI]

    Hang, Alice Thanh

    2009-01-01

    The front speed of intrusive gravity currents. J. FluidP.F. Linden. Intrusive gravity currents. J. Fluid Mechanics,of mesoscale variability of gravity waves. Part II: Frontal,

  14. Incipient fire detection system

    DOE Patents [OSTI]

    Brooks, Jr., William K. (Newport News, VA)

    1999-01-01

    A method and apparatus for an incipient fire detection system that receives gaseous samples and measures the light absorption spectrum of the mixture of gases evolving from heated combustibles includes a detector for receiving gaseous samples and subjecting the samples to spectroscopy and determining wavelengths of absorption of the gaseous samples. The wavelengths of absorption of the gaseous samples are compared to predetermined absorption wavelengths. A warning signal is generated whenever the wavelengths of absorption of the gaseous samples correspond to the predetermined absorption wavelengths. The method includes receiving gaseous samples, subjecting the samples to light spectroscopy, determining wavelengths of absorption of the gaseous samples, comparing the wavelengths of absorption of the gaseous samples to predetermined absorption wavelengths and generating a warning signal whenever the wavelengths of absorption of the gaseous samples correspond to the predetermined absorption wavelengths. In an alternate embodiment, the apparatus includes a series of channels fluidically connected to a plurality of remote locations. A pump is connected to the channels for drawing gaseous samples into the channels. A detector is connected to the channels for receiving the drawn gaseous samples and subjecting the samples to spectroscopy. The wavelengths of absorption are determined and compared to predetermined absorption wavelengths is provided. A warning signal is generated whenever the wavelengths correspond.

  15. Evolution Induced Secondary Immunity: An Artificial Immune System based Intrusion Detection System

    E-Print Network [OSTI]

    Sanyal, Sugata

    Department of Computer Science, University of Mumbai, India 2 Department of Mathematics, Guru Nanak Khalsa College, University of Mumbai, India 3 Norwegian center Of Excellence, Q2S, Norwegian University Research, Mumbai, India 5 University Department of Computer Science, University of Mumbai, India divyata

  16. Particle detection systems and methods

    DOE Patents [OSTI]

    Morris, Christopher L.; Makela, Mark F.

    2010-05-11

    Techniques, apparatus and systems for detecting particles such as muons and neutrons. In one implementation, a particle detection system employs a plurality of drift cells, which can be for example sealed gas-filled drift tubes, arranged on sides of a volume to be scanned to track incoming and outgoing charged particles, such as cosmic ray-produced muons. The drift cells can include a neutron sensitive medium to enable concurrent counting of neutrons. The system can selectively detect devices or materials, such as iron, lead, gold, uranium, plutonium, and/or tungsten, occupying the volume from multiple scattering of the charged particles passing through the volume and can concurrently detect any unshielded neutron sources occupying the volume from neutrons emitted therefrom. If necessary, the drift cells can be used to also detect gamma rays. The system can be employed to inspect occupied vehicles at border crossings for nuclear threat objects.

  17. A non-intrusive fault tolerant framework for mission critical real-time systems

    E-Print Network [OSTI]

    Gorelov, Sébastien

    2005-01-01

    The need for dependable real-time systems for embedded application is growing, and, at the same time, so does the amount of functionality required from these systems. As testing can only show the presence of errors, not ...

  18. Protein detection system

    DOE Patents [OSTI]

    Fruetel, Julie A. (Livermore, CA); Fiechtner, Gregory J. (Bethesda, MD); Kliner, Dahv A. V. (San Ramon, CA); McIlroy, Andrew (Livermore, CA)

    2009-05-05

    The present embodiment describes a miniature, microfluidic, absorption-based sensor to detect proteins at sensitivities comparable to LIF but without the need for tagging. This instrument utilizes fiber-based evanescent-field cavity-ringdown spectroscopy, in combination with faceted prism microchannels. The combination of these techniques will increase the effective absorption path length by a factor of 10.sup.3 to 10.sup.4 (to .about.1-m), thereby providing unprecedented sensitivity using direct absorption. The coupling of high-sensitivity absorption with high-performance microfluidic separation will enable real-time sensing of biological agents in aqueous samples (including aerosol collector fluids) and will provide a general method with spectral fingerprint capability for detecting specific bio-agents.

  19. Design and testing of a non-intrusive torque measurement system 

    E-Print Network [OSTI]

    Wilson, Edwin Ernest

    1998-01-01

    design with a temporary mount connected to the shaft and transmitting the response signal via radio frequency telemetry could decrease the effects of vibration on the system....

  20. Electric load information system based on non-intrusive power monitoring

    E-Print Network [OSTI]

    Lee, Kwangduk Douglas, 1970-

    2003-01-01

    Obtaining high quality information economically and reliably is always a difficult objective to achieve. The electric power industry and consumers recently face many challenges, such as deregulation, autonomous power systems ...

  1. Model-Based Validation of an Intrusion-Tolerant Information System Fabrice Stevens

    E-Print Network [OSTI]

    Sanders, William H.

    , we describe a model-based validation effort that was undertaken as part of a unified approach was supported by DARPA contract number F30602-02-C- 0134. as mentioned above, it is practically impossible a se- cure system would have to represent, among other things, the attacker's behavior. Since some

  2. Thermal neutron detection system

    DOE Patents [OSTI]

    Peurrung, Anthony J. (Richland, WA); Stromswold, David C. (West Richland, WA)

    2000-01-01

    According to the present invention, a system for measuring a thermal neutron emission from a neutron source, has a reflector/moderator proximate the neutron source that reflects and moderates neutrons from the neutron source. The reflector/moderator further directs thermal neutrons toward an unmoderated thermal neutron detector.

  3. in High Performance Computing Computer System, Cluster, and Networking...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    iSSH v. Auditd: Intrusion Detection in High Performance Computing Computer System, Cluster, and Networking Summer Institute David Karns, New Mexico State University Katy Protin,...

  4. Centrifugal unbalance detection system

    DOE Patents [OSTI]

    Cordaro, Joseph V. (Martinez, GA); Reeves, George (Graniteville, SC); Mets, Michael (Aiken, SC)

    2002-01-01

    A system consisting of an accelerometer sensor attached to a centrifuge enclosure for sensing vibrations and outputting a signal in the form of a sine wave with an amplitude and frequency that is passed through a pre-amp to convert it to a voltage signal, a low pass filter for removing extraneous noise, an A/D converter and a processor and algorithm for operating on the signal, whereby the algorithm interprets the amplitude and frequency associated with the signal and once an amplitude threshold has been exceeded the algorithm begins to count cycles during a predetermined time period and if a given number of complete cycles exceeds the frequency threshold during the predetermined time period, the system shuts down the centrifuge.

  5. Power line detection system

    DOE Patents [OSTI]

    Latorre, V.R.; Watwood, D.B.

    1994-09-27

    A short-range, radio frequency (RF) transmitting-receiving system that provides both visual and audio warnings to the pilot of a helicopter or light aircraft of an up-coming power transmission line complex. Small, milliwatt-level narrowband transmitters, powered by the transmission line itself, are installed on top of selected transmission line support towers or within existing warning balls, and provide a continuous RF signal to approaching aircraft. The on-board receiver can be either a separate unit or a portion of the existing avionics, and can also share an existing antenna with another airborne system. Upon receipt of a warning signal, the receiver will trigger a visual and an audio alarm to alert the pilot to the potential power line hazard. 4 figs.

  6. Monitoring CO2 intrusion and associated geochemical transformations...

    Office of Scientific and Technical Information (OSTI)

    Monitoring CO2 intrusion and associated geochemical transformations in a shallow groundwater system using complex electrical methods Citation Details In-Document Search Title:...

  7. Distributed Termination Detection for Dynamic Systems

    E-Print Network [OSTI]

    Dhamdhere, Dhananjay Madhav

    systems, Termination detection. \\Lambda Address all correspondence to this author. 1 #12; Distributed

  8. Non-intrusive remote sleep monitoring & event detection system using audio-visual recording

    E-Print Network [OSTI]

    Nakanishi, Hideyuki

    ;25 3 50 1 2 GeoNLP 6-2 6-1 5-3 The CO2 reduction effect of eco-friendly the environmental impact of "ubiquitous" eco- driving, where the majority is driving eco-friendly

  9. Barriers to the Use of Intrusion Detection Systems in Safety-Critical Applications

    E-Print Network [OSTI]

    Johnson, Chris

    , G12 8RZ. Johnson@dcs.gla.ac.uk, http://www.dcs.gla.ac.uk/~johnson Keywords: SCADA, Industrial for protective monitoring over Supervisory Control and Data Acquisition (SCADA) sys- tems SCADA implementations. This paper identifies a range of theoretical and practical

  10. Compensated intruder-detection systems

    DOE Patents [OSTI]

    McNeilly, David R. (Maryville, TN); Miller, William R. (Andersonville, TN)

    1984-01-01

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  11. Immune System for Virus Detection and Elimination

    E-Print Network [OSTI]

    consider the aspects of designing a computer immune system for virus detection and elimination using to modelling the biological immune system in a computer we design a computer immune system for virus detectionImmune System for Virus Detection and Elimination Rune Schmidt Jensen IMM-THESIS-2002-08-31 IMM #12

  12. Pulsed helium ionization detection system

    DOE Patents [OSTI]

    Ramsey, Roswitha S. (Knoxville, TN); Todd, Richard A. (Knoxville, TN)

    1987-01-01

    A helium ionization detection system is provided which produces stable operation of a conventional helium ionization detector while providing improved sensitivity and linearity. Stability is improved by applying pulsed dc supply voltage across the ionization detector, thereby modifying the sampling of the detectors output current. A unique pulse generator is used to supply pulsed dc to the detector which has variable width and interval adjust features that allows up to 500 V to be applied in pulse widths ranging from about 150 nsec to about dc conditions.

  13. Pulsed helium ionization detection system

    DOE Patents [OSTI]

    Ramsey, R.S.; Todd, R.A.

    1985-04-09

    A helium ionization detection system is provided which produces stable operation of a conventional helium ionization detector while providing improved sensitivity and linearity. Stability is improved by applying pulsed dc supply voltage across the ionization detector, thereby modifying the sampling of the detectors output current. A unique pulse generator is used to supply pulsed dc to the detector which has variable width and interval adjust features that allows up to 500 V to be applied in pulse widths ranging from about 150 nsec to about dc conditions.

  14. Explosives detection system and method

    DOE Patents [OSTI]

    Reber, Edward L. (Idaho Falls, ID); Jewell, James K. (Idaho Falls, ID); Rohde, Kenneth W. (Idaho Falls, ID); Seabury, Edward H. (Idaho Falls, ID); Blackwood, Larry G. (Idaho Falls, ID); Edwards, Andrew J. (Idaho Falls, ID); Derr, Kurt W. (Idaho Falls, ID)

    2007-12-11

    A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

  15. Non-intrusive appliance monitor apparatus

    DOE Patents [OSTI]

    Hart, George W. (Natick, MA); Kern, Jr., Edward C. (Lincoln, MA); Schweppe, Fred C. (Carlisle, MA)

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

  16. Non-intrusive appliance monitor apparatus

    DOE Patents [OSTI]

    Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

  17. Intrusion recovery for database-backed web applications

    E-Print Network [OSTI]

    Chandra, Ramesh

    Warp is a system that helps users and administrators of web applications recover from intrusions such as SQL injection, cross-site scripting, and clickjacking attacks, while preserving legitimate user changes. Warp repairs ...

  18. Shipboard applications of non-intrusive load monitoring

    E-Print Network [OSTI]

    Ramsey, Jack S

    2004-01-01

    The Non-Intrusive Load Monitor (NILM) provides a method of measuring component performance and source power quality through a single point of entry in the power distribution system. A study was performed utilizing the NILM ...

  19. Harmonic approaches to non-intrusive load diagnostics

    E-Print Network [OSTI]

    Fuller, Ashley E. (Ashley Eliot)

    2008-01-01

    The Non-Intrusive Load Monitor (NILM) is a system that monitors, records and processes voltage and current measurements to establish the operating characteristics of individual loads on a load center from a single aggregate ...

  20. Improving shipboard applications of non-intrusive load monitoring

    E-Print Network [OSTI]

    Jones, Richard A. (Richard Alan), Nav. E. Massachusetts Institute of Technology

    2008-01-01

    The Non-Intrusive Load Monitor (NILM) measures equipment performance by measuring and analyzing the source power to the equipment at a single point in the electrical system. Previous studies have proven the usefulness of ...

  1. Detection of arcs in automotive electrical systems

    E-Print Network [OSTI]

    Mishrikey, Matthew David

    2005-01-01

    At the present time, there is no established method for the detection of DC electric arcing. This is a concern for forthcoming advanced automotive electrical systems which consist of higher DC electric power bus voltages, ...

  2. Sensor Fault Detection and Isolation System 

    E-Print Network [OSTI]

    Yang, Cheng-Ken

    2014-08-01

    The purpose of this research is to develop a Fault Detection and Isolation (FDI) system which is capable to diagnosis multiple sensor faults in nonlinear cases. In order to lead this study closer to real world applications ...

  3. New Detection System for Heavy Element Research

    E-Print Network [OSTI]

    Y. S. Tsyganov; A. N. Polyakov; A. A. Voinov; M. V. Shumeyko

    2015-06-08

    New detection system design for heavy element research with 48Ca projectile has been reported. This system is based on application of 32 position sensitive strip PIPS detector and low pressure pentane filled TOF detector application in 48Ca induced nuclear reactions. To suppress beam associated background products new version of real time method of active correlations has been applied. Examples of applications in 249Bk+48Ca and 243Am+48Ca reactions are presented. The system development to operate together with the digital ORNL detection system to provide a quick search for recoil to alpha correlation chains has been discussed too.

  4. New Detection System for Heavy Element Research

    E-Print Network [OSTI]

    Tsyganov, Y S; Voinov, A A; Shumeyko, M V

    2015-01-01

    New detection system design for heavy element research with 48Ca projectile has been reported. This system is based on application of 32 position sensitive strip PIPS detector and low pressure pentane filled TOF detector application in 48Ca induced nuclear reactions. To suppress beam associated background products new version of real time method of active correlations has been applied. Examples of applications in 249Bk+48Ca and 243Am+48Ca reactions are presented. The system development to operate together with the digital ORNL detection system to provide a quick search for recoil to alpha correlation chains has been discussed too.

  5. DETECTION OF HISTORICAL PIPELINE LEAK PLUMES USING NON-INTRUSIVE SURFACE-BASED GEOPHYSICAL TECHNIQUES AT THE HANFORD NUCLEAR SITE WASHINGTON USA

    SciTech Connect (OSTI)

    SKORSKA MB; FINK JB; RUCKER DF; LEVITT MT

    2010-12-02

    Historical records from the Department of Energy Hanford Nuclear Reservation (in eastern WA) indicate that ruptures in buried waste transfer pipelines were common between the 1940s and 1980s, which resulted in unplanned releases (UPRs) of tank: waste at numerous locations. A number of methods are commercially available for the detection of active or recent leaks, however, there are no methods available for the detection of leaks that occurred many years ago. Over the decades, leaks from the Hanford pipelines were detected by visual observation of fluid on the surface, mass balance calculations (where flow volumes were monitored), and incidental encounters with waste during excavation or drilling. Since these detection methods for historic leaks are so limited in resolution and effectiveness, it is likely that a significant number of pipeline leaks have not been detected. Therefore, a technology was needed to detect the specific location of unknown pipeline leaks so that characterization technologies can be used to identify any risks to groundwater caused by waste released into the vadose zone. A proof-of-concept electromagnetic geophysical survey was conducted at an UPR in order to image a historical leak from a waste transfer pipeline. The survey was designed to test an innovative electromagnetic geophysical technique that could be used to rapidly map the extent of historical leaks from pipelines within the Hanford Site complex. This proof-of-concept test included comprehensive testing and analysis of the transient electromagnetic method (TEM) and made use of supporting and confirmatory geophysical methods including ground penetrating radar, magnetics, and electrical resistivity characterization (ERC). The results for this initial proof-of-concept test were successful and greatly exceeded the expectations of the project team by providing excellent discrimination of soils contaminated with leaked waste despite the interference from an electrically conductive pipe.

  6. Assessing intrusiveness of smartphone apps

    E-Print Network [OSTI]

    Zhang, Fan, M. Eng. Massachusetts Institute of Technology

    2012-01-01

    We tackle the challenge of improving transparency for smartphone apps by focusing on the intrusiveness component of assessing privacy risk. Specifically, we develop a framework for qualitatively assessing and quantitatively ...

  7. Gas intrusion into SPR caverns

    SciTech Connect (OSTI)

    Hinkebein, T.E.; Bauer, S.J.; Ehgartner, B.L.; Linn, J.K.; Neal, J.T.; Todd, J.L.; Kuhlman, P.S.; Gniady, C.T. [Sandia National Labs., Albuquerque, NM (United States). Underground Storage Technology Dept.; Giles, H.N. [Dept. of Energy, Washington, DC (United States). Strategic Petroleum Reserve

    1995-12-01

    The conditions and occurrence of gas in crude oil stored in Strategic Petroleum Reserve, SPR, caverns is characterized in this report. Many caverns in the SPR show that gas has intruded into the oil from the surrounding salt dome. Historical evidence and the analyses presented here suggest that gas will continue to intrude into many SPR caverns in the future. In considering why only some caverns contain gas, it is concluded that the naturally occurring spatial variability in salt permeability can explain the range of gas content measured in SPR caverns. Further, it is not possible to make a one-to-one correlation between specific geologic phenomena and the occurrence of gas in salt caverns. However, gas is concluded to be petrogenic in origin. Consequently, attempts have been made to associate the occurrence of gas with salt inhomogeneities including anomalies and other structural features. Two scenarios for actual gas intrusion into caverns were investigated for consistency with existing information. These scenarios are gas release during leaching and gas permeation through salt. Of these mechanisms, the greater consistency comes from the belief that gas permeates to caverns through the salt. A review of historical operating data for five Bryan Mound caverns loosely supports the hypothesis that higher operating pressures reduce gas intrusion into caverns. This conclusion supports a permeability intrusion mechanism. Further, it provides justification for operating the caverns near maximum operating pressure to minimize gas intrusion. Historical gas intrusion rates and estimates of future gas intrusion are given for all caverns.

  8. Methods, microfluidic devices, and systems for detection of an...

    Office of Scientific and Technical Information (OSTI)

    and systems for detection of an active enzymatic agent Embodiments of the present invention provide methods, microfluidic devices, and systems for the detection of an active...

  9. DEMIDS: A Misuse Detection System for Database Systems

    E-Print Network [OSTI]

    Yoo, S. J. Ben

    information stored in database systems DBS, existing security models are insu cient to prevent misuseDEMIDS: A Misuse Detection System for Database Systems Christina Yip Chung, Michael Gertz, Karl the information stored in the database system against misuse, they are seldom used by security o cers because

  10. System for particle concentration and detection

    DOE Patents [OSTI]

    Morales, Alfredo M.; Whaley, Josh A.; Zimmerman, Mark D.; Renzi, Ronald F.; Tran, Huu M.; Maurer, Scott M.; Munslow, William D.

    2013-03-19

    A new microfluidic system comprising an automated prototype insulator-based dielectrophoresis (iDEP) triggering microfluidic device for pathogen monitoring that can eventually be run outside the laboratory in a real world environment has been used to demonstrate the feasibility of automated trapping and detection of particles. The system broadly comprised an aerosol collector for collecting air-borne particles, an iDEP chip within which to temporarily trap the collected particles and a laser and fluorescence detector with which to induce a fluorescence signal and detect a change in that signal as particles are trapped within the iDEP chip.

  11. System For Detection Of Hazardous Events

    DOE Patents [OSTI]

    Kulesz, James J [Oak Ridge, TN; Worley, Brian A [Knoxville, TN

    2005-08-16

    A system for detecting the occurrence of anomalies, includes a plurality of spaced apart nodes, with each node having adjacent nodes, each of the nodes having one or more sensors associated with the node and capable of detecting anomalies, and each of the nodes having a controller connected to the sensors associated with the node. The system also includes communication links between adjacent nodes, whereby the nodes form a network. Each controller is programmed to query its adjacent nodes to assess the status of the adjacent nodes and the communication links.

  12. System for detection of hazardous events

    DOE Patents [OSTI]

    Kulesz, James J.; Worley, Brian A.

    2006-05-23

    A system for detecting the occurrence of anomalies, includes a plurality of spaced apart nodes, with each node having adjacent nodes, each of the nodes having one or more sensors associated with the node and capable of detecting anomalies, and each of the nodes having a controller connected to the sensors associated with the node. The system also includes communication links between adjacent nodes, whereby the nodes form a network. Each controller is programmed to query its adjacent nodes to assess the status of the adjacent nodes and the communication links.

  13. Damage detection in initially nonlinear systems

    SciTech Connect (OSTI)

    Bornn, Luke [Los Alamos National Laboratory; Farrar, Charles [Los Alamos National Laboratory; Park, Gyuhae [Los Alamos National Laboratory

    2009-01-01

    The primary goal of Structural Health Monitoring (SHM) is to detect structural anomalies before they reach a critical level. Because of the potential life-safety and economic benefits, SHM has been widely studied over the past decade. In recent years there has been an effort to provide solid mathematical and physical underpinnings for these methods; however, most focus on systems that behave linearly in their undamaged state - a condition that often does not hold in complex 'real world' systems and systems for which monitoring begins mid-lifecycle. In this work, we highlight the inadequacy of linear-based methodology in handling initially nonlinear systems. We then show how the recently developed autoregressive support vector machine (AR-SVM) approach to time series modeling can be used for detecting damage in a system that exhibits initially nonlinear response. This process is applied to data acquired from a structure with induced nonlinearity tested in a laboratory environment.

  14. Spark discharge trace element detection system

    DOE Patents [OSTI]

    Adler-Golden, S.; Bernstein, L.S.; Bien, F.

    1988-08-23

    A spark discharge trace element detection system is provided which includes a spark chamber including a pair of electrodes for receiving a sample of gas to be analyzed at no greater than atmospheric pressure. A voltage is provided across the electrodes for generating a spark in the sample. The intensity of the emitted radiation in at least one primary selected narrow band of the radiation is detected. Each primary band corresponds to an element to be detected in the gas. The intensity of the emission in each detected primary band is integrated during the afterglow time interval of the spark emission and a signal representative of the integrated intensity of the emission in each selected primary bond is utilized to determine the concentration of the corresponding element in the gas. 12 figs.

  15. Methods and systems for detection of radionuclides

    DOE Patents [OSTI]

    Coates, Jr., John T.; DeVol, Timothy A.

    2010-05-25

    Disclosed are materials and systems useful in determining the existence of radionuclides in an aqueous sample. The materials provide the dual function of both extraction and scintillation to the systems. The systems can be both portable and simple to use, and as such can beneficially be utilized to determine presence and optionally concentration of radionuclide contamination in an aqueous sample at any desired location and according to a relatively simple process without the necessity of complicated sample handling techniques. The disclosed systems include a one-step process, providing simultaneous extraction and detection capability, and a two-step process, providing a first extraction step that can be carried out in a remote field location, followed by a second detection step that can be carried out in a different location.

  16. Digital radiographic systems detect boiler tube cracks

    SciTech Connect (OSTI)

    Walker, S. [EPRI, Charlotte, NC (United States)

    2008-06-15

    Boiler water wall leaks have been a major cause of steam plant forced outages. But conventional nondestructive evaluation techniques have a poor track record of detecting corrosion fatigue cracking on the inside surface of the cold side of waterwall tubing. EPRI is performing field trials of a prototype direct-digital radiographic system that promises to be a game changer. 8 figs.

  17. Method and system for detecting an explosive

    DOE Patents [OSTI]

    Reber, Edward L. (Idaho Falls, ID); Rohde, Kenneth W. (Idaho Falls, ID); Blackwood, Larry G. (Bozeman, MT)

    2010-12-07

    A method and system for detecting at least one explosive in a vehicle using a neutron generator and a plurality of NaI detectors. Spectra read from the detectors is calibrated by performing Gaussian peak fitting to define peak regions, locating a Na peak and an annihilation peak doublet, assigning a predetermined energy level to one peak in the doublet, and predicting a hydrogen peak location based on a location of at least one peak of the doublet. The spectra are gain shifted to a common calibration, summed for respective groups of NaI detectors, and nitrogen detection analysis performed on the summed spectra for each group.

  18. Portable chemical detection system with intergrated preconcentrator

    DOE Patents [OSTI]

    Baumann, Mark J.; Brusseau, Charles A.; Hannum, David W.; Linker, Kevin L.

    2005-12-27

    A portable system for the detection of chemical particles such as explosive residue utilizes a metal fiber substrate that may either be swiped over a subject or placed in a holder in a collection module which can shoot a jet of gas at the subject to dislodge residue, and then draw the air containing the residue into the substrate. The holder is then placed in a detection module, which resistively heats the substrate to evolve the particles, and provides a gas flow to move the particles to a miniature detector in the module.

  19. Minimizing Intrusiveness in Home Energy Measurement David Lachut

    E-Print Network [OSTI]

    Rollins, Sami

    home energy measurement systems exist, they are often intrusive--requiring several physical components of a system for compre- hensive home energy measurement and analyze the resource requirements of the basic techniques for reducing the resource require- ments of the system. Our techniques reduce the energy foot

  20. An Intrusion Detection Game with Limited Observations

    E-Print Network [OSTI]

    Alpcan, Tansu

    is with the Deutsche Telekom Laboratories, Technische Universit¨at Berlin, Ernst-Reuter-Platz 7, 10587 Berlin, Germany¸ar is with the Coordinated Science Laboratory, University of Illinois, 1308 West Main Street, Urbana, IL 61801 USA. E

  1. Intrusion detection and monitoring for wireless networks.

    SciTech Connect (OSTI)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda; Tabriz, Parisa; Pelon, Kristen; McCoy, Damon (University of Colorado, Boulder); Lodato, Mark; Hemingway, Franklin; Custer, Ryan P.; Averin, Dimitry; Franklin, Jason; Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more complete network coverage for use by emergency responders and other municipal agencies. In short, these Wi-Fi networks are being deployed everywhere. Much thought has been and is being put into evaluating cost-benefit analyses of wired vs. wireless networks and issues such as how to effectively cover an office building or municipality, how to efficiently manage a large network of wireless access points (APs), and how to save money by replacing an Internet service provider (ISP) with 802.11 technology. In comparison, very little thought and money are being focused on wireless security and monitoring for security purposes.

  2. System and method for detecting gas

    DOE Patents [OSTI]

    Chow, Oscar Ken (Simsbury, CT); Moulthrop, Lawrence Clinton (Windsor, CT); Dreier, Ken Wayne (Madison, CT); Miller, Jacob Andrew (Dexter, MI)

    2010-03-16

    A system to detect a presence of a specific gas in a mixture of gaseous byproducts comprising moisture vapor is disclosed. The system includes an electrochemical cell, a transport to deliver the mixture of gaseous byproducts from the electrochemical cell, a gas sensor in fluid communication with the transport, the sensor responsive to a presence of the specific gas to generate a signal corresponding to a concentration of the specific gas, and a membrane to prevent transmission of liquid moisture, the membrane disposed between the transport and the gas sensor.

  3. Using Hidden Markov Models to Evaluate the Risks of Intrusions

    E-Print Network [OSTI]

    Vigna, Giovanni

    Using Hidden Markov Models to Evaluate the Risks of Intrusions System Architecture and Model limited to manual risk evaluations that are not suitable for real-time use. In this paper, we introduce and evaluate network and system risk. These approaches are generally limited to manual processes

  4. System and method for anomaly detection

    DOE Patents [OSTI]

    Scherrer, Chad

    2010-06-15

    A system and method for detecting one or more anomalies in a plurality of observations is provided. In one illustrative embodiment, the observations are real-time network observations collected from a stream of network traffic. The method includes performing a discrete decomposition of the observations, and introducing derived variables to increase storage and query efficiencies. A mathematical model, such as a conditional independence model, is then generated from the formatted data. The formatted data is also used to construct frequency tables which maintain an accurate count of specific variable occurrence as indicated by the model generation process. The formatted data is then applied to the mathematical model to generate scored data. The scored data is then analyzed to detect anomalies.

  5. Detection of damage in axial (membrane) systems

    SciTech Connect (OSTI)

    Duffey, T.A. [Duffey (T.A.), Tijeras, NM (United States); Baker, W.E. [Univ. of New Mexico, Albuquerque, NM (United States). Dept. of Mechanical Engineering; Farrar, C.R. [Los Alamos National Lab., NM (United States); Rhee, W.H. [Texas Tech Univ., Lubbock, TX (United States). Dept. of Mechanical Engineering

    1998-12-31

    In a recent paper, two methods of damage identification (Modified Damage Index and Change-in-Flexibility) were applied to detection of damage in an 8-DOF vibrating system. The goal of the work was to detect damage (reduction in stiffness of one or more of the elements) as well as to locate the particular damaged elements (S). However, the investigation was limited to numerical simulations only. In this paper, a physical, spring-mass model of a similar, degenerate 8-DOF system (7 normal modes plus a rigid-body mode) was constructed. Experiments were then performed and the modal properties of the system were determined in undamaged and damaged states. Excitation was provided either by an impact hammer or by an electromechanical shaker. Damage was induced by replacing one of the springs with a spring of lower stiffness. The Modified Damage Index method clearly isolated the location of damage for a variety of damage locations and levels of damage. The Change-in-Flexibility method, however, was found to be less reliable. The ability of the method to locate damage depended strongly on location and the level of damage as well as the number of modes included.

  6. Systems and methods for detecting and processing

    DOE Patents [OSTI]

    Johnson, Michael M. (Livermore, CA); Yoshimura, Ann S. (Tracy, CA)

    2006-03-28

    Embodiments of the present invention provides systems and method for detecting. Sensing modules are provided in communication with one or more detectors. In some embodiments, detectors are provided that are sensitive to chemical, biological, or radiological agents. Embodiments of sensing modules include processing capabilities to analyze, perform computations on, and/or run models to predict or interpret data received from one or more detectors. Embodiments of sensing modules form various network configurations with one another and/or with one or more data aggregation devices. Some embodiments of sensing modules include power management functionalities.

  7. VISDTA: A video imaging system for detection, tracking, and assessment: Prototype development and concept demonstration

    SciTech Connect (OSTI)

    Pritchard, D.A.

    1987-05-01

    It has been demonstrated that thermal imagers are an effective surveillance and assessment tool for security applications because: (1) they work day or night due to their sensitivity to thermal signatures; (2) penetrability through fog, rain, dust, etc., is better than human eyes; (3) short or long range operation is possible with various optics; and (4) they are strictly passive devices providing visible imagery which is readily interpreted by the operator with little training. Unfortunately, most thermal imagers also require the setup of a tripod, connection of batteries, cables, display, etc. When this is accomplished, the operator must manually move the camera back and forth searching for signs of aggressor activity. VISDTA is designed to provide automatic panning, and in a sense, ''watch'' the imagery in place of the operator. The idea behind the development of VISDTA is to provide a small, portable, rugged system to automatically scan areas and detect targets by computer processing of images. It would use a thermal imager and possibly an intensified day/night TV camera, a pan/ tilt mount, and a computer for system control. If mounted on a dedicated vehicle or on a tower, VISDTA will perform video motion detection functions on incoming video imagery, and automatically scan predefined patterns in search of abnormal conditions which may indicate attempted intrusions into the field-of-regard. In that respect, VISDTA is capable of improving the ability of security forces to maintain security of a given area of interest by augmenting present techniques and reducing operator fatigue.

  8. SMARTx: An Embedded Proximity Detection System for Reducing Collisions

    E-Print Network [OSTI]

    Lim, Sunho

    detection system using Arduinos, radios, GPS modules, and a BLE module. I inherited the work from two

  9. Human Portable Radiation Detection System Communications Package Evaluation

    SciTech Connect (OSTI)

    Morgen, Gerald P.; Peterson, William W.

    2009-06-11

    Testing and valuation of the Human Portable Radiation Detection System Communications Package for the US Coast Guard.

  10. Method and system for detecting explosives

    DOE Patents [OSTI]

    Reber, Edward L. (Idaho Falls, ID); Jewell, James K. (Idaho Falls, ID); Rohde, Kenneth W. (Idaho Falls, ID); Seabury, Edward H. (Idaho Falls, ID); Blackwood, Larry G. (Idaho Falls, ID); Edwards, Andrew J. (Idaho Falls, ID); Derr, Kurt W. (Idaho Falls, ID)

    2009-03-10

    A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

  11. Detection of contamination of municipal water distribution systems

    DOE Patents [OSTI]

    Cooper, John F. (Oakland, CA)

    2012-01-17

    A system for the detection of contaminates of a fluid in a conduit. The conduit is part of a fluid distribution system. A chemical or biological sensor array is connected to the conduit. The sensor array produces an acoustic signal burst in the fluid upon detection of contaminates in the fluid. A supervisory control system connected to the fluid and operatively connected to the fluid distribution system signals the fluid distribution system upon detection of contaminates in the fluid.

  12. Method and system for turbomachinery surge detection

    DOE Patents [OSTI]

    Faymon, David K.; Mays, Darrell C.; Xiong, Yufei

    2004-11-23

    A method and system for surge detection within a gas turbine engine, comprises: measuring the compressor discharge pressure (CDP) of the gas turbine over a period of time; determining a time derivative (CDP.sub.D ) of the measured (CDP) correcting the CDP.sub.D for altitude, (CDP.sub.DCOR); estimating a short-term average of CDP.sub.DCOR.sup.2 ; estimating a short-term average of CDP.sub.DCOR ; and determining a short-term variance of corrected CDP rate of change (CDP.sub.roc) based upon the short-term average of CDP.sub.DCOR and the short-term average of CDP.sub.DCOR.sup.2. The method and system then compares the short-term variance of corrected CDP rate of change with a pre-determined threshold (CDP.sub.proc) and signals an output when CDP.sub.roc >CDP.sub.proc. The method and system provides a signal of a surge within the gas turbine engine when CDP.sub.roc remains>CDP.sub.proc for pre-determined period of time.

  13. Systems and methods for detecting neutrons

    DOE Patents [OSTI]

    Bross, Alan D.; Mellott, Kerry L.; Pla-Dalmau, Anna

    2005-08-09

    Systems and methods for detecting neutrons. One or more neutron-sensitive scintillators can be configured from a plurality of nano-sized particles, dopants and an extruded plastic material, such as polystyrene. The nano-sized particles can be compounded into the extruded plastic material with at least one dopant that permits the plastic material to scintillate. One or more plastic light collectors can be associated with a neutron-sensitive scintillator, such that the plastic light collector includes a central hole thereof. A wavelength-shifting fiber can then be located within the hole. The wavelength shifting (WLS) fiber absorbs scintillation light having a wavelength thereof and re-emits the light at a longer wavelength.

  14. System for detecting special nuclear materials

    SciTech Connect (OSTI)

    Jandel, Marian; Rusev, Gencho Yordanov; Taddeucci, Terry Nicholas

    2015-07-14

    The present disclosure includes a radiological material detector having a convertor material that emits one or more photons in response to a capture of a neutron emitted by a radiological material; a photon detector arranged around the convertor material and that produces an electrical signal in response to a receipt of a photon; and a processor connected to the photon detector, the processor configured to determine the presence of a radiological material in response to a predetermined signature of the electrical signal produced at the photon detector. One or more detectors described herein can be integrated into a detection system that is suited for use in port monitoring, treaty compliance, and radiological material management activities.

  15. Gravity-driven intrusions in stratified fluids

    E-Print Network [OSTI]

    Maurer, Benjamin Dudley

    2011-01-01

    5.5.1 Five interleaving interfacial gravity currents 5.5.2Ten interleaving interfacial gravity currents . 5.6partial- depth intrusive gravity currents,” Atmosphere -

  16. System and method for detecting cells or components thereof

    DOE Patents [OSTI]

    Porter, Marc D. (Ames, IA); Lipert, Robert J. (Ames, IA); Doyle, Robert T. (Ames, IA); Grubisha, Desiree S. (Corona, CA); Rahman, Salma (Ames, IA)

    2009-01-06

    A system and method for detecting a detectably labeled cell or component thereof in a sample comprising one or more cells or components thereof, at least one cell or component thereof of which is detectably labeled with at least two detectable labels. In one embodiment, the method comprises: (i) introducing the sample into one or more flow cells of a flow cytometer, (ii) irradiating the sample with one or more light sources that are absorbed by the at least two detectable labels, the absorption of which is to be detected, and (iii) detecting simultaneously the absorption of light by the at least two detectable labels on the detectably labeled cell or component thereof with an array of photomultiplier tubes, which are operably linked to two or more filters that selectively transmit detectable emissions from the at least two detectable labels.

  17. WATER INTRUSION POLICY Procedure: 6.22

    E-Print Network [OSTI]

    Jia, Songtao

    WATER INTRUSION POLICY Procedure: 6.22 Version: 2.0 Effective: 6/28/2013 1 A. Purpose: 1. To prevent microbial amplification from water damage affecting the safety and comfort of area occupants. 2 in affected areas. 3. To describe a unified set of procedures for addressing water intrusions. B

  18. Online Fault Detection and Tolerance for Photovoltaic Energy Harvesting Systems

    E-Print Network [OSTI]

    Pedram, Massoud

    Online Fault Detection and Tolerance for Photovoltaic Energy Harvesting Systems Xue Lin 1 , Yanzhi, yanzhiwa, dizhu, pedram}@usc.edu, 2 naehyuck@elpl.snu.ac.kr ABSTRACT Photovoltaic energy harvesting systems, Performance, Reliability. Keywords Photovoltaic System, Fault Detection, Fault Tolerance, Photovoltaic Panel

  19. Engine throttle valve position detecting system

    SciTech Connect (OSTI)

    Kamai, K.; Kikuchi, T.

    1987-03-31

    This patent describes an engine throttle valve position detecting system including: a throttle switch including a rotary detector member adapted to be rotated in accordance with the rotation of an engine throttle valve and having a guide portion including a section offset radially relative to the direction of rotation of the rotary detector member. A movable contact is movable by the rotation of the rotary detector member and a stationary contact disposed in opposed relationship to the movable contact. The stationary and movable contacts have opened and closed positions which are changed over at two different predetermined rotational positions of the rotary detector member; means for producing a signal related to the operation of the engine; means for comparing a temperature representative of the engine operating condition with a predetermined reference level; and judgment means operative, when the engine operating condition temperature is judged by the comparing means as being higher than predetermined reference level, to judge the position of the throttle valve based on one of the positions of the movable and stationary contacts and on the signal.

  20. Development of an Automatic Filament Disappearance Detection System

    E-Print Network [OSTI]

    1 Development of an Automatic Filament Disappearance Detection System Jianlin Gao1 , Haimin Wang2 Abstract. This paper presents an efficient and automatic method for detecting filament disappearances is to detect the filaments in the solar image, then determine if they are growing, stable or disappearing

  1. Upconverting nanoparticles for optimizing scintillator based detection systems

    DOE Patents [OSTI]

    Kross, Brian; McKisson, John E; McKisson, John; Weisenberger, Andrew; Xi, Wenze; Zom, Carl

    2013-09-17

    An upconverting device for a scintillation detection system is provided. The detection system comprises a scintillator material, a sensor, a light transmission path between the scintillator material and the sensor, and a plurality of upconverting nanoparticles particles positioned in the light transmission path.

  2. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    SciTech Connect (OSTI)

    James L. Jones

    2003-06-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  3. Gravity-Driven Intrusions in Stratified Fluids

    E-Print Network [OSTI]

    Maurer, Benjamin D.

    2011-01-01

    5.5.1 Five interleaving interfacial gravity currents 5.5.2Ten interleaving interfacial gravity currents . 5.6in Iceland showing multiple gravity-driven intrusions c ´

  4. Automated intrusion recovery for web applications

    E-Print Network [OSTI]

    Chandra, Ramesh, Ph. D. Massachusetts Institute of Technology

    2013-01-01

    In this dissertation, we develop recovery techniques for web applications and demonstrate that automated recovery from intrusions and user mistakes is practical as well as effective. Web applications play a critical role ...

  5. Stochastic Game Approach for Replay Attack Detection Fei Miao Miroslav Pajic George J. Pappas.

    E-Print Network [OSTI]

    Pappas, George J.

    . Abstract-- The existing tradeoff between control system performance and the detection rate for replay, controller design and utilized statistical detector. We show that the optimal strategy for the system exists with multiple finite cost, time-invariant linear controllers/estimators/intrusion detectors. I. INTRODUCTION

  6. All row, planar fault detection system

    DOE Patents [OSTI]

    Archer, Charles Jens; Pinnow, Kurt Walter; Ratterman, Joseph D; Smith, Brian Edward

    2013-07-23

    An apparatus, program product and method for detecting nodal faults may simultaneously cause designated nodes of a cell to communicate with all nodes adjacent to each of the designated nodes. Furthermore, all nodes along the axes of the designated nodes are made to communicate with their adjacent nodes, and the communications are analyzed to determine if a node or connection is faulty.

  7. Availability Analysis of Repairable Computer Systems and Stationarity Detection

    E-Print Network [OSTI]

    Sericola, Bruno

    Availability Analysis of Repairable Computer Systems and Stationarity Detection Bruno Sericola computer system and we assume, as usual, that the system is modeled by a finite Markov process. We propose of performability measures. Index TermsÐRepairable computer systems, dependability, availability, performability

  8. Reducing booster-pump-induced contaminant intrusion in Indian water systems with a self-actuated, back-pressure regulating valve

    E-Print Network [OSTI]

    Taylor, David Donald James

    2014-01-01

    Intermittently-operated water systems struggle to equitably and effectively distribute clean water to customers. One common customer response to intermittency is to supplement the water system's pressure by using a household, ...

  9. Pedestrian Detection for Driving Assistance Systems: Single-frame Classification and System Level Performance

    E-Print Network [OSTI]

    Shashua, Amnon

    Pedestrian Detection for Driving Assistance Systems: Single-frame Classification and System Level breakdown of a monocular pedestrian detection system. We describe in detail our approach for single describes a monocular visual processing sys- tem for pedestrian detection targeting the niche of driving

  10. Detection and quantification system for monitoring instruments

    DOE Patents [OSTI]

    Dzenitis, John M. (Danville, CA); Hertzog, Claudia K. (Houston, TX); Makarewicz, Anthony J. (Livermore, CA); Henderer, Bruce D. (Livermore, CA); Riot, Vincent J. (Oakland, CA)

    2008-08-12

    A method of detecting real events by obtaining a set of recent signal results, calculating measures of the noise or variation based on the set of recent signal results, calculating an expected baseline value based on the set of recent signal results, determining sample deviation, calculating an allowable deviation by multiplying the sample deviation by a threshold factor, setting an alarm threshold from the baseline value plus or minus the allowable deviation, and determining whether the signal results exceed the alarm threshold.

  11. Explosive simulants for testing explosive detection systems

    DOE Patents [OSTI]

    Kury, John W. (Danville, CA); Anderson, Brian L. (Lodi, CA)

    1999-09-28

    Explosives simulants that include non-explosive components are disclosed that facilitate testing of equipment designed to remotely detect explosives. The simulants are non-explosive, non-hazardous materials that can be safely handled without any significant precautions. The simulants imitate real explosives in terms of mass density, effective atomic number, x-ray transmission properties, and physical form, including moldable plastics and emulsions/gels.

  12. Systems for detecting charged particles in object inspection

    DOE Patents [OSTI]

    Morris, Christopher L.; Makela, Mark F.

    2013-08-20

    Techniques, apparatus and systems for detecting particles such as muons. In one implementation, a monitoring system has a cosmic ray-produced charged particle tracker with a plurality of drift cells. The drift cells, which can be for example aluminum drift tubes, can be arranged at least above and below a volume to be scanned to thereby track incoming and outgoing charged particles, such as cosmic ray-produced muons, while also detecting gamma rays. The system can selectively detect devices or materials, such as iron, lead, gold and/or tungsten, occupying the volume from multiple scattering of the charged particles passing through the volume and can also detect any radioactive sources occupying the volume from gamma rays emitted therefrom. If necessary, the drift tubes can be sealed to eliminate the need for a gas handling system. The system can be employed to inspect occupied vehicles at border crossings for nuclear threat objects.

  13. Behavioral/ Systems/ Cognitive Neural Variability, Detection Thresholds, and Information

    E-Print Network [OSTI]

    Chacron, Maurice

    Behavioral/ Systems/ Cognitive Neural Variability, Detection Thresholds, and Information. The vestibular system provides information about head mo- tion relative to space that is necessary Transmission in the Vestibular System Soroush G. Sadeghi,1* Maurice J. Chacron,1* Michael C. Taylor,1

  14. Element One Reduces Cost of Hydrogen Leak Detection Systems ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    basis for a wide array of very low-cost hydrogen detection systems. Applied as a thin film, or incorporated into paints and inks, the materials change color and conductivity to...

  15. A distributed boundary detection algorithm for multi-robot systems

    E-Print Network [OSTI]

    McLurkin, James

    We describe a distributed boundary detection algorithm suitable for use on multi-robot systems with dynamic network topologies. We assume that each robot has access to its local network geometry, which is the combination ...

  16. An active oil spill detection digital processing system 

    E-Print Network [OSTI]

    Dennard, Robert Marion

    1976-01-01

    AN ACTIVE OIL SPILL DETECTION DIGITAL PROCESSING SYSTEM A Thesis by Robert Marion Dennard Submitted to the Graduate College of Texas A/M University in partial fulfillment of the requirement for the degree of MASTER OF SCIENCE December 1976... Major Subject: Electrical Engineering AN ACTIVE OIL SPILL DETECTION DIGITAL PROCESSING SYSTEM A Thesis by Robert Marion Dennard Approved as to style and content by: Chairman o Committee Hea o epart ent M er em er December 1976 ABSTRACT...

  17. Portable compton gamma-ray detection system

    DOE Patents [OSTI]

    Rowland, Mark S. (Alamo, CA); Oldaker, Mark E. (Pleasanton, CA)

    2008-03-04

    A Compton scattered gamma-ray detector system. The system comprises a gamma-ray spectrometer and an annular array of individual scintillators. The scintillators are positioned so that they are arrayed around the gamma-ray spectrometer. The annular array of individual scintillators includes a first scintillator. A radiation shield is positioned around the first scintillator. A multi-channel analyzer is operatively connected to the gamma-ray spectrometer and the annular array of individual scintillators.

  18. Methods and systems for remote detection of gases

    DOE Patents [OSTI]

    Johnson, Timothy J

    2012-09-18

    Novel systems and methods for remotely detecting at least one constituent of a gas via infrared detection are provided. A system includes at least one extended source of broadband infrared radiation and a spectrally sensitive receiver positioned remotely from the source. The source and the receiver are oriented such that a surface of the source is in the field of view of the receiver. The source includes a heating component thermally coupled to the surface, and the heating component is configured to heat the surface to a temperature above ambient temperature. The receiver is operable to collect spectral infrared absorption data representative of a gas present between the source and the receiver. The invention advantageously overcomes significant difficulties associated with active infrared detection techniques known in the art, and provides an infrared detection technique with a much greater sensitivity than passive infrared detection techniques known in the art.

  19. Methods and systems for remote detection of gases

    DOE Patents [OSTI]

    Johnson, Timothy J. (Pasco, WA)

    2007-11-27

    Novel systems and methods for remotely detecting at least one constituent of a gas via infrared detection are provided. A system includes at least one extended source of broadband infrared radiation and a spectrally sensitive receiver positioned remotely from the source. The source and the receiver are oriented such that a surface of the source is in the field of view of the receiver. The source includes a heating component thermally coupled to the surface, and the heating component is configured to heat the surface to a temperature above ambient temperature. The receiver is operable to collect spectral infrared absorption data representative of a gas present between the source and the receiver. The invention advantageously overcomes significant difficulties associated with active infrared detection techniques known in the art, and provides an infrared detection technique with a much greater sensitivity than passive infrared detection techniques known in the art.

  20. Systems and methods for detection of blowout precursors in combustors

    DOE Patents [OSTI]

    Lieuwen, Tim C.; Nair, Suraj

    2006-08-15

    The present invention comprises systems and methods for detecting flame blowout precursors in combustors. The blowout precursor detection system comprises a combustor, a pressure measuring device, and blowout precursor detection unit. A combustion controller may also be used to control combustor parameters. The methods of the present invention comprise receiving pressure data measured by an acoustic pressure measuring device, performing one or a combination of spectral analysis, statistical analysis, and wavelet analysis on received pressure data, and determining the existence of a blowout precursor based on such analyses. The spectral analysis, statistical analysis, and wavelet analysis further comprise their respective sub-methods to determine the existence of blowout precursors.

  1. Occupancy change detection system and method

    DOE Patents [OSTI]

    Bruemmer, David J. (Idaho Falls, ID) [Idaho Falls, ID; Few, Douglas A. (Idaho Falls, ID) [Idaho Falls, ID

    2009-09-01

    A robot platform includes perceptors, locomotors, and a system controller. The system controller executes instructions for producing an occupancy grid map of an environment around the robot, scanning the environment to generate a current obstacle map relative to a current robot position, and converting the current obstacle map to a current occupancy grid map. The instructions also include processing each grid cell in the occupancy grid map. Within the processing of each grid cell, the instructions include comparing each grid cell in the occupancy grid map to a corresponding grid cell in the current occupancy grid map. For grid cells with a difference, the instructions include defining a change vector for each changed grid cell, wherein the change vector includes a direction from the robot to the changed grid cell and a range from the robot to the changed grid cell.

  2. Electric Power System Anomaly Detection Using Neural Networks

    E-Print Network [OSTI]

    Tronci, Enrico

    to hijacking of measures, changes in the power network topology (i.e. transmission lines breaking) and unexElectric Power System Anomaly Detection Using Neural Networks Marco Martinelli1 , Enrico Tronci1. The aim of this work is to propose an approach to monitor and protect Electric Power System by learning

  3. Online Monitoring System for Performance Fault Detection

    SciTech Connect (OSTI)

    Gioiosa, Roberto; Kestor, Gokcen; Kerbyson, Darren J.

    2014-05-19

    To achieve the exaFLOPS performance within a contain power budget, next supercomputers will feature hundreds of millions of components operating at low- and near-threshold voltage. As the probability that at least one of these components fails during the execution of an application approaches certainty, it seems unrealistic to expect that any run of a scientific application will not experience some performance faults. We believe that there is need of a new generation of light-weight performance and debugging tools that can be used online even during production runs of parallel applications and that can identify performance anomalies during the application execution. In this work we propose the design and implementation of a monitoring system that continuously inspects the evolution of run

  4. Non intrusive sensors -- An answer to annulus pressure monitoring in subsea wellhead equipment

    SciTech Connect (OSTI)

    Adamek, F.C.; Jennings, C.; Aarskog, A.

    1995-12-01

    On offshore platform and jackup surface wellhead completions, there is the potential for leakage from the high pressure production tubing and casing strings into the low pressure outer casing string, or from poor cementing jobs. Historically, these completions maintain the capability of regularly monitoring wellhead annulus pressure so that appropriate action can be taken should a leak be detected. In the past, subsea completions have been oil producers, however, gas production, extreme reservoir pressures, and deeper waters are becoming common place. Although subsea wellhead technology and reliability have significantly improved with the introduction of the metal-to-metal sealing system, the potential for annulus pressure buildup still exists. Up to the present, the ability to monitor pressure beyond the first casing string has been virtually non-existent. This paper describes the design, development, testing, and application of non intrusive sensor technology for pressure measurement in subsea wellheads and production trees. The data and test results define and describe the phenomenon of ``inverse magnetostriction``. This phenomenon allows magnetic sensors to non intrusively penetrate three to four inches of steel in a subsea wellhead housing and measure annulus pressure from less than 30 psi to more than 15,000 psi. In addition, test data, charts, and graphs illustrate the sensor`s capability of differentiating between pressure, tension, compression, and bending stress imposed on the wellhead. The electronic interface description details how the data is obtained from the sensors, stored, and later transmitted to existing control systems or to the user interface at the surface via an ROV.

  5. Potential detection systems for monitoring UF{sub 6} releases

    SciTech Connect (OSTI)

    Beck, D.E.; Bostick, W.D.; Armstrong, D.P.; McNeely, J.R.; Stockdale, J.A.D.

    1994-09-01

    In the near future, the Nuclear Regulatory Commission (NRC) will begin to regulate the gaseous diffusion plants. Them is a concern that the smoke detectors currently used for uranium hexafluoride (UF{sub 6}) release detection will not meet NRC safety system requirements such as high reliability and rapid response. The NRC`s position is that licensees should utilize state-of-the-art equipment such as hydrogen fluoride (HF) detectors that would provide more dependable detection of a UF{sub 6} release. A survey of the literature and current vendor information was undertaken to define the state-of-the-art and commercial availability of HF (or other appropriate) detection systems. For the purpose of this report, classification of the available HF detection systems is made on the basis of detection principle (e.g., calorimetric, electrochemical, separational, or optical). Emphasis is also placed on whether the device is primarily sensitive to response from a point source (e.g., outleakage in the immediate vicinity of a specific set of components), or whether the device is potentially applicable to remote sensing over a larger area. Traditional HF point source monitoring typically uses gas sampling tubes or coated paper tapes with color developing indicator, portable and small area HF monitors are often based upon electrochemical or extractive/separational systems; and remote sensing by optical systems holds promise for indoor and outdoor large area monitoring (including plant boundary/ambient air monitoring).

  6. Vapor intrusion modeling : limitations, improvements, and value of information analyses

    E-Print Network [OSTI]

    Friscia, Jessica M. (Jessica Marie)

    2014-01-01

    Vapor intrusion is the migration of volatile organic compounds (VOCs) from a subsurface source into the indoor air of an overlying building. Vapor intrusion models, including the Johnson and Ettinger (J&E) model, can be ...

  7. Considering Attack Complexity: Layered Intrusion Tolerance

    E-Print Network [OSTI]

    Krings, Axel W.

    . Ubiquitous access translates to huge increases in the risk of external intrusion. Another factor contributing, design and test efforts are of- ten motivated by the probability of faults, e.g. Probability Risk. Automation: Any solution should re- quire the least amount of human in- tervention. Labor intensive solutions

  8. Asynchronous intrusion recovery for interconnected web services

    E-Print Network [OSTI]

    Sabatini, David M.

    Asynchronous intrusion recovery for interconnected web services Ramesh Chandra, Taesoo Kim, and tracking down and recovering from such an attack re- quires significant manual effort. Web services for such web services. Aire addresses several challenges, such as propagating repair across services when some

  9. Detecting nonclassical system-environment correlations by local operations

    E-Print Network [OSTI]

    Manuel Gessner; Heinz-Peter Breuer

    2011-11-04

    We develop a general strategy for the detection of nonclassical system-environment correlations in the initial states of an open quantum system. The method employs a dephasing map which operates locally on the open system and leads to an experimentally accessible witness for genuine quantum correlations, measuring the Hilbert-Schmidt distance between pairs of open system states. We further derive the expectation value of the witness for various random matrix ensembles modeling generic features of complex quantum systems. This expectation value is shown to be proportional to a measure for the quantum discord which reduces to the concurrence for pure initial states.

  10. Methods, systems and devices for detecting and locating ferromagnetic objects

    DOE Patents [OSTI]

    Roybal, Lyle Gene (Idaho Falls, ID) [Idaho Falls, ID; Kotter, Dale Kent (Shelley, ID) [Shelley, ID; Rohrbaugh, David Thomas (Idaho Falls, ID) [Idaho Falls, ID; Spencer, David Frazer (Idaho Falls, ID) [Idaho Falls, ID

    2010-01-26

    Methods for detecting and locating ferromagnetic objects in a security screening system. One method includes a step of acquiring magnetic data that includes magnetic field gradients detected during a period of time. Another step includes representing the magnetic data as a function of the period of time. Another step includes converting the magnetic data to being represented as a function of frequency. Another method includes a step of sensing a magnetic field for a period of time. Another step includes detecting a gradient within the magnetic field during the period of time. Another step includes identifying a peak value of the gradient detected during the period of time. Another step includes identifying a portion of time within the period of time that represents when the peak value occurs. Another step includes configuring the portion of time over the period of time to represent a ratio.

  11. A bubble detection system for propellant filling pipeline

    SciTech Connect (OSTI)

    Wen, Wen; Zong, Guanghua; Bi, Shusheng

    2014-06-15

    This paper proposes a bubble detection system based on the ultrasound transmission method, mainly for probing high-speed bubbles in the satellite propellant filling pipeline. First, three common ultrasonic detection methods are compared and the ultrasound transmission method is used in this paper. Then, the ultrasound beam in a vertical pipe is investigated, suggesting that the width of the beam used for detection is usually smaller than the internal diameter of the pipe, which means that when bubbles move close to the pipe wall, they may escape from being detected. A special device is designed to solve this problem. It can generate the spiral flow to force all the bubbles to ascend along the central line of the pipe. In the end, experiments are implemented to evaluate the performance of this system. Bubbles of five different sizes are generated and detected. Experiment results show that the sizes and quantity of bubbles can be estimated by this system. Also, the bubbles of different radii can be distinguished from each other. The numerical relationship between the ultrasound attenuation and the bubble radius is acquired and it can be utilized for estimating the unknown bubble size and measuring the total bubble volume.

  12. Review of Current Neutron Detection Systems for Emergency Response

    SciTech Connect (OSTI)

    Mukhopadhyay, S.; Maurer, R.; Guss, P.; Kruschwitz, C.

    2014-09-01

    Neutron detectors are used in a myriad of applications—from safeguarding special nuclear materials (SNM) to determining lattice spacing in soft materials. The transformational changes taking place in neutron detection and imaging techniques in the last few years are largely being driven by the global shortage of helium-3 (3He). This article reviews the status of neutron sensors used specifically for SNM detection in radiological emergency response. These neutron detectors must be highly efficient, be rugged, have fast electronics to measure neutron multiplicity, and be capable of measuring direction of the neutron sources and possibly image them with high spatial resolution. Neutron detection is an indirect physical process: neutrons react with nuclei in materials to initiate the release of one or more charged particles that produce electric signals that can be processed by the detection system. Therefore, neutron detection requires conversion materials as active elements of the detection system; these materials may include boron-10 (10B), lithium-6 (6Li), and gadollinium-157 (157Gd), to name a few, but the number of materials available for neutron detection is limited. However, in recent years, pulse-shape-discriminating plastic scintillators, scintillators made of helium-4 (4He) under high pressure, pillar and trench semiconductor diodes, and exotic semiconductor neutron detectors made from uranium oxide and other materials have widely expanded the parameter space in neutron detection methodology. In this article we will pay special attention to semiconductor-based neutron sensors. Modern micro-fabricated nanotubes covered inside with neutron converter materials and with very high aspect ratios for better charge transport will be discussed.

  13. Detection with particle filtering in BLAST systems Yufei Huang

    E-Print Network [OSTI]

    Department of Electrical and Computer Engineering University of New Hampshire Durham, NH 03824 Email: jianqiu.zhang@unh.edu Petar M. Djuri´c Department of Electrical and Computer Engineering State University of New York at StonyDetection with particle filtering in BLAST systems Yufei Huang Department of Electrical Engineering

  14. Human detection with a multi-sensors stereovision system

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Human detection with a multi-sensors stereovision system Y. Benezeth1 , P.M. Jodoin2 , B. Emile3 Far-Infrared (FIR) and daylight cameras mounted on a stereovision setup. Although daylight or FIR together. In order to gauge performances, a quantitative evaluation based on an annotated dataset

  15. A Multiple-Channel Sub-Band Transient Detection System

    SciTech Connect (OSTI)

    David A. Smith

    1998-11-01

    We have developed a unique multiple-channel sub-band transient detection system to record transient electromagnetic signals in carrier-dominated radio environments; the system has been used to make unique observations of weak, transient HF signals. The detection system has made these observations possible through improved sensitivity compared to conventional broadband transient detection systems; the sensitivity improvement is estimated to be at least 20 dB. The increase in sensitivity has been achieved through subdivision of the band of interest (an 18 MHz tunable bandwidth) into eight sub-band independent detection channels, each with a 400 kHz bandwidth and its own criteria. The system generates a system trigger signal when a predetermined number of channels (typically five) trigger within a predetermined window of time (typically 100 ~s). Events are recorded with a broadband data acquisition system sampling at 50 or 100 Msample/s, so despite the fact that the detection system operates on portions of the signal confined to narrow bands, data acquisition is broadband. Between May and September of 1994, the system was used to detect and record over six thousand transient events in the frequency band from 3 to 30 MHz. Approximately 500 of the events have been characterized as paired bursts of radio noise with individual durations of 2 to 10 ps and separations between the bursts of 5 to 160 ps. The paired transients are typically 5 to 40 dB brighter than the background electromagnetic spectrum between carrier signals. We have termed these events SubIonospheric Pulse Pairs (SIPPS) and presently have no explanation as to their source. Our observations of SIPPS resemble observations of TransIonospheric Pulse Pairs (TIPPs) recorded by the Blackboard instrument on the ALEXIS satellite; the source of TIPP events is also unknown. Most of the recorded SIPP events do not exhibit frequency dispersion, implying propagation along a line-of-sight (groundwave) path; but seven of the pairs exhibit dispersion characteristic of skywave propagation via refraction from the ionosphere. The maximum line-of-sight observation range for radio propagation extends as far as 300 km for a source at an altitude of 5 km, and 520 km for a source at 15 km. Refraction from the ionosphere, however, may allow HF radiation to propagate around the globe. Information about the times and locations of sources, in conjunction with regional, weather maps and computer models of ionospheric propagation, suggest that some SIPP events originate in the vicinity of large-scale thunderstorm complexes.

  16. Sensor integration study for a shallow tunnel detection system.

    SciTech Connect (OSTI)

    Yee, Mark L.; Abbott, Robert E.; Bonal, Nedra; Elbring, Gregory Jay; Senglaub, Michael E.

    2010-02-01

    During the past several years, there has been a growing recognition of the threats posed by the use of shallow tunnels against both international border security and the integrity of critical facilities. This has led to the development and testing of a variety of geophysical and surveillance techniques for the detection of these clandestine tunnels. The challenges of detection of these tunnels arising from the complexity of the near surface environment, the subtlety of the tunnel signatures themselves, and the frequent siting of these tunnels in urban environments with a high level of cultural noise, have time and again shown that any single technique is not robust enough to solve the tunnel detection problem in all cases. The question then arises as to how to best combine the multiple techniques currently available to create an integrated system that results in the best chance of detecting these tunnels in a variety of clutter environments and geologies. This study utilizes Taguchi analysis with simulated sensor detection performance to address this question. The analysis results show that ambient noise has the most effect on detection performance over the effects of tunnel characteristics and geological factors.

  17. Simulated performance of a position sensitive radiation detecting system (COCAE)

    E-Print Network [OSTI]

    K. Karafasoulis; K. Zachariadou; S. Seferlis; I. Kaissas; C. Lambropoulos; D. Loukas; C. Poritiriadis

    2011-01-20

    Extensive simulations of a portable radiation detecting system have been performed in order to explore important performance parameters. The instrument consists of a stack of ten detecting layers made of pixelated Cadmium Telluride (CdTe) crystals. Its aim is to localize and identify radiation sources, by exploiting the Compton imaging technique. In this paper we present performance parameters based on simulation studies. Specifically the ratio of incompletely absorbed photons, the detector's absolute efficiency as well as its energy and angular resolution are evaluated in a wide range of incident photon energies.

  18. Lateral position detection and control for friction stir systems

    DOE Patents [OSTI]

    Fleming, Paul (Boulder, CO); Lammlein, David (Houston, TX); Cook, George E. (Brentwood, TN); Wilkes, Don Mitchell (Nashville, TN); Strauss, Alvin M. (Nashville, TN); Delapp, David (Ashland City, TN); Hartman, Daniel A. (Santa Fe, NM)

    2010-12-14

    A friction stir system for processing at least a first workpiece includes a spindle actuator coupled to a rotary tool comprising a rotating member for contacting and processing the first workpiece. A detection system is provided for obtaining information related to a lateral alignment of the rotating member. The detection system comprises at least one sensor for measuring a force experienced by the rotary tool or a parameter related to the force experienced by the rotary tool during processing, wherein the sensor provides sensor signals. A signal processing system is coupled to receive and analyze the sensor signals and determine a lateral alignment of the rotating member relative to a selected lateral position, a selected path, or a direction to decrease a lateral distance relative to the selected lateral position or selected path. In one embodiment, the friction stir system can be embodied as a closed loop tracking system, such as a robot-based tracked friction stir welding (FSW) or friction stir processing (FSP) system.

  19. Dynamic analysis methods for detecting anomalies in asynchronously interacting systems.

    SciTech Connect (OSTI)

    Kumar, Akshat; Solis, John Hector; Matschke, Benjamin

    2014-01-01

    Detecting modifications to digital system designs, whether malicious or benign, is problematic due to the complexity of the systems being analyzed. Moreover, static analysis techniques and tools can only be used during the initial design and implementation phases to verify safety and liveness properties. It is computationally intractable to guarantee that any previously verified properties still hold after a system, or even a single component, has been produced by a third-party manufacturer. In this paper we explore new approaches for creating a robust system design by investigating highly-structured computational models that simplify verification and analysis. Our approach avoids the need to fully reconstruct the implemented system by incorporating a small verification component that dynamically detects for deviations from the design specification at run-time. The first approach encodes information extracted from the original system design algebraically into a verification component. During run-time this component randomly queries the implementation for trace information and verifies that no design-level properties have been violated. If any deviation is detected then a pre-specified fail-safe or notification behavior is triggered. Our second approach utilizes a partitioning methodology to view liveness and safety properties as a distributed decision task and the implementation as a proposed protocol that solves this task. Thus the problem of verifying safety and liveness properties is translated to that of verifying that the implementation solves the associated decision task. We develop upon results from distributed systems and algebraic topology to construct a learning mechanism for verifying safety and liveness properties from samples of run-time executions.

  20. Neutron Interrogation System For Underwater Threat Detection And Identification

    SciTech Connect (OSTI)

    Barzilov, Alexander P.; Novikov, Ivan S.; Womble, Phil C.

    2009-03-10

    Wartime and terrorist activities, training and munitions testing, dumping and accidents have generated significant munitions contamination in the coastal and inland waters in the United States and abroad. Although current methods provide information about the existence of the anomaly (for instance, metal objects) in the sea bottom, they fail to identify the nature of the found objects. Field experience indicates that often in excess of 90% of objects excavated during the course of munitions clean up are found to be non-hazardous items (false alarm). The technology to detect and identify waterborne or underwater threats is also vital for protection of critical infrastructures (ports, dams, locks, refineries, and LNG/LPG). We are proposing a compact neutron interrogation system, which will be used to confirm possible threats by determining the chemical composition of the suspicious underwater object. The system consists of an electronic d-T 14-MeV neutron generator, a gamma detector to detect the gamma signal from the irradiated object and a data acquisition system. The detected signal then is analyzed to quantify the chemical elements of interest and to identify explosives or chemical warfare agents.

  1. Strategies for Detecting Hidden Geothermal Systems by Near-Surface Gas Monitoring

    E-Print Network [OSTI]

    Lewicki, Jennifer L.; Oldenburg, Curtis M.

    2004-01-01

    Mahon, Chemistry and Geothermal Systems, Academic Press, NewHidden Geothermal Systems geothermal origin. However, thesefor Detection of Hidden Geothermal Systems Figure 7.4.

  2. Near-Surface CO2 Monitoring And Analysis To Detect Hidden Geothermal Systems

    E-Print Network [OSTI]

    Lewicki, Jennifer L.; Oldenburg, Curtis M.

    2005-01-01

    1977), Chemistry and Geothermal Systems, Academic Press, Newgas species in most geothermal systems and has moderatefor detecting hidden geothermal systems by near-surface gas

  3. Autonomous navigation system and method

    DOE Patents [OSTI]

    Bruemmer, David J. (Idaho Falls, ID) [Idaho Falls, ID; Few, Douglas A. (Idaho Falls, ID) [Idaho Falls, ID

    2009-09-08

    A robot platform includes perceptors, locomotors, and a system controller, which executes instructions for autonomously navigating a robot. The instructions repeat, on each iteration through an event timing loop, the acts of defining an event horizon based on the robot's current velocity, detecting a range to obstacles around the robot, testing for an event horizon intrusion by determining if any range to the obstacles is within the event horizon, and adjusting rotational and translational velocity of the robot accordingly. If the event horizon intrusion occurs, rotational velocity is modified by a proportion of the current rotational velocity reduced by a proportion of the range to the nearest obstacle and translational velocity is modified by a proportion of the range to the nearest obstacle. If no event horizon intrusion occurs, translational velocity is set as a ratio of a speed factor relative to a maximum speed.

  4. Non-intrusive ultrasonic liquid-in-line detector for small diameter tubes. [Patent application

    DOE Patents [OSTI]

    Piper, T.C.

    1980-09-24

    An arrangement for detecting liquids in a line, using non-intrusive ultrasonic techniques is disclosed. In this arrangement, four piezoelectric crystals are arranged in pairs about a 0.078 inch o.d. pipe. An ultrasonic tone burst is transmitted along the pipe, between crystal pairs, and the amplitude of the received tone burst indicates the absence/presence of liquid in the pipe.

  5. Robotic guarded motion system and method

    DOE Patents [OSTI]

    Bruemmer, David J. (Idaho Falls, ID)

    2010-02-23

    A robot platform includes perceptors, locomotors, and a system controller. The system controller executes instructions for repeating, on each iteration through an event timing loop, the acts of defining an event horizon, detecting a range to obstacles around the robot, and testing for an event horizon intrusion. Defining the event horizon includes determining a distance from the robot that is proportional to a current velocity of the robot and testing for the event horizon intrusion includes determining if any range to the obstacles is within the event horizon. Finally, on each iteration through the event timing loop, the method includes reducing the current velocity of the robot in proportion to a loop period of the event timing loop if the event horizon intrusion occurs.

  6. Magnetic resonance imaging of living systems by remote detection

    DOE Patents [OSTI]

    Wemmer, David; Pines, Alexander; Bouchard, Louis; Xu, Shoujun; Harel, Elad; Budker, Dmitry; Lowery, Thomas; Ledbetter, Micah

    2013-10-29

    A novel approach to magnetic resonance imaging is disclosed. Blood flowing through a living system is prepolarized, and then encoded. The polarization can be achieved using permanent or superconducting magnets. The polarization may be carried out upstream of the region to be encoded or at the place of encoding. In the case of an MRI of a brain, polarization of flowing blood can be effected by placing a magnet over a section of the body such as the heart upstream of the head. Alternatively, polarization and encoding can be effected at the same location. Detection occurs at a remote location, using a separate detection device such as an optical atomic magnetometer, or an inductive Faraday coil. The detector may be placed on the surface of the skin next to a blood vessel such as a jugular vein carrying blood away from the encoded region.

  7. Stragegies to Detect Hidden Geothermal Systems Based on Monitoring and Analysis of CO2 in the Near-Surface Environment

    E-Print Network [OSTI]

    Lewicki, Jennifer L.; Oldenburg, Curtis M.

    2008-01-01

    1977. Chemistry and Geothermal Systems. Academic Press, Newfor detecting hidden geothermal systems by near-surface gasto Detect Hidden Geothermal Systems Based on Monitoring and

  8. Methods and systems for detecting abnormal digital traffic

    DOE Patents [OSTI]

    Goranson, Craig A [Kennewick, WA; Burnette, John R [Kennewick, WA

    2011-03-22

    Aspects of the present invention encompass methods and systems for detecting abnormal digital traffic by assigning characterizations of network behaviors according to knowledge nodes and calculating a confidence value based on the characterizations from at least one knowledge node and on weighting factors associated with the knowledge nodes. The knowledge nodes include a characterization model based on prior network information. At least one of the knowledge nodes should not be based on fixed thresholds or signatures. The confidence value includes a quantification of the degree of confidence that the network behaviors constitute abnormal network traffic.

  9. Image change detection systems, methods, and articles of manufacture

    DOE Patents [OSTI]

    Jones, James L. (Idaho Falls, ID); Lassahn, Gordon D. (Idaho Falls, ID); Lancaster, Gregory D. (Idaho Falls, ID)

    2010-01-05

    Aspects of the invention relate to image change detection systems, methods, and articles of manufacture. According to one aspect, a method of identifying differences between a plurality of images is described. The method includes loading a source image and a target image into memory of a computer, constructing source and target edge images from the source and target images to enable processing of multiband images, displaying the source and target images on a display device of the computer, aligning the source and target edge images, switching displaying of the source image and the target image on the display device, to enable identification of differences between the source image and the target image.

  10. Spreader-Bar Radiation Detection System Enhancements: A Modeling and Simulation Study

    SciTech Connect (OSTI)

    Ely, James H.; Ashbaker, Eric D.; Batdorf, Michael T.; Baciak, James E.; Hensley, Walter K.; Jarman, Kenneth D.; Robinson, Sean M.; Sandness, Gerald A.; Schweppe, John E.

    2012-11-13

    This report provides the modeling and simulation results of the investigation of enhanced spreader bar radiation detection systems.

  11. A Multiple Model Cost-Sensitive Approach for Intrusion Detection

    E-Print Network [OSTI]

    Lee, Wenke

    that are optimized for user-de#12;ned cost metrics. Empirical experiments in o#11;- line analysis show a reduction of approximately 97% in operational cost over a single model approach, and a reduction of approximately 30 the initial results of our current research in extending our data mining framework to build cost

  12. Automatic compilation framework for Bloom filter based intrusion detection

    E-Print Network [OSTI]

    Najjar, Walid A.

    8% of the FPGA area. 1. Introduction Studies on economic impact of computer viruses have shown On Applied Reconfigurable Computing (ARC 2006)· Delft, The Netherlands, March 1-3, 2006. #12;for virus*, Betul Buyukkurt and Walid A. Najjar Department of Computer Science and Engineering *Department

  13. Cybersecurity Intrusion Detection and Security Monitoring for Field Area Networks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum Based| Department of Energy Whole-HomeCutting Edge Building5

  14. Intrusion Detecting Using Secure Signatures - Energy Innovation Portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATIONIntroducing the Richard P. Feynman CenterSafetyTwoElectricity

  15. 2006 ILDC/ILMC Validation of Operational LDS VALIDATION OF AN OPERATIONAL LIGHTNING DETECTION SYSTEM

    E-Print Network [OSTI]

    Haak, Hein

    lightning detection system. Since 1995 KNMI operates a SAFIR (Surveillance et Alerte Foudre par of the lightning data of the SAFIR system. Validation against other operational lightning detection systems2006 ILDC/ILMC Validation of Operational LDS VALIDATION OF AN OPERATIONAL LIGHTNING DETECTION

  16. Mobile Sensor Networks for Leak and Backflow Detection in Water Distribution Systems

    E-Print Network [OSTI]

    Shihada, Basem

    Mobile Sensor Networks for Leak and Backflow Detection in Water Distribution Systems M. Agumbe detection are essential aspects of Water Distribution System (WDS) monitoring. Most existing solutions for leak detection in water distribution systems focus on the placement of expensive static sensors located

  17. Testing and Evaluation Protocol for Backpack-Based Radiation Detection Systems Used for Homeland

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland Radiation Detection Systems Used for Homeland Security EFF. DATE 2013-05-30 REV. 2.00 PAGE 1 of 10 Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland Security 1. Scope

  18. Estimation of confidence levels for physiology variables measured by a vital signs detection system

    E-Print Network [OSTI]

    Estimation of confidence levels for physiology variables measured by a vital signs detection system Quantifying the accuracy of physiological data measured by a Vital Signs Detection System (VSDS) plays a key,2 The Vital Signs Detection System (VSDS) tested by the U.S. Army Research Institute of Environmental Medicine

  19. Convective injection into stratospheric intrusions Cameron R. Homeyer,1

    E-Print Network [OSTI]

    Pan, Laura

    Convective injection into stratospheric intrusions Cameron R. Homeyer,1 Kenneth P. Bowman,1 Laura L, are not entirely understood. This study presents direct observations of moist convection penetrating into stratospheric intrusions. The characteristics of convective injection are shown by using in situ aircraft

  20. System and method for detection of dispersed broadband signals

    DOE Patents [OSTI]

    Qian, Shie (Austin, TX); Dunham, Mark E. (Los Alamos, NM)

    1999-06-08

    A system and method for detecting the presence of dispersed broadband signals in real time. The present invention utilizes a bank of matched filters for detecting the received dispersed broadband signals. Each matched filter uses a respective robust time template that has been designed to approximate the dispersed broadband signals of interest, and each time template varies across a spectrum of possible dispersed broadband signal time templates. The received dispersed broadband signal x(t) is received by each of the matched filters, and if one or more matches occurs, then the received data is determined to have signal data of interest. This signal data can then be analyzed and/or transmitted to Earth for analysis, as desired. The system and method of the present invention will prove extremely useful in many fields, including satellite communications, plasma physics, and interstellar research. The varying time templates used in the bank of matched filters are determined as follows. The robust time domain template is assumed to take the form w(t)=A(t)cos{2.phi.(t)}. Since the instantaneous frequency f(t) is known to be equal to the derivative of the phase .phi.(t), the trajectory of a joint time-frequency representation of x(t) is used as an approximation of .phi.'(t).

  1. System and method for detection of dispersed broadband signals

    DOE Patents [OSTI]

    Qian, S.; Dunham, M.E.

    1999-06-08

    A system and method for detecting the presence of dispersed broadband signals in real time are disclosed. The present invention utilizes a bank of matched filters for detecting the received dispersed broadband signals. Each matched filter uses a respective robust time template that has been designed to approximate the dispersed broadband signals of interest, and each time template varies across a spectrum of possible dispersed broadband signal time templates. The received dispersed broadband signal x(t) is received by each of the matched filters, and if one or more matches occurs, then the received data is determined to have signal data of interest. This signal data can then be analyzed and/or transmitted to Earth for analysis, as desired. The system and method of the present invention will prove extremely useful in many fields, including satellite communications, plasma physics, and interstellar research. The varying time templates used in the bank of matched filters are determined as follows. The robust time domain template is assumed to take the form w(t)=A(t)cos[l brace]2[phi](t)[r brace]. Since the instantaneous frequency f(t) is known to be equal to the derivative of the phase [phi](t), the trajectory of a joint time-frequency representation of x(t) is used as an approximation of [phi][prime](t). 10 figs.

  2. detection

    National Nuclear Security Administration (NNSA)

    of 25 Million Grant to Improve Technological Capabilities for Detecting Nuclear Proliferation http:www.nnsa.energy.govmediaroompressreleasesncstateconsortium

  3. System and method for detecting a faulty object in a system

    DOE Patents [OSTI]

    Gunnels, John A. (Brewster, NY); Gustavson, Fred Gehrung (Briarcliff Manor, NY); Engle, Robert Daniel (St. Louis, MO)

    2010-12-14

    A method (and system) for detecting at least one faulty object in a system including a plurality of objects in communication with each other in an n-dimensional architecture, includes probing a first plane of objects in the n-dimensional architecture and probing at least one other plane of objects in the n-dimensional architecture which would result in identifying a faulty object in the system.

  4. System and method for detecting a faulty object in a system

    DOE Patents [OSTI]

    Gunnels, John A. (Brewster, NY); Gustavson, Fred Gehrung (Briarcliff Manor, NY); Engle, Robert Daniel (St. Louis, MO)

    2009-03-17

    A method (and system) for detecting at least one faulty object in a system including a plurality of objects in communication with each other in an n-dimensional architecture, includes probing a first plane of objects in the n-dimensional architecture and probing at least one other plane of objects in the n-dimensional architecture which would result in identifying a faulty object in the system.

  5. 'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State

    SciTech Connect (OSTI)

    Miles McQueen; Annarita Giani

    2011-09-01

    This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

  6. A Multi-Layer Phoswich Radioxenon Detection System

    SciTech Connect (OSTI)

    David M. Hamby

    2008-07-14

    Laboratory radioactive sources were used to characterize the phoswich detector. The CaF{sub 2} scintillator has a low light-yield and slow decay time, thus produces very small signals due to low-energy gamma rays or X-rays. Therefore, detection of 30 keV X-rays (from the xenon radioisotopes) using this layer and discriminating its very small signals from electronic noise was a challenging task. Several solutions were considered and experimentally evaluated. We found that the best solution would be extending the fast triangular filter from 10 taps to 30 taps. This will extend the peaking time of this filter from 25 nsec to 75 nsec. The digital filter is implemented in FPGA on our DPP2.0 and is used to trigger the detection system. Functionality of the new filter in capturing and discriminating 30 keV X-rays was confirmed by using a {sup 133}Ba gamma-ray source. Development of the DPP GUI software has continued with the addition of two new panels to display histograms of beta/gamma and beta/x-ray coincidence events. This includes coincidence events from a single channel, as well as two-channel, coincidence event. A pileup rejection algorithm has been implemented in the FPGA code, and controls to adjust its sensitivity have been added to the GUI. Work has begun on a new prototype system to develop a USB host interface between the PC and the FPGA to end reliance on Opal Kelly prototyping boards; the hardware for this system has been completely assembled, and the PC-side software is currently in development.

  7. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    SciTech Connect (OSTI)

    Trauth, K.M.; Hora, S.C.; Guzowski, R.V.

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

  8. Protein- protein interaction detection system using fluorescent protein microdomains

    DOE Patents [OSTI]

    Waldo, Geoffrey S. (Santa Fe, NM); Cabantous, Stephanie (Los Alamos, NM)

    2010-02-23

    The invention provides a protein labeling and interaction detection system based on engineered fragments of fluorescent and chromophoric proteins that require fused interacting polypeptides to drive the association of the fragments, and further are soluble and stable, and do not change the solubility of polypeptides to which they are fused. In one embodiment, a test protein X is fused to a sixteen amino acid fragment of GFP (.beta.-strand 10, amino acids 198-214), engineered to not perturb fusion protein solubility. A second test protein Y is fused to a sixteen amino acid fragment of GFP (.beta.-strand 11, amino acids 215-230), engineered to not perturb fusion protein solubility. When X and Y interact, they bring the GFP strands into proximity, and are detected by complementation with a third GFP fragment consisting of GFP amino acids 1-198 (strands 1-9). When GFP strands 10 and 11 are held together by interaction of protein X and Y, they spontaneous association with GFP strands 1-9, resulting in structural complementation, folding, and concomitant GFP fluorescence.

  9. Spin-detection in a quantum electromechanical shuttle system

    E-Print Network [OSTI]

    J. Twamley; D. W. Utami; H. -S. Goan; G. J. Milburn

    2006-01-19

    We study the electrical transport of a harmonically-bound, single-molecule endohedral fullerene shuttle operating in the Coulomb blockade regime, i.e. single electron shuttling. In particular we examine the dependance of the tunnel current on an ultra-small stationary force exerted on the shuttle. We derive a quantum master equation for the full shuttle system which includes the metallic contacts, the spatially dependent tunnel couplings to the shuttle, the electronic and motional degrees of freedom of the shuttle itself and a coupling of the shuttle's motion to a phonon bath. We analyse the resulting quantum master equation and find that, due to the exponential dependance of the tunnel probability on the shuttle-contact separation, the current is highly sensitive to very small forces. In particular we predict that the spin state of the endohedral electrons of the endohedral fullerene in a large magnetic gradient field can be distinguished from the resulting current signals within a few tens of nanoseconds. This effect could prove useful for the detection of the endohedral spin-state of individual paramagnetic molecules such as N@C60 and P@C60, or the detection of very small static forces acting on a molecular shuttle.

  10. Cable Damage Detection System and Algorithms Using Time Domain Reflectometry

    SciTech Connect (OSTI)

    Clark, G A; Robbins, C L; Wade, K A; Souza, P R

    2009-03-24

    This report describes the hardware system and the set of algorithms we have developed for detecting damage in cables for the Advanced Development and Process Technologies (ADAPT) Program. This program is part of the W80 Life Extension Program (LEP). The system could be generalized for application to other systems in the future. Critical cables can undergo various types of damage (e.g. short circuits, open circuits, punctures, compression) that manifest as changes in the dielectric/impedance properties of the cables. For our specific problem, only one end of the cable is accessible, and no exemplars of actual damage are available. This work addresses the detection of dielectric/impedance anomalies in transient time domain reflectometry (TDR) measurements on the cables. The approach is to interrogate the cable using time domain reflectometry (TDR) techniques, in which a known pulse is inserted into the cable, and reflections from the cable are measured. The key operating principle is that any important cable damage will manifest itself as an electrical impedance discontinuity that can be measured in the TDR response signal. Machine learning classification algorithms are effectively eliminated from consideration, because only a small number of cables is available for testing; so a sufficient sample size is not attainable. Nonetheless, a key requirement is to achieve very high probability of detection and very low probability of false alarm. The approach is to compare TDR signals from possibly damaged cables to signals or an empirical model derived from reference cables that are known to be undamaged. This requires that the TDR signals are reasonably repeatable from test to test on the same cable, and from cable to cable. Empirical studies show that the repeatability issue is the 'long pole in the tent' for damage detection, because it is has been difficult to achieve reasonable repeatability. This one factor dominated the project. The two-step model-based approach is summarized as follows: Step 1, Cable Modeling: Given input-output TDR signals s(n) and x{sub U}(n) for a cable known to be free of damage, system identification algorithms are used to compute a dynamic prediction-error cable model that has output {cflx x}{sub U}(n). The model is declared valid when the innovations e{sub U}(n) = x{sub U}(n) {cflx x}{sub U}(n) satisfy a statistical zero-mean whiteness test. This validated model output is then used as a known reference to which other cables can be compared. Step 2, Cable Testing: The TDR output signal x{sub D}(n) from a cable under test is compared with the model output {cflx x}{sub U}(n) by computing the innovations e{sub D}(n) = x{sub D}(n) {cflx x}{sub U}(n). The innovations are tested using a short-term whiteness test statistic, which employs a statistical confidence interval. If the cable passes the test, this implies that the model is valid and the cable is declared undamaged. If the cable fails the test, this indicates a model mismatch, which means that the cable's dielectric properties have changed; and this implies that the cable is damaged. The test threshold is adjusted to maximize probability of detection and minimize probability of false alarm according to an empirically determined receiver operating characteristic (ROC) curve. An associated confidence interval on the probability of correct classification is also provided. The effectiveness of the algorithm is demonstrated using measured TDR signals for undamaged and damaged cables. Experimental and algorithmic methods for coping with repeatability issues are presented. The model-based damage detection algorithms have been shown to perform well for some representative examples of real TDR signals acquired using the two-dimensional (2D) mockup fixture. If the damage causes a short circuit, then damage detection performance is generally good to excellent. Examples include the cases demonstrated in this report for cuts and pinholes. If the damage does not cause a short circuit, then damage detection performance is generally poor to fair. Examples include

  11. Scoping study of SNM detection and indentification for adjunct on-site treaty monitoring. Final report

    SciTech Connect (OSTI)

    Murray, W.S.; Morgado, R.E.; Frankle, C.M.

    1995-07-01

    Following the fall of the Soviet Union, political pressure to negotiate meaningful nuclear arms agreements with Russia and the former soviet republics has increased. Anticipating the monitoring requirements of a future treaty for the decommissioning and disassembly of nuclear warheads presents opportunities to review existing monitoring technologies and to explore new methods to detect and analyze intrinsic radiation. Fully instrumented radiation-detection systems with a range of monitoring capabilities are available, but special-purpose instruments will still need to be developed to match increasing demands for high-confidence, low-intrusion monitoring in a specific scenario. As a guide to present capabilities in monitoring technologies, we have categorized their relevant attributes to detect and identify special nuclear material based on levels of confidence, intrusiveness, vulnerability, and other critical concerns. To add additional flexibility, we review emerging technologies and estimate the development time to bring them to operational status.

  12. Technical specifications manual for the MARK-1 pulsed ionizing radiation detection system. Volume 1

    SciTech Connect (OSTI)

    Lawrence, R.S.; Harker, Y.D.; Jones, J.L.; Hoggan, J.M.

    1993-03-01

    The MARK-1 detection system was developed by the Idaho National Engineering Laboratory for the US Department of Energy Office of Arms Control and Nonproliferation. The completely portable system was designed for the detection and analysis of intense photon emissions from pulsed ionizing radiation sources. This manual presents the technical design specifications for the MARK-1 detection system and was written primarily to assist the support or service technician in the service, calibration, and repair of the system. The manual presents the general detection system theory, the MARK-1 component design specifications, the acquisition and control software, the data processing sequence, and the system calibration procedure. A second manual entitled: Volume 2: Operations Manual for the MARK-1 Pulsed Ionizing Radiation Detection System (USDOE Report WINCO-1108, September 1992) provides a general operational description of the MARK-1 detection system. The Operations Manual was written primarily to assist the field operator in system operations and analysis of the data.

  13. Systems and methods for detecting x-rays

    DOE Patents [OSTI]

    Bross, Alan D.; Mellott, Kerry L.; Pla-Dalmau, Anna

    2006-05-02

    Systems and methods for detecting x-rays are disclosed herein. One or more x-ray-sensitive scintillators can be configured from a plurality of heavy element nano-sized particles and a plastic material, such as polystyrene. As will be explained in greater detail herein, the heavy element nano-sized particles (e.g., PbWO4) can be compounded into the plastic material with at least one dopant that permits the plastic material to scintillate. X-rays interact with the heavy element nano-sized particles to produce electrons that can deposit energy in the x-ray sensitive scintillator, which in turn can produce light.

  14. Photon Detection System Designs for the Deep Underground Neutrino Experiment

    E-Print Network [OSTI]

    Whittington, Denver

    2015-01-01

    The Deep Underground Neutrino Experiment (DUNE) will be a premier facility for exploring long-standing questions about the boundaries of the standard model. Acting in concert with the liquid argon time projection chambers underpinning the far detector design, the DUNE photon detection system will capture ultraviolet scintillation light in order to provide valuable timing information for event reconstruction. To maximize the active area while maintaining a small photocathode coverage, the experiment will utilize a design based on plastic light guides coated with a wavelength-shifting compound, along with silicon photomultipliers, to collect and record scintillation light from liquid argon. This report presents recent preliminary performance measurements of this baseline design and several alternative designs which promise significant improvements in sensitivity to low-energy interactions.

  15. Comparison of enclosed space detection system with conventional methods

    SciTech Connect (OSTI)

    Kercel, S.W.; Baylor, V.M.; Labaj, L.E.

    1997-09-01

    Enclosed Space Detection System (ESDS) is a fast, inexpensive, and reliable device for detecting human occupants hidden in vehicles. Operation requires less than two minutes. ESDS is used to foil attempts at smuggling illegal aliens, terrorists, and escaping prisoners. It is being tested at nuclear weapons facilities and has been operated at several prisons and international border crossings. ESDS is the first practical electronic alternative to physical searches of vehicles for hidden passengers. At critical checkpoints, a thorough physical search of a single fully loaded truck requires a team of from two to six people, and may take as long as eight hours. Despite this level of security, experience has shown that the search can occasionally be foiled. Due to the enormous time and expense of thorough physical searches of vehicles, they are seldom conducted at any but the most critical of locations, simply leaving many sites vulnerable to crime and terrorism. Prior to the development of the ESDS, the only other effective alternative to physical search was the use of specially-trained canines, which can be vastly superior to the physical search in both time and accuracy. However, as discussed in this paper, canine inspection is not really a competitive substitute for ESDS because canine reliability (80% at most) is not as high as that of the ESDS (99%+), while the costs, training requirements, and operator skill needed are significantly higher with canines than with the ESDS. In addition, the ESDS has straightforward self-diagnostic tests to ensure the system is operating correctly; such tests are not currently available with either canine or human inspectors. ESDS offers an attractive supplement or alternative to meet current security requirements for vehicle searches at portals at government, nuclear, industrial, and other facilities where concealed persons may pose a threat either by entering or leaving.

  16. Constituents of political cognition: Race, party politics, and the alliance detection system

    E-Print Network [OSTI]

    Cosmides, Leda

    Constituents of political cognition: Race, party politics, and the alliance detection system David contains a set of adaptations for detecting alliances: an alliance detection system, which monitors for, encodes, and stores alliance information and then modifies the activation of stored alliance categories

  17. Termination Detection in an Asynchronous Distributed System with Crash-Recovery

    E-Print Network [OSTI]

    Mittal, Neeraj

    Termination Detection in an Asynchronous Distributed System with Crash-Recovery Failures Felix C 75083, USA 1 Termination Detection In practice, it cannot easily be detected whether a computation running in a distributed system has terminated or not. Thus, suitable observing algorithms are required

  18. Real-time system for imaging and object detection with a multistatic GPR array

    DOE Patents [OSTI]

    Paglieroni, David W; Beer, N Reginald; Bond, Steven W; Top, Philip L; Chambers, David H; Mast, Jeffrey E; Donetti, John G; Mason, Blake C; Jones, Steven M

    2014-10-07

    A method and system for detecting the presence of subsurface objects within a medium is provided. In some embodiments, the imaging and detection system operates in a multistatic mode to collect radar return signals generated by an array of transceiver antenna pairs that is positioned across the surface and that travels down the surface. The imaging and detection system pre-processes the return signal to suppress certain undesirable effects. The imaging and detection system then generates synthetic aperture radar images from real aperture radar images generated from the pre-processed return signal. The imaging and detection system then post-processes the synthetic aperture radar images to improve detection of subsurface objects. The imaging and detection system identifies peaks in the energy levels of the post-processed image frame, which indicates the presence of a subsurface object.

  19. Person detection : unmanned system and small sensor applications

    E-Print Network [OSTI]

    Rosendall, Paul Edward

    2008-01-01

    The ability to quickly and reliably detect people in images and video is highly desired. Several object recognition algorithms have demonstrated successful detection of multiclass objects with varied scale, position and ...

  20. OPNET/Simulink Based Testbed for Disturbance Detection in the Smart Grid

    SciTech Connect (OSTI)

    Sadi, Mohammad A. H.; Dasgupta, Dipankar; Ali, Mohammad Hassan; Abercrombie, Robert K

    2015-01-01

    The important backbone of the smart grid is the cyber/information infrastructure, which is primarily used to communicate with different grid components. A smart grid is a complex cyber physical system containing a numerous and variety number of sources, devices, controllers and loads. Therefore, the smart grid is vulnerable to grid related disturbances. For such dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and Opnet based co-simulated platform to carry out a cyber-intrusion in cyber network for modern power systems and the smart grid. The IEEE 30 bus power system model is used to demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack. Different disturbance situations in the considered test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.

  1. ADECENTRALIZED APPROACH TOWARDS AUTONOMOUS FAULT DETECTION IN WIRELESS STRUCTURAL HEALTH MONITORING SYSTEMS

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ADECENTRALIZED APPROACH TOWARDS AUTONOMOUS FAULT DETECTION IN WIRELESS STRUCTURAL HEALTH MONITORING structural health monitoring (SHM) systems may reduce the monitoring quality and, if remaining undetected : Autonomous fault detection, structural health monitoring, wireless sensor networks, smart sensors, analytical

  2. Wavelet-based Burst Event Detection and Localization in Water Distribution Systems

    E-Print Network [OSTI]

    Srirangarajan, Seshan

    In this paper we present techniques for detecting and locating transient pipe burst events in water distribution systems. The proposed method uses multiscale wavelet analysis of high rate pressure data recorded to detect ...

  3. Nuisance Source Population Modeling for Radiation Detection System Analysis

    SciTech Connect (OSTI)

    Sokkappa, P; Lange, D; Nelson, K; Wheeler, R

    2009-10-05

    A major challenge facing the prospective deployment of radiation detection systems for homeland security applications is the discrimination of radiological or nuclear 'threat sources' from radioactive, but benign, 'nuisance sources'. Common examples of such nuisance sources include naturally occurring radioactive material (NORM), medical patients who have received radioactive drugs for either diagnostics or treatment, and industrial sources. A sensitive detector that cannot distinguish between 'threat' and 'benign' classes will generate false positives which, if sufficiently frequent, will preclude it from being operationally deployed. In this report, we describe a first-principles physics-based modeling approach that is used to approximate the physical properties and corresponding gamma ray spectral signatures of real nuisance sources. Specific models are proposed for the three nuisance source classes - NORM, medical and industrial. The models can be validated against measured data - that is, energy spectra generated with the model can be compared to actual nuisance source data. We show by example how this is done for NORM and medical sources, using data sets obtained from spectroscopic detector deployments for cargo container screening and urban area traffic screening, respectively. In addition to capturing the range of radioactive signatures of individual nuisance sources, a nuisance source population model must generate sources with a frequency of occurrence consistent with that found in actual movement of goods and people. Measured radiation detection data can indicate these frequencies, but, at present, such data are available only for a very limited set of locations and time periods. In this report, we make more general estimates of frequencies for NORM and medical sources using a range of data sources such as shipping manifests and medical treatment statistics. We also identify potential data sources for industrial source frequencies, but leave the task of estimating these frequencies for future work. Modeling of nuisance source populations is only useful if it helps in understanding detector system performance in real operational environments. Examples of previous studies in which nuisance source models played a key role are briefly discussed. These include screening of in-bound urban traffic and monitoring of shipping containers in transit to U.S. ports.

  4. Potential for radionuclide redistribution due to biotic intrusion...

    Office of Scientific and Technical Information (OSTI)

    potentially lead to the exposure to members of the public. The potential amount of contamination deposited on the ground surface, due to plant intrusion into buried waste, is a...

  5. A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage...

    Open Energy Info (EERE)

    A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage (Sichuan, Sw China) Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal Article: A...

  6. A Review of Damage Detection and Health Monitoring of Mechanical Systems from Changes in

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Review of Damage Detection and Health Monitoring of Mechanical Systems from Changes of Damage Detection and Health Monitoring... 1 1. Introduction Damage are a main cause of structural failure of structural components by detection damage in structures in the early state. More specifically, structural

  7. Fiber-coupled nanowire photon counter at 1550 nm with 24% system detection efficiency

    E-Print Network [OSTI]

    Hu, Xiaolong

    We developed a fiber-coupled superconducting nanowire single-photon detector system in a close-cycled cryocooler and achieved 24% and 22% system detection efficiencies at wavelengths of 1550 and 1315 nm, respectively. The ...

  8. Fast Detection and Mitigation of Cascading Outages in the Power System 

    E-Print Network [OSTI]

    Pang, Chengzong

    2012-02-14

    This dissertation studies the causes and mechanism of power system cascading outages and proposes the improved interactive scheme between system-wide and local levels of monitoring and control to quickly detect, classify and mitigate the cascading...

  9. Design of a decentralized detection filter for a class of interconnected LTI systems 

    E-Print Network [OSTI]

    Shankar, Shamanth

    2001-01-01

    In this thesis, we consider the problem of designing a decentralized detection filter for a class of homogeneous interconnected systems. In this class of systems, all subsystems have an identical structure. A fault in a subsystem propagates via...

  10. High-speed and high-fidelity system and method for collecting network traffic

    DOE Patents [OSTI]

    Weigle, Eric H. (Los Alamos, NM)

    2010-08-24

    A system is provided for the high-speed and high-fidelity collection of network traffic. The system can collect traffic at gigabit-per-second (Gbps) speeds, scale to terabit-per-second (Tbps) speeds, and support additional functions such as real-time network intrusion detection. The present system uses a dedicated operating system for traffic collection to maximize efficiency, scalability, and performance. A scalable infrastructure and apparatus for the present system is provided by splitting the work performed on one host onto multiple hosts. The present system simultaneously addresses the issues of scalability, performance, cost, and adaptability with respect to network monitoring, collection, and other network tasks. In addition to high-speed and high-fidelity network collection, the present system provides a flexible infrastructure to perform virtually any function at high speeds such as real-time network intrusion detection and wide-area network emulation for research purposes.

  11. DeepCough: A Deep Convolutional Neural Network in A Wearable Cough Detection System

    E-Print Network [OSTI]

    Odam, Kofi

    DeepCough: A Deep Convolutional Neural Network in A Wearable Cough Detection System Justice Amoh that employs a wearable acoustic sensor and a deep convolutional neural network for detecting coughs. We evaluate the performance of our system on 14 healthy volunteers and compare it to that of other cough

  12. Video systems for alarm assessment

    SciTech Connect (OSTI)

    Greenwoll, D.A.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Ebel, P.E. (BE, Inc., Barnwell, SC (United States))

    1991-09-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing closed-circuit television systems for video alarm assessment. There is a section on each of the major components in a video system: camera, lens, lighting, transmission, synchronization, switcher, monitor, and recorder. Each section includes information on component selection, procurement, installation, test, and maintenance. Considerations for system integration of the components are contained in each section. System emphasis is focused on perimeter intrusion detection and assessment systems. A glossary of video terms is included. 13 figs., 9 tabs.

  13. System and method for automated object detection in an image

    DOE Patents [OSTI]

    Kenyon, Garrett T.; Brumby, Steven P.; George, John S.; Paiton, Dylan M.; Schultz, Peter F.

    2015-10-06

    A contour/shape detection model may use relatively simple and efficient kernels to detect target edges in an object within an image or video. A co-occurrence probability may be calculated for two or more edge features in an image or video using an object definition. Edge features may be differentiated between in response to measured contextual support, and prominent edge features may be extracted based on the measured contextual support. The object may then be identified based on the extracted prominent edge features.

  14. Attacks Against Process Control Systems: Risk Assessment, Detection, and Response

    E-Print Network [OSTI]

    Hu, Fei

    In the last years there has been an increasing interest in the secu- rity of process control and SCADA systems-1-4503-0564-8/11/03 ...$10.00. General Terms Security Keywords SCADA, security, IDS, control systems, critical infrastructure are also called Process Control Systems (PCS), Supervi- sory Control and Data Aquisition (SCADA) systems

  15. Systems and methods for detecting a flame in a fuel nozzle of a gas turbine

    DOE Patents [OSTI]

    Kraemer, Gilbert Otto; Storey, James Michael; Lipinski, John; Mestroni, Julio Enrique; Williamson, David Lee; Marshall, Jason Randolph; Krull, Anthony

    2013-05-07

    A system may detect a flame about a fuel nozzle of a gas turbine. The gas turbine may have a compressor and a combustor. The system may include a first pressure sensor, a second pressure sensor, and a transducer. The first pressure sensor may detect a first pressure upstream of the fuel nozzle. The second pressure sensor may detect a second pressure downstream of the fuel nozzle. The transducer may be operable to detect a pressure difference between the first pressure sensor and the second pressure sensor.

  16. Security system helps utility stay competitive

    SciTech Connect (OSTI)

    NONE

    1995-04-01

    Atlantic Electric is saving more than $750,000 annually in security costs by using an innovative closed-circuit television (CCTV) system to guard its remote sites electronically. Today, a single guard in the central security control room at Atlantic Electric`s headquarters electronically surveys and controls some 20 remote sites such as combustion turbine sites, material storage, administrative facilities and operating centers. Protecting these sites are CCTV cameras mounted around each yard, floodlighting, and a motion detection and signal transmission system called Adpro SiteWatch by vsion Systems Inc. The SiteWatch system automatically displays to the central guard any intrusion at a site, and captures and replays the intrusion events similar to an instant replay in a televised sporting event. Over the five year transition, Atlantic Electric saved nearly $2 million in security costs.

  17. Project of the underwater system for chemical threat detection

    E-Print Network [OSTI]

    Silarski, M; Moskal, P; Smolis, M; Tadeja, S

    2015-01-01

    In this article we describe a novel method for the detection of explosives and other hazardous substances in the marine environment using neutron activation. Unlike the other considered methods based on this technique we propose to use guides forneutron and gamma quanta which speeds up and simplifies identification. Moreover, it may provide a determination of the density distribution of a dangerous substance. First preliminary results of Monte Carlo simulations dedicated for design of a device exploiting this method are also presented.

  18. EDDY CURRENT SYSTEM FOR DETECTION OF CRACKING BENEATH BRAIDING IN CORRUGATED METAL HOSE

    SciTech Connect (OSTI)

    Wincheski, Buzz [NASA Langley Research Center, Hampton, VA 23681 (United States); Simpson, John [Lockheed Martin Space Operations, Hampton, VA 23681 (United States); Hall, George [George Washington University, Washington, D.C. 20052 (United States)

    2009-03-03

    In this paper an eddy current system for the detection of partially-through-the-thickness cracks in corrugated metal hose is presented. Design criteria based upon the geometry and conductivity of the part are developed and applied to the fabrication of a prototype inspection system. Experimental data are used to highlight the capabilities of the system and an image processing technique is presented to improve flaw detection capabilities. A case study for detection of cracking damage in a space shuttle radiator retract flex hoses is also presented.

  19. Systems and methods of detecting force and stress using tetrapod nanocrystal

    DOE Patents [OSTI]

    Choi, Charina L.; Koski, Kristie J.; Sivasankar, Sanjeevi; Alivisatos, A. Paul

    2013-08-20

    Systems and methods of detecting force on the nanoscale including methods for detecting force using a tetrapod nanocrystal by exposing the tetrapod nanocrystal to light, which produces a luminescent response by the tetrapod nanocrystal. The method continues with detecting a difference in the luminescent response by the tetrapod nanocrystal relative to a base luminescent response that indicates a force between a first and second medium or stresses or strains experienced within a material. Such systems and methods find use with biological systems to measure forces in biological events or interactions.

  20. Power System Extreme Event Detection: The Vulnerability Frontier

    E-Print Network [OSTI]

    Lesieutre, Bernard C.; Pinar, Ali; Roy, Sandip

    2007-01-01

    Contingencies in Electric Power Networks,” proceedings ofthe North American Power Symposium, Ames, IA, OctoberScreening in Electric Power Systems,” submitted to the IEEE

  1. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    SciTech Connect (OSTI)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-11-14

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106.

  2. Evaluation of Cost Effective Sensor Combinations for a Vehicle Precrash Detection System

    E-Print Network [OSTI]

    Birdsong, Charles

    Evaluation of Cost Effective Sensor Combinations for a Vehicle Precrash Detection System John the occurrence of an accident before it occurs. There are many different sensor technologies currently available for pre-crash detection. However no single sensor technology has demonstrated enough information gathering

  3. DESIGNING A REAL TIME SYSTEM FOR CAR NUMBER DETECTION USING DISCRETE HOPFIELD NETWORK

    E-Print Network [OSTI]

    Mishra, Prabhat

    DESIGNING A REAL TIME SYSTEM FOR CAR NUMBER DETECTION USING DISCRETE HOPFIELD NETWORK A.BANERJEE1@yahoo.co.in Abstract The paper addresses a novel scheme for detection of car numbers from its rear end number plates. The work has extensive applications in automatic identification of cars, responsible for Cox pollution

  4. A DISCRETE CHOICE PEDESTRIAN BEHAVIOR MODEL FOR PEDESTRIAN DETECTION IN VISUAL TRACKING SYSTEMS

    E-Print Network [OSTI]

    Bierlaire, Michel

    A DISCRETE CHOICE PEDESTRIAN BEHAVIOR MODEL FOR PEDESTRIAN DETECTION IN VISUAL TRACKING SYSTEMS-based models. In this paper we propose the use of a discrete choice model (DCM) of pedestrian behavior and its application to the problem of the target detection in the particular case of pedestrian tracking. We analyze

  5. SchoolFEFLOW Exercise Salt Intrusion From Top

    E-Print Network [OSTI]

    Kornhuber, Ralf

    Summer SchoolFEFLOW® Exercise Salt Intrusion From Top Vertical cross section #12;Summer SchoolSalt refinement (via Rubberbox and Border Options) FEFLOW Mesh Generation Height approx. 100 m #12;Summer SchoolSalt time stepping, FE/BE time integration Final time: 36500 days (100 years) #12;Summer SchoolSalt

  6. Substorm triggering by new plasma intrusion: THEMIS allsky imager observations

    E-Print Network [OSTI]

    Mende, Stephen B.

    Click Here for Full Article Substorm triggering by new plasma intrusion: THEMIS allsky imager) and followed by a northsouth (NS) arc moving equatorward toward the onset latitude. Because of the linkage by enhanced earthward plasma flows associated with enhanced reconnection near the preexisting openclosed field

  7. Using Explicit and Machine-Understandable Engineering Knowledge for Defect Detection in Automation Systems Engineering

    E-Print Network [OSTI]

    industrial complexes are very high. Traditional approaches for defect detection in automation systems and data models which are used within the engineering of industrial automation systems. Thus, some defects Nowadays, industrial automation systems have tendencies to become more and more complex and large

  8. LungCAD: A Clinically Approved, Machine Learning System for Lung Cancer Detection

    E-Print Network [OSTI]

    Chandy, John A.

    LungCAD: A Clinically Approved, Machine Learning System for Lung Cancer Detection R Bharat Rao Street, New York, NY 10016 ABSTRACT We present LungCAD, a computer aided diagnosis (CAD) system system be tested in a clini- cal trial. We describe the clinical trial in which LungCAD was tested

  9. FAILURE DETECTION ROUTINE FOR GRID CONNECTED PV SYSTEMS AS PART OF THE PVSAT-2 PROJECT

    E-Print Network [OSTI]

    Heinemann, Detlev

    FAILURE DETECTION ROUTINE FOR GRID CONNECTED PV SYSTEMS AS PART OF THE PVSAT-2 PROJECT S. Stettler1.stettler@enecolo.ch, tel. +41 44 994 9001, fax. +41 44 994 9005 ABSTRACT: Identification of energy losses in PV systems up automatically analysing the performance of PV systems and, in case of a malfunction, determining possible causes

  10. Fraud Detection in ERP Systems using Scenario Asadul K. Islam1

    E-Print Network [OSTI]

    Flegel, Ulrich

    112 Fraud Detection in ERP Systems using Scenario Matching Asadul K. Islam1 , Malcom Corney1.raub, ulrich.flegel}@sap.com Abstract. ERP systems generally implement controls to prevent certain common kinds of fraudulent activity in ERP systems. We include the description of six fraud scenarios and the process

  11. Detection of water or gas entry into horizontal wells by using permanent downhole monitoring systems 

    E-Print Network [OSTI]

    Yoshioka, Keita

    2007-09-17

    With the recent development of temperature measurement systems, continuous wellbore temperature profiles can be obtained with high precision. Small temperature changes can be detected by modern temperature-measuring ...

  12. The detection, prevention and mitigation of cascading outages in the power system 

    E-Print Network [OSTI]

    Song, Hongbiao

    2009-05-15

    This dissertation studies the causes and mechanism of power system cascading outages and develops new methods and new tools to help detect, prevent and mitigate the outages. Three effective solutions: a steady state control scheme, a transient...

  13. Pathogen Detection Lab-On-A-Chip (PADLOC) System for Plant Pathogen Diagnosis 

    E-Print Network [OSTI]

    Cifci, Osman

    2012-10-19

    Polymerase Chain Reaction (PCR) detection paves the way to reliable and rapid diagnosis of diseases and has been used extensively since its introduction. Many miniaturized PCR systems were presented by microfluidics and lab-on-a-chip community...

  14. Asynchronous intrusion recovery for interconnected web services

    E-Print Network [OSTI]

    Chandra, Ramesh

    2013-01-01

    Recovering from attacks in an interconnected system is difficult, because an adversary that gains access to one part of the system may propagate to many others, and tracking down and recovering from such an attack requires ...

  15. TPB-coated Light Guides for Liquid Argon TPC Light Detection Systems

    E-Print Network [OSTI]

    C. M. Ignarra

    2013-07-30

    Light detection systems in Liquid Argon Time Projection Chambers (LArTPCs) require the detection of the 128 nm light produced during argon scintillation. Most detectors use Tetraphenyl Butadiene (TPB) to shift the wavelength of the light into a range visible to Photomultiplier Tubes (PMTs). These proceedings summarize characterizations of light-guides coated with a matrix of TPB in UV transmitting acrylic which are more compact than existing LArTPC light collection systems.

  16. Design and evaluation of the ReKon : an integrated detection and assessment perimeter system.

    SciTech Connect (OSTI)

    Dabling, Jeffrey Glenn; Andersen, Jason Jann; McLaughlin, James O.

    2013-02-01

    Kontek Industries (Kannapolis, NC) and their subsidiary, Stonewater Control Systems (Kannapolis, NC), have entered into a cooperative research and development agreement with Sandia to jointly develop and evaluate an integrated perimeter security system solution, one that couples access delay with detection and assessment. This novel perimeter solution was designed to be configurable for use at facilities ranging from high-security military sites to commercial power plants, to petro/chemical facilities of various kinds. A prototype section of the perimeter has been produced and installed at the Sandia Test and Evaluation Center in Albuquerque, NM. This prototype system integrated fiber optic break sensors, active infrared sensors, fence disturbance sensors, video motion detection, and ground sensors. This report documents the design, testing, and performance evaluation of the developed ReKon system. The ability of the system to properly detect pedestrian or vehicle attempts to bypass, breach, or otherwise defeat the system is characterized, as well as the Nuisance Alarm Rate.

  17. Robot design for leak detection in water-pipe systems

    E-Print Network [OSTI]

    Choi, Changrak

    2012-01-01

    Leaks are major problem that occur in the water pipelines all around the world. Several reports indicate loss of around 20 to 30 percent of water in the distribution of water through water pipe systems. Such loss of water ...

  18. Towards tutoring systems that detect students' motivation: an investigation 

    E-Print Network [OSTI]

    de Vicente, Angel

    The use of Artificial Intelligence techniques in the development of educational software brought the hope of developing systems that would become personalised to each student and thus be of more benefit to him or her. ...

  19. Radiation detection system for portable gamma-ray spectroscopy

    DOE Patents [OSTI]

    Rowland, Mark S. (Alamo, CA); Howard, Douglas E. (Livermore, CA); Wong, James L. (Dublin, CA); Jessup, James L. (Tracy, CA); Bianchini, Greg M. (Livermore, CA); Miller, Wayne O. (Livermore, CA)

    2006-06-20

    A portable gamma ray detection apparatus having a gamma ray detector encapsulated by a compact isolation structure having at least two volumetrically-nested enclosures where at least one is a thermal shield. The enclosures are suspension-mounted to each other to successively encapsulate the detector without structural penetrations through the thermal shields. A low power cooler is also provided capable of cooling the detector to cryogenic temperatures without consuming cryogens, due to the heat load reduction by the isolation structure and the reduction in the power requirements of the cooler. The apparatus also includes a lightweight portable power source for supplying power to the apparatus, including to the cooler and the processing means, and reducing the weight of the apparatus to enable handheld operation or toting on a user's person.

  20. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    SciTech Connect (OSTI)

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  1. Power System Extreme Event Detection: The VulnerabilityFrontier

    SciTech Connect (OSTI)

    Lesieutre, Bernard C.; Pinar, Ali; Roy, Sandip

    2007-10-17

    In this work we apply graph theoretic tools to provide aclose bound on a frontier relating the number of line outages in a gridto the power disrupted by the outages. This frontier describes theboundary of a space relating the possible severity of a disturbance interms of power disruption, from zero to some maximum on the boundary, tothe number line outages involved in the event. We present the usefulnessof this analysis with a complete analysis of a 30 bus system, and presentresults for larger systems.

  2. Stragegies to Detect Hidden Geothermal Systems Based on Monitoring and Analysis of CO2 in the Near-Surface Environment

    E-Print Network [OSTI]

    Lewicki, Jennifer L.; Oldenburg, Curtis M.

    2008-01-01

    in volcanic and geothermal areas. Appl. Geochem. , 13, 543–1977. Chemistry and Geothermal Systems. Academic Press, Newfor detecting hidden geothermal systems by near-surface gas

  3. PERFORMANCE OF A NOVEL FAST TRANSIENTS DETECTION SYSTEM

    SciTech Connect (OSTI)

    Clarke, Nathan

    2013-03-01

    We investigate the signal-to-noise ratio (S/N) of a new incoherent dedispersion algorithm optimized for FPGA-based architectures intended for deployment on the Australian SKA Pathfinder and other Square Kilometre Array precursors for fast transients surveys. Unlike conventional CPU- and GPU-optimized incoherent dedispersion algorithms, this algorithm has the freedom to maximize the S/N by way of programmable dispersion profiles that enable the inclusion of different numbers of time samples per spectral channel. This allows, for example, more samples to be summed at lower frequencies where intra-channel dispersion smearing is larger, or it could even be used to optimize the dedispersion sum for steep spectrum sources. Our analysis takes into account the intrinsic pulse width, scatter broadening, spectral index and dispersion measure of the signal, and the system's frequency range, spectral and temporal resolution, and number of trial dedispersions. We show that the system achieves better than 80% of the optimal S/N where the temporal resolution and the intra-channel smearing time are smaller than a quarter of the average width of the pulse across the system's frequency band (after including scatter smearing). Coarse temporal resolutions suffer a {Delta}t {sup -1/2} decay in S/N, and coarse spectral resolutions cause a {Delta}{nu}{sup -1/2} decay in S/N, where {Delta}t and {Delta}{nu} are the temporal and spectral resolutions of the system, respectively. We show how the system's S/N compares with that of matched filter and boxcar filter detectors. We further present a new algorithm for selecting trial dispersion measures for a survey that maintains a given minimum S/N performance across a range of dispersion measures.

  4. Intrusion Management Using Configurable Architecture Models

    E-Print Network [OSTI]

    Wolf, Alexander L.

    . The key aspect of this trend is that these models accompany the software system and provide the basis of the software system. These models are coming out of the software engineering community and are being used Heimbigner and Alexander L. Wolf ABSTRACT Software is increasingly being constructed using the component

  5. Flammable Gas Detection for the D-Zero Gas System

    SciTech Connect (OSTI)

    Spires, L.D.; Foglesong, J.; /Fermilab

    1991-02-11

    The use of flammable gas and high voltage in detector systems is common in many experiments at Fermilab. To mitigate the hazards associated with these systems, Fermilab Engineering Standard SD-45B (Ref. 1) was adopted. Since this note is meant to be a guide and not a mandatory standard, each experiment is reviewed for compliance with SD-45B by the flammable gas safety subcommittee. Currently, there are only two types of flammable gas in use, ethane (Appendix A) and methane (Appendix B). The worst flammable-gas case is C2H6 (ethane), which has an estimated flow rate that is 73% of the CH4 (methane) flow but a heat of combustion (in kcal/g-mole) that is 173% of that of methane. In the worst case, if ethane were to spew through its restricting orifice into its gas line at 0 psig and then through a catastrophic leak into Room 215 (TRD) or Room 511 (CDC/FDCNTX), the time that would be required to build up a greater than Class 1 inventory (0.4kg H2 equivalent) would be 5.2 hours (Ref. 2). Therefore a worst-case flammable gas leak would have to go undetected for over 5 hours in order to transform a either mixing room to an environment with a Risk Class greater than Class 1. The mixing systems, gas lines, and detectors themselves will be thoroughly leak checked prior to active service. All vessels that are part of the mixing systems will be protected from overpressure by safety valves vented outside the building. Both the input and output of all detector volumes are protected from overpressure in the same way. The volume immediately outside the central tracking detectors is continuously purged by nitrogen from boiloff from the main nitrogen dewar at the site. However, if flammable gas were to build up in the mixing rooms or particular detector areas, no matter how unlikely, flammable gas detectors that are part of the interlock chain of each gas mixing system will shut down the appropriate system. This includes shutting off the output of flammable gas manifolds within the gas shed. Similarly, if a fire were to break out anywhere in the D-ZERO Hall, fire sensors would stop the output of all flammable gas manifolds within the gas shed, by unpowering electrically controlled solenoid valves that are normally closed in the event of a power failure. Fire sensor contacts have not yet been installed.

  6. The Beam Loss Detection System of the LHC Ring

    E-Print Network [OSTI]

    Gschwendtner, E; Ferioli, G; Friesenbichler, W; Kain, V

    2002-01-01

    At the Large Hadron Collider (LHC) a beam loss system will be installed in the arc, dispersion suppressor and the straight regions for a continuous surveillance of particle losses. These beam particles deposit their energy partially in the super-conducting coils leading to temperature increase, possible magnet quenches and damages. The primary and secondary halo of the beam is absorbed by the collimation system. The tertiary halo will be lost at aperture limits in the ring. Its loss distribution along the magnets has been studies. At the positions, where most of the beam losses are expected, simulations of the particle fluences outside the cryostat and induced by lost protons at the aperture have been performed with the Monte Carlo Code Geant 3.2.1. This allows determining the most suitable positions of the detectors, the needed number of monitors and the impact on the dynamic range of the detectors. The design of the beam loss monitor system is presented that meet the required sensitivity, dynamic range and ...

  7. Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge

    SciTech Connect (OSTI)

    Ondrej Linda; Todd Vollmer; Milos Manic

    2012-08-01

    The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

  8. Statistically qualified neuro-analytic failure detection method and system

    DOE Patents [OSTI]

    Vilim, Richard B. (Aurora, IL); Garcia, Humberto E. (Idaho Falls, ID); Chen, Frederick W. (Naperville, IL)

    2002-03-02

    An apparatus and method for monitoring a process involve development and application of a statistically qualified neuro-analytic (SQNA) model to accurately and reliably identify process change. The development of the SQNA model is accomplished in two stages: deterministic model adaption and stochastic model modification of the deterministic model adaptation. Deterministic model adaption involves formulating an analytic model of the process representing known process characteristics, augmenting the analytic model with a neural network that captures unknown process characteristics, and training the resulting neuro-analytic model by adjusting the neural network weights according to a unique scaled equation error minimization technique. Stochastic model modification involves qualifying any remaining uncertainty in the trained neuro-analytic model by formulating a likelihood function, given an error propagation equation, for computing the probability that the neuro-analytic model generates measured process output. Preferably, the developed SQNA model is validated using known sequential probability ratio tests and applied to the process as an on-line monitoring system. Illustrative of the method and apparatus, the method is applied to a peristaltic pump system.

  9. Using Satellite Fire Detection to Calibrate Components of the Fire Weather Index System in

    E-Print Network [OSTI]

    Field, Robert

    Using Satellite Fire Detection to Calibrate Components of the Fire Weather Index System in Malaysia, Indonesia ABSTRACT / Vegetation fires have become an increasing problem in tropical environments as a consequence of socioeconomic pressures and subsequent land-use change. In response, fire management systems

  10. The All Terrain Bio nano Gear for Space Radiation Detection System

    E-Print Network [OSTI]

    Mavroidis, Constantinos

    The All Terrain Bio nano Gear for Space Radiation Detection System Ajay Ummat, Constantinos in real-time while an astronaut is in the mission. All Terrain Bio-nano (ATB) gear system is one the current or any other future space suits. The proposed All Terrain Bio nano (ATB) gear is one such concept

  11. Malicious Code Execution Detection and Response Immune System inpired by the Danger Theory

    E-Print Network [OSTI]

    Aickelin, Uwe

    Malicious Code Execution Detection and Response Immune System inpired by the Danger Theory Jungwon an artificial immune system. A recently developed hypothesis in immunology, the Danger The- ory, states that our invaders, plus signals generated by the host indic- ating danger and damage. We propose the incorporation

  12. Topographically-Based Real-Time Traffic Anomaly Detection in a Metropolitan Highway System

    E-Print Network [OSTI]

    Grossman, Robert

    Topographically-Based Real-Time Traffic Anomaly Detection in a Metropolitan Highway System Rajmonda metropolitan area. Our Chicago Alert System (CAS) considers both the spatial and temporal aspects of the data of attack, the need for real-time traffic management is crucial. Real-time traffic management encompasses

  13. IMPLEMENTION AND TESTING OF A FAULT DETECTION SOFTWARE TOOL FOR IMPROVING CONTROL SYSTEM

    E-Print Network [OSTI]

    Diamond, Richard

    INTRODUCTION Heating, ventilating, and air-conditioning (HVAC) systems are typically controlled usingIMPLEMENTION AND TESTING OF A FAULT DETECTION SOFTWARE TOOL FOR IMPROVING CONTROL SYSTEM-based, feedforward control scheme that can improve control performance over traditional PID feedback control and also

  14. Low-cost multispectral vegetation imaging system for detecting leaking CO2 gas

    E-Print Network [OSTI]

    Shaw, Joseph A.

    Low-cost multispectral vegetation imaging system for detecting leaking CO2 gas Justin A. Hogan,1 sequestration sites for possible leaks of the CO2 gas from underground reservoirs, a low-cost multispectral are then flagged for closer inspection with in-situ CO2 sensors. The system is entirely self

  15. Ultrasonic imaging system for in-process fabric defect detection

    DOE Patents [OSTI]

    Sheen, Shuh-Haw (Naperville, IL); Chien, Hual-Te (Naperville, IL); Lawrence, William P. (Downers Grove, IL); Raptis, Apostolos C. (Downers Grove, IL)

    1997-01-01

    An ultrasonic method and system are provided for monitoring a fabric to identify a defect. A plurality of ultrasonic transmitters generate ultrasonic waves relative to the fabric. An ultrasonic receiver means responsive to the generated ultrasonic waves from the transmitters receives ultrasonic waves coupled through the fabric and generates a signal. An integrated peak value of the generated signal is applied to a digital signal processor and is digitized. The digitized signal is processed to identify a defect in the fabric. The digitized signal processing includes a median value filtering step to filter out high frequency noise. Then a mean value and standard deviation of the median value filtered signal is calculated. The calculated mean value and standard deviation are compared with predetermined threshold values to identify a defect in the fabric.

  16. Analysis and Management of Intrusion Data Collection

    E-Print Network [OSTI]

    Erbacher, Robert F.

    of monitoring for a given environment or system. The goal is to identify information that must be collected and the monitoring environment will in essence creates its own misuse of the available network accessible resources;environment it would be counter productive to reduce available network resources for monitoring purposes

  17. Efficient model-based leak detection in boiler steam-water systems Xi Sun, Tongwen Chen *, Horacio J. Marquez

    E-Print Network [OSTI]

    Marquez, Horacio J.

    Efficient model-based leak detection in boiler steam-water systems Xi Sun, Tongwen Chen *, Horacio detection in boiler steam-water systems. The algorithm has been tested using real industrial data from Syncrude Canada, and has proven to be effective in detection of boiler tube or steam leaks; proper

  18. Method and apparatus for detecting timing errors in a system oscillator

    DOE Patents [OSTI]

    Gliebe, Ronald J. (Library, PA); Kramer, William R. (Bethel Park, PA)

    1993-01-01

    A method of detecting timing errors in a system oscillator for an electronic device, such as a power supply, includes the step of comparing a system oscillator signal with a delayed generated signal and generating a signal representative of the timing error when the system oscillator signal is not identical to the delayed signal. An LED indicates to an operator that a timing error has occurred. A hardware circuit implements the above-identified method.

  19. Method and apparatus for operating a powertrain system upon detecting a stuck-closed clutch

    DOE Patents [OSTI]

    Hansen, R. Anthony

    2014-02-18

    A powertrain system includes a multi-mode transmission having a plurality of torque machines. A method for controlling the powertrain system includes identifying all presently applied clutches including commanded applied clutches and the stuck-closed clutch upon detecting one of the torque-transfer clutches is in a stuck-closed condition. A closed-loop control system is employed to control operation of the multi-mode transmission accounting for all the presently applied clutches.

  20. Innovative Gamma Ray Spectrometer Detection Systems for Conducting Scanning Surveys on Challenging Terrain - 13583

    SciTech Connect (OSTI)

    Palladino, Carl; Mason, Bryan; Engle, Matt; LeVangie, James [The Palladino Company, Inc., 720 Fillmore St., San Francisco, CA 94117 (United States)] [The Palladino Company, Inc., 720 Fillmore St., San Francisco, CA 94117 (United States); Dempsey, Gregg [United States Environmental Protection Agency, P.O. Box 98517, Las Vegas, NV 89193-8517 (United States)] [United States Environmental Protection Agency, P.O. Box 98517, Las Vegas, NV 89193-8517 (United States); Klemovich, Ron [HydroGeoLogic, Inc., 6340 Glenwood, Suite 200, Building No. 7, Overland Park, KS 66202 (United States)] [HydroGeoLogic, Inc., 6340 Glenwood, Suite 200, Building No. 7, Overland Park, KS 66202 (United States)

    2013-07-01

    The Santa Susana Field Laboratory located near Simi Valley, California was investigated to determine the nature and extent of gamma radiation anomalies. The primary objective was to conduct gamma scanning surveys over 100 percent of the approximately 1,906,000 square meters (471 acre) project site with the most sensitive detection system possible. The site had challenging topography that was not conducive to traditional gamma scanning detection systems. Terrain slope varied from horizontal to 48 degrees and the ground surface ranged from flat, grassy meadows to steep, rocky hillsides. In addition, the site was home to many protected endangered plant and animal species, and archaeologically significant sites that required minimal to no disturbance of the ground surface. Therefore, four innovative and unique gamma ray spectrometer detection systems were designed and constructed to successfully conduct gamma scanning surveys of approximately 1,076,000 square meters (266 acres) of the site. (authors)

  1. Detection and location of mechanical system degradation by using detector signal noise data

    SciTech Connect (OSTI)

    Damiano, B.; Blakeman, E.D.; Phillips, L.D.

    1994-06-01

    This report describes the investigation of a diagnostic method for detecting and locating the source of structural degradation in mechanical systems. The goal of this investigation was to determine whether the diagnostic method would be practically and successfully applied to detect and locate structural changes in a mechanical system. The diagnostic method uses a mathematical model of the mechanical system to define relationships between system parameters, such as spring rates and damping rates, and measurable spectral features, such as natural frequencies and mode shapes. These model-defined relationships are incorporated into a neural network, which is used to relate measured spectral features to system parameters. The diagnosis of the system`s condition is performed by presenting the neural network with measured spectral features and comparing the system parameters estimated by the neural network to previously estimated values. Changes in the estimated system parameters indicate the location and severity of degradation in the mechanical system. The investigation involved applying the method by using computer-simulated data and data collected from a bench-top mechanical system. The effects of neural network training set size and composition on the accuracy of the model parameter estimates were investigated by using computer-simulated data. The measured data were used to demonstrate that the method can be applied to estimate the parameters of a {open_quotes}real{close_quotes} mechanical system. The results show that this diagnostic method can be applied to successfully locate and estimate the magnitude of structural changes in a mechanical system. The average error in the estimated spring rate values of the bench-top mechanical system was approximately 5 to 10%. This degree of accuracy is sufficient to permit the use of this method for detecting and locating structural degradation in mechanical systems.

  2. An analysis of weep holes as a product detection device for underground compensated LPG storage systems

    SciTech Connect (OSTI)

    Sarica, C.; Demir, H.M.; Brill, J.P.

    1996-09-01

    Weep holes have been used widely to detect the presence of Liquefied Petroleum Gases (LPG) in brine for underground compensated storage systems. When the brine level drops below the weep hole, LPG product enters the brine production system causing an increase in both tubing head pressure and flow rate. To prevent cavern overfill, a cavern shutdown is initiated upon detection of LPG in the surface brine system by pressure or flow instruments at the tubing head. In this study, we have investigated the multiphase flow characteristics of weep hole LPG detection systems to correctly estimate the operating limits. A simple and easy to use model has been developed to predict the tubing head pressure and flow rate increases. The model can be used to implement safer and more efficient operation procedures for underground compensated LPG storage systems. The model predictions for a typical field case are presented. An analysis of weep holes as product detection devices for LPG storage reservoirs has been carried out. It was found that the increases in pressure and flow rates at the tubing head change as a function of injection flow rate of the product. Therefore, a thorough consideration of cavern operating parameters is necessary to evaluate the use constant pressure and flow rate values to initiate emergency shut down of the cavern.

  3. Method and apparatus for providing pulse pile-up correction in charge quantizing radiation detection systems

    DOE Patents [OSTI]

    Britton, Jr., Charles L. (Alcoa, TN); Wintenberg, Alan L. (Knoxville, TN)

    1993-01-01

    A radiation detection method and system for continuously correcting the quantization of detected charge during pulse pile-up conditions. Charge pulses from a radiation detector responsive to the energy of detected radiation events are converted to voltage pulses of predetermined shape whose peak amplitudes are proportional to the quantity of charge of each corresponding detected event by means of a charge-sensitive preamplifier. These peak amplitudes are sampled and stored sequentially in accordance with their respective times of occurrence. Based on the stored peak amplitudes and times of occurrence, a correction factor is generated which represents the fraction of a previous pulses influence on a preceding pulse peak amplitude. This correction factor is subtracted from the following pulse amplitude in a summing amplifier whose output then represents the corrected charge quantity measurement.

  4. Methods for non-intrusive sensing and system monitoring

    E-Print Network [OSTI]

    Schantz, Christopher James

    2014-01-01

    Improving the efficiency of collection, transmission, and consumption of resources is the focus of a wide swath of engineering research. Current technological solutions for capturing or mitigating energy and resource waste ...

  5. A Data Driven Framework for Real Time Power System Event Detection and Visualization

    E-Print Network [OSTI]

    McCamish, Ben; Landford, Jordan; Bass, Robert; Cotilla-Sanchez, Eduardo; Chiu, David

    2015-01-01

    Increased adoption and deployment of phasor measurement units (PMU) has provided valuable fine-grained data over the grid. Analysis over these data can provide real-time insight into the health of the grid, thereby improving control over operations. Realizing this data-driven control, however, requires validating, processing and storing massive amounts of PMU data. This paper describes a PMU data management system that supports input from multiple PMU data streams, features an event-detection algorithm, and provides an efficient method for retrieving archival data. The event-detection algorithm rapidly correlates multiple PMU data streams, providing details on events occurring within the power system in real-time. The event-detection algorithm feeds into a visualization component, allowing operators to recognize events as they occur. The indexing and data retrieval mechanism facilitates fast access to archived PMU data. Using this method, we achieved over 30x speedup for queries with high selectivity. With th...

  6. Radiation sensitive devices and systems for detection of radioactive materials and related methods

    DOE Patents [OSTI]

    Kotter, Dale K

    2014-12-02

    Radiation sensitive devices include a substrate comprising a radiation sensitive material and a plurality of resonance elements coupled to the substrate. Each resonance element is configured to resonate responsive to non-ionizing incident radiation. Systems for detecting radiation from a special nuclear material include a radiation sensitive device and a sensor located remotely from the radiation sensitive device and configured to measure an output signal from the radiation sensitive device. In such systems, the radiation sensitive device includes a radiation sensitive material and a plurality of resonance elements positioned on the radiation sensitive material. Methods for detecting a presence of a special nuclear material include positioning a radiation sensitive device in a location where special nuclear materials are to be detected and remotely interrogating the radiation sensitive device with a sensor.

  7. Arc Detection and Interlock Module for the PEP II Low Level RF System

    SciTech Connect (OSTI)

    Tighe, R.; /SLAC

    2011-08-31

    A new arc detection and interlock generating module for the SLAC PEP-II low-level RF VXI-based system has been developed. The system is required to turn off the RF drive and high voltage power supply in the event of arcing in the cavity windows, klystron window, or circulator. Infrared photodiodes receive arc signals through radiation resistant optical fibers. Gain and bandwidth are selectable for each channel to allow tailoring response. The module also responds to interlock requests from other modules in the VXI system and communicates with the programmable logic controller (PLC) responsible for much of the low-level RF system's interlock functionality.

  8. A Data-Centric Approach to Insider Attack Detection in Database Systems

    E-Print Network [OSTI]

    Petropoulos, Michalis

    A Data-Centric Approach to Insider Attack Detection in Database Systems Sunu Mathew1, , Michalis the query expressions in prior approaches. Our data-centric approach is based on the key observation.): RAID 2010, LNCS 6307, pp. 382­401, 2010. c Springer-Verlag Berlin Heidelberg 2010 #12;A Data-Centric

  9. AN AUTOMATED DRUSEN DETECTION SYSTEM FOR CLASSIFYING AGE-RELATED MACULAR DEGENERATION WITH COLOR FUNDUS PHOTOGRAPHS

    E-Print Network [OSTI]

    assess the risk for the development of Age-related Mac- ular Degeneration (AMD). Our system incorporates is a hall- mark of AMD, and magnification/multiplication of drusen in- dicates increased risk of eventual are labor-intensive, difficult to reproduce, and may lose important information. Automated drusen detection

  10. An Image-Based System for Change Detection on Tunnel Linings Simon Stent

    E-Print Network [OSTI]

    Stenger, Björn

    a growing risk of structural failure. A critical requirement for performance failure pre- vention the risk of unexpected failure. Detecting such changes is often the work of human inspectors, but given: Overview of the system. (a) Low-cost cam- era array for data capture; (b) Pipeline summary. of more

  11. A CONTROLLER FOR HVAC SYSTEMS WITH FAULT DETECTION CAPABILITIES BASED ON SIMULATION MODELS

    E-Print Network [OSTI]

    operating conditions change. Poor control performance can lead to occupant discomfort in a building, greater it is controlling. Faults that lead to performance deterioration or a change in system behavior are often masked. In addition, the model acts as a reference of correct behavior, which facilitates the detection of faults

  12. Low-Cost Embedded Fault Detection for Safety-Critical Systems

    E-Print Network [OSTI]

    Rajkumar, Ragunathan "Raj"

    driven by redundant actuators connected to redundant hydraulic systems. Moreover, the control law expensive in terms of both the design and development, as well as the unit production costs. To bring high measurements of the same signal. We are investigating an alternative three-pronged approach to fault detection

  13. Juxtapp: A Scalable System for Detecting Code Reuse Among Android Applications

    E-Print Network [OSTI]

    Song, Dawn

    Juxtapp: A Scalable System for Detecting Code Reuse Among Android Applications Steve Hanna1 , Ling. Mobile application markets such as the Android Marketplace and the Amazon Android store provide similarity analysis among Android applications. Juxtapp provides a key solution to a num- ber of problems

  14. An Analysis of a Spreader Bar Crane Mounted Gamma-Ray Radiation Detection System 

    E-Print Network [OSTI]

    Grypp, Matthew D

    2013-04-08

    container and data were recorded for several count times. The Monte Carlo N-Particle (MCNP) code was used to simulate a radioactive source inside an empty cargo container and the results were compared to experimentally recorded data. The detection system...

  15. Neutron interrogation system using high gamma ray signature to detect contraband special nuclear materials in cargo

    DOE Patents [OSTI]

    Slaughter, Dennis R. (Oakland, CA); Pohl, Bertram A. (Berkeley, CA); Dougan, Arden D. (San Ramon, CA); Bernstein, Adam (Palo Alto, CA); Prussin, Stanley G. (Kensington, CA); Norman, Eric B. (Oakland, CA)

    2008-04-15

    A system for inspecting cargo for the presence of special nuclear material. The cargo is irradiated with neutrons. The neutrons produce fission products in the special nuclear material which generate gamma rays. The gamma rays are detecting indicating the presence of the special nuclear material.

  16. In: Fault Detection: Classification, Techniques and Role in Industrial Systems Editor: xxxxx, pp. 1-72

    E-Print Network [OSTI]

    Ray, Asok

    turbine engines, have many heterogeneous subsystems (e.g., thermal, mechanical, hydraulic and electrical of the generic data-driven tool in heterogeneous areas, such as fault detection in aircraft gas turbine engines INDUSTRIAL SYSTEMS Soumik Sarkar , Soumalya Sarkar and Asok Ray§ Mechanical Engineering Department

  17. Methods, systems and devices for detecting threatening objects and for classifying magnetic data

    DOE Patents [OSTI]

    Kotter, Dale K. (Shelley, ID); Roybal, Lyle G. (Idaho Falls, ID); Rohrbaugh, David T. (Idaho Falls, ID); Spencer, David F. (Idaho Falls, ID)

    2012-01-24

    A method for detecting threatening objects in a security screening system. The method includes a step of classifying unique features of magnetic data as representing a threatening object. Another step includes acquiring magnetic data. Another step includes determining if the acquired magnetic data comprises a unique feature.

  18. Design and evaluation of a novel breast cancer detection system combining both thermoacoustic ,,TA... and photoacoustic ,,PA... tomography

    E-Print Network [OSTI]

    Wang, Lihong

    Design and evaluation of a novel breast cancer detection system combining both thermoacoustic ,,TA thermoacoustic and photoacoustic techniques to achieve dual contrast microwave and light absorption imaging

  19. Intrusion Margins and Associated Fractures | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder at 8, 13Renewable PowerMismatch | OpenTechnology andIntrusion

  20. Radiation detection method and system using the sequential probability ratio test

    DOE Patents [OSTI]

    Nelson, Karl E. (Livermore, CA); Valentine, John D. (Redwood City, CA); Beauchamp, Brock R. (San Ramon, CA)

    2007-07-17

    A method and system using the Sequential Probability Ratio Test to enhance the detection of an elevated level of radiation, by determining whether a set of observations are consistent with a specified model within a given bounds of statistical significance. In particular, the SPRT is used in the present invention to maximize the range of detection, by providing processing mechanisms for estimating the dynamic background radiation, adjusting the models to reflect the amount of background knowledge at the current point in time, analyzing the current sample using the models to determine statistical significance, and determining when the sample has returned to the expected background conditions.

  1. Addressing the Challenges of Anomaly Detection for Cyber Physical Energy Grid Systems

    SciTech Connect (OSTI)

    Ferragut, Erik M; Laska, Jason A; Melin, Alexander M; Czejdo, Bogdan

    2013-01-01

    The consolidation of cyber communications networks and physical control systems within the energy smart grid introduces a number of new risks. Unfortunately, these risks are largely unknown and poorly understood, yet include very high impact losses from attack and component failures. One important aspect of risk management is the detection of anomalies and changes. However, anomaly detection within cyber security remains a difficult, open problem, with special challenges in dealing with false alert rates and heterogeneous data. Furthermore, the integration of cyber and physical dynamics is often intractable. And, because of their broad scope, energy grid cyber-physical systems must be analyzed at multiple scales, from individual components, up to network level dynamics. We describe an improved approach to anomaly detection that combines three important aspects. First, system dynamics are modeled using a reduced order model for greater computational tractability. Second, a probabilistic and principled approach to anomaly detection is adopted that allows for regulation of false alerts and comparison of anomalies across heterogeneous data sources. Third, a hierarchy of aggregations are constructed to support interactive and automated analyses of anomalies at multiple scales.

  2. An Intelligent System For Effective Forest Fire Detection Using Spatial Data

    E-Print Network [OSTI]

    Angayarkkani, K

    2010-01-01

    The explosive growth of spatial data and extensive utilization of spatial databases emphasize the necessity for the automated discovery of spatial knowledge. In modern times, spatial data mining has emerged as an area of voluminous research. Forest fires are a chief environmental concern, causing economical and ecological damage while endangering human lives across the world. The fast or early detection of forest fires is a vital element for controlling such phenomenon. The application of remote sensing is at present a significant method for forest fires monitoring, particularly in vast and remote areas. Different methods have been presented by researchers for forest fire detection. The motivation behind this research is to obtain beneficial information from images in the forest spatial data and use the same in the determination of regions at the risk of fires by utilizing Image Processing and Artificial Intelligence techniques. This paper presents an intelligent system to detect the presence of forest fires ...

  3. Portable microfluidic raman system for rapid, label-free early disease signature detection

    SciTech Connect (OSTI)

    Wu, Meiye; Davis, Ryan Wesley; Hatch, Anson

    2015-09-01

    In the early stages of infection, patients develop non-specific or no symptoms at all. While waiting for identification of the infectious agent, precious window of opportunity for early intervention is lost. The standard diagnostics require affinity reagents and sufficient pathogen titers to reach the limit of detection. In the event of a disease outbreak, triaging the at-risk population rapidly and reliably for quarantine and countermeasure is more important than the identification of the pathogen by name. To expand Sandia's portfolio of Biological threat management capabilities, we will utilize Raman spectrometry to analyze immune subsets in whole blood to rapidly distinguish infected from non-infected, and bacterial from viral infection, for the purpose of triage during an emergency outbreak. The goal of this one year LDRD is to determine whether Raman spectroscopy can provide label-free detection of early disease signatures, and define a miniaturized Raman detection system meeting requirements for low- resource settings.

  4. Method Apparatus And System For Detecting Seismic Waves In A Borehole

    DOE Patents [OSTI]

    West, Phillip B. (Idaho Falls, ID); Sumstine, Roger L. (St. George, UT)

    2006-03-14

    A method, apparatus and system for detecting seismic waves. A sensing apparatus is deployed within a bore hole and may include a source magnet for inducing a magnetic field within a casing of the borehole. An electrical coil is disposed within the magnetic field to sense a change in the magnetic field due to a displacement of the casing. The electrical coil is configured to remain substantially stationary relative to the well bore and its casing along a specified axis such that displacement of the casing induces a change within the magnetic field which may then be sensed by the electrical coil. Additional electrical coils may be similarly utilized to detect changes in the same or other associated magnetic fields along other specified axes. The additional sensor coils may be oriented substantially orthogonally relative to one another so as to detect seismic waves along multiple orthogonal axes in three dimensional space.

  5. 3D cloud detection and tracking system for solar forecast using multiple sky imagers

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Peng, Zhenzhou; Yu, Dantong; Huang, Dong; Heiser, John; Yoo, Shinjae; Kalb, Paul

    2015-06-23

    We propose a system for forecasting short-term solar irradiance based on multiple total sky imagers (TSIs). The system utilizes a novel method of identifying and tracking clouds in three-dimensional space and an innovative pipeline for forecasting surface solar irradiance based on the image features of clouds. First, we develop a supervised classifier to detect clouds at the pixel level and output cloud mask. In the next step, we design intelligent algorithms to estimate the block-wise base height and motion of each cloud layer based on images from multiple TSIs. Thus, this information is then applied to stitch images together intomore »larger views, which are then used for solar forecasting. We examine the system’s ability to track clouds under various cloud conditions and investigate different irradiance forecast models at various sites. We confirm that this system can 1) robustly detect clouds and track layers, and 2) extract the significant global and local features for obtaining stable irradiance forecasts with short forecast horizons from the obtained images. Finally, we vet our forecasting system at the 32-megawatt Long Island Solar Farm (LISF). Compared with the persistent model, our system achieves at least a 26% improvement for all irradiance forecasts between one and fifteen minutes.« less

  6. Qualification of the ITER CS Quench Detection System using Numerical Modeling

    SciTech Connect (OSTI)

    Martovetsky, Nicolai N [ORNL; Radovinsky, Alexey L [ORNL

    2013-01-01

    Abstract The ITER Central Solenoid (CS) magnet needs to be protected against overheating of the conductor in the event of the occurrence of a normal zone (NZ). Due to a large amount of stored energy and slow NZ propagation, the NZ needs to be detected and the switchyard needs to open the breakers within 2 s after detection of the NZ. The CS will be discharged on a dump resistor with a time constant of 7.5 s. During operation of the CS and its interaction with the poloidal field (PF) coils and plasma current, the CS experiences large inductive voltages from multiple sources, including nonlinear signals from eddy currents in the vacuum vessel and plasma current variation, that make the task of detecting the resistive signal even more difficult. This inductive voltage needs to be cancelled by quench detection (QD) hardware (e.g., bridges, converters, filters, processors) and appropriate processing of the QD signals to reliably detect NZ initiation and propagation. Two redundant schemes are proposed as the baseline for the CS QD System: 1) A scheme with Regular Voltage Taps (RVT) from triads of Double Pancakes (DP) supplemented by Central Difference Averaging (CDA) and by digital suppression of the inductive voltage from all active coils (the CS and PF coils). Voltage taps are taken from helium outlets at the CS outer diameter. 2)A scheme with Cowound Voltage Taps (CVT) taken from cowound wires routed from the helium inlet at the CS inner diameter. Summary of results of the numerical modeling of the performance of both baseline CS QD systems is presented in this paper. Index Terms Quench detection, Central Solenoid, ITER

  7. A novel computer-aided lung nodule detection system for CT images

    SciTech Connect (OSTI)

    Tan, Maxine; Deklerck, Rudi; Jansen, Bart; Bister, Michel; Cornelis, Jan [Department of Electronics and Informatics (ETRO), Vrije Universiteit Brussel, Pleinlaan 2, B-1050 Brussel (Belgium); Department of Electronics and Informatics (ETRO), Vrije Universiteit Brussel, Pleinlaan 2, B-1050 Brussel, Belgium and Interdisciplinary Institute for Broadband Technology (IBBT), Gaston Crommenlaan 8, 9050 Gent (Belgium); Department of Electronics and Informatics (ETRO), Vrije Universiteit Brussel, Pleinlaan 2, B-1050 Brussel (Belgium)

    2011-10-15

    Purpose: The paper presents a complete computer-aided detection (CAD) system for the detection of lung nodules in computed tomography images. A new mixed feature selection and classification methodology is applied for the first time on a difficult medical image analysis problem. Methods: The CAD system was trained and tested on images from the publicly available Lung Image Database Consortium (LIDC) on the National Cancer Institute website. The detection stage of the system consists of a nodule segmentation method based on nodule and vessel enhancement filters and a computed divergence feature to locate the centers of the nodule clusters. In the subsequent classification stage, invariant features, defined on a gauge coordinates system, are used to differentiate between real nodules and some forms of blood vessels that are easily generating false positive detections. The performance of the novel feature-selective classifier based on genetic algorithms and artificial neural networks (ANNs) is compared with that of two other established classifiers, namely, support vector machines (SVMs) and fixed-topology neural networks. A set of 235 randomly selected cases from the LIDC database was used to train the CAD system. The system has been tested on 125 independent cases from the LIDC database. Results: The overall performance of the fixed-topology ANN classifier slightly exceeds that of the other classifiers, provided the number of internal ANN nodes is chosen well. Making educated guesses about the number of internal ANN nodes is not needed in the new feature-selective classifier, and therefore this classifier remains interesting due to its flexibility and adaptability to the complexity of the classification problem to be solved. Our fixed-topology ANN classifier with 11 hidden nodes reaches a detection sensitivity of 87.5% with an average of four false positives per scan, for nodules with diameter greater than or equal to 3 mm. Analysis of the false positive items reveals that a considerable proportion (18%) of them are smaller nodules, less than 3 mm in diameter. Conclusions: A complete CAD system incorporating novel features is presented, and its performance with three separate classifiers is compared and analyzed. The overall performance of our CAD system equipped with any of the three classifiers is well with respect to other methods described in literature.

  8. A Rapid Micro Polymerase Chain Reaction System (GenSpector Micro PCR) for Hepatitis B Virus DNA Detection

    E-Print Network [OSTI]

    Oh, Kwang W.

    A Rapid Micro Polymerase Chain Reaction System (GenSpector® Micro PCR) for Hepatitis B Virus DNA reaction) system (GenSpector® Micro PCR) for the application of Hepatitis B virus (HBV) DNA detection of Hepatitis B virus (HBV) DNA detection [1]. Silicon micromachining technology has been utilized

  9. Low background high efficiency radiocesium detection system based on positron emission tomography technology

    SciTech Connect (OSTI)

    Yamamoto, Seiichi; Ogata, Yoshimune [Department of Radiological and Medical Laboratory Sciences, Nagoya University Graduate School of Medicine, 1-1-20 Daiko-Minami, Higashi-ku, Nagoya 461-8673 (Japan)] [Department of Radiological and Medical Laboratory Sciences, Nagoya University Graduate School of Medicine, 1-1-20 Daiko-Minami, Higashi-ku, Nagoya 461-8673 (Japan)

    2013-09-15

    After the 2011 nuclear power plant accident at Fukushima, radiocesium contamination in food became a serious concern in Japan. However, low background and high efficiency radiocesium detectors are expensive and huge, including semiconductor germanium detectors. To solve this problem, we developed a radiocesium detector by employing positron emission tomography (PET) technology. Because {sup 134}Cs emits two gamma photons (795 and 605 keV) within 5 ps, they can selectively be measured with coincidence. Such major environmental gamma photons as {sup 40}K (1.46 MeV) are single photon emitters and a coincidence measurement reduces the detection limit of radiocesium detectors. We arranged eight sets of Bi{sub 4}Ge{sub 3}O{sub 12} (BGO) scintillation detectors in double rings (four for each ring) and measured the coincidence between these detectors using PET data acquisition system. A 50 × 50 × 30 mm BGO was optically coupled to a 2 in. square photomultiplier tube (PMT). By measuring the coincidence, we eliminated most single gamma photons from the energy distribution and only detected those from {sup 134}Cs at an average efficiency of 12%. The minimum detectable concentration of the system for the 100 s acquisition time is less than half of the food monitor requirements in Japan (25 Bq/kg). These results show that the developed radiocesium detector based on PET technology is promising to detect low level radiocesium.

  10. Non-Intrusive Cognitive Radio Networks based on Smart Antenna Technology

    E-Print Network [OSTI]

    Liu, Xin

    spectral efficiency. We investigate a flexible non-intrusive cognitive radio network based on smart antenna to the primary receiver (PR) is either minimized or constrained. Combined with transmission power controlNon-Intrusive Cognitive Radio Networks based on Smart Antenna Technology Senhua Huang, Zhi Ding

  11. A Distributed Fault/Intrusion-Tolerant Sensor Data Storage Scheme Based on Network Coding and

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    1 A Distributed Fault/Intrusion-Tolerant Sensor Data Storage Scheme Based on Network Coding/intrusion-tolerant data storage scheme based on network coding and homomorphic fingerprinting in volatile WSNs (Sherman) Shen, Fellow, IEEE Abstract--Recently, distributed data storage has gained in- creasing

  12. Hot spot detection system for vanes or blades of a combustion turbine

    DOE Patents [OSTI]

    Twerdochlib, M.

    1999-02-02

    This invention includes a detection system that can determine if a turbine component, such as a turbine vane or blade, has exceeded a critical temperature, such as a melting point, along any point along the entire surface of the vane or blade. This system can be employed in a conventional combustion turbine having a compressor, a combustor and a turbine section. Included within this system is a chemical coating disposed along the entire interior surface of a vane or blade and a closed loop cooling system that circulates a coolant through the interior of the vane or blade. If the temperature of the vane or blade exceeds a critical temperature, the chemical coating will be expelled from the vane or blade into the coolant. Since while traversing the closed loop cooling system the coolant passes through a detector, the presence of the chemical coating in the coolant will be sensed by the system. If the chemical coating is detected, this indicates that the vane or blade has exceeded a critical temperature. 5 figs.

  13. A Tutorial on Detection and Characterization of Special Behavior in Large Electric Power Systems

    SciTech Connect (OSTI)

    Hauer, John F.; DeSteese, John G.

    2004-08-20

    The objective of this document is to report results in the detection and characterization of special behavior in large electric power systems. Such behavior is usually dynamic in nature, but not always. This is also true for the underlying sources of special behavior. At the device level, a source of special behavior might be an automatic control system, a dynamic load, or even a manual control system that is operated according to some sharply defined policy. Other possible sources include passive system conditions, such as the state of a switched device or the amount of power carried on some critical line. Detection and characterization are based upon “signature information” that is extracted from the behavior observed. Characterization elements include the signature information itself, the nature of the behavior and its likely causes, and the associated implications for the system or for the public at large. With sufficient data and processing, this characterization may directly identify a particular condition or device at a specific location. Such conclusive results cannot always be done from just one observation, however. Information environments that are very sparse may require multiple observations, comparative model studies, and even direct testing of the system.

  14. System and method for motor fault detection using stator current noise cancellation

    DOE Patents [OSTI]

    Zhou, Wei (Los Angeles, CA); Lu, Bin (Kenosha, WI); Nowak, Michael P. (Menomonee Falls, WI); Dimino, Steven A. (Wauwatosa, WI)

    2010-12-07

    A system and method for detecting incipient mechanical motor faults by way of current noise cancellation is disclosed. The system includes a controller configured to detect indicia of incipient mechanical motor faults. The controller further includes a processor programmed to receive a baseline set of current data from an operating motor and define a noise component in the baseline set of current data. The processor is also programmed to acquire at least on additional set of real-time operating current data from the motor during operation, redefine the noise component present in each additional set of real-time operating current data, and remove the noise component from the operating current data in real-time to isolate any fault components present in the operating current data. The processor is then programmed to generate a fault index for the operating current data based on any isolated fault components.

  15. System and method for bearing fault detection using stator current noise cancellation

    DOE Patents [OSTI]

    Zhou, Wei (Los Angeles, CA); Lu, Bin (Kenosha, WI); Habetler, Thomas G. (Snellville, GA); Harley, Ronald G. (Lawrenceville, GA); Theisen, Peter J. (West Bend, WI)

    2010-08-17

    A system and method for detecting incipient mechanical motor faults by way of current noise cancellation is disclosed. The system includes a controller configured to detect indicia of incipient mechanical motor faults. The controller further includes a processor programmed to receive a baseline set of current data from an operating motor and define a noise component in the baseline set of current data. The processor is also programmed to repeatedly receive real-time operating current data from the operating motor and remove the noise component from the operating current data in real-time to isolate any fault components present in the operating current data. The processor is then programmed to generate a fault index for the operating current data based on any isolated fault components.

  16. Hand-held, mechanically cooled, radiation detection system for gamma-ray spectroscopy

    DOE Patents [OSTI]

    Burks, Morgan Thomas; Eckels, Joel Del

    2010-06-08

    In one embodiment, a radiation detection system is provided including a radiation detector and a first enclosure encapsulating the radiation detector, the first enclosure including a low-emissivity infra-red (IR) reflective coating used to thermally isolate the radiation detector. Additionally, a second enclosure encapsulating the first enclosure is included, the first enclosure being suspension mounted to the second enclosure. Further, a cooler capable of cooling the radiation detector is included. Still yet, a first cooling interface positioned on the second enclosure is included for coupling the cooler and the first enclosure. Furthermore, a second cooling interface positioned on the second enclosure and capable of coupling the first enclosure to a cooler separate from the radiation detection system is included. Other embodiments are also presented.

  17. Systems and methods for detecting nuclear radiation in the presence of backgrounds

    DOE Patents [OSTI]

    Bross, Alan D.; Mellott, Kerry L.; Pla-Dalmau, Anna

    2005-06-21

    Systems and methods for the simultaneous detection and identification of radiation species, including neutrons, gammas/x-rays and minimum ionizing particles (MIPs). A plurality of rectangular and/or triangularly shaped radiation sensitive scintillators can be configured from a plurality of nano-sized particles, dopants and an extruded plastic material. A wavelength-shifting fiber can then be located within a central hole of each extruded scintillator, wherein the wavelength-shifting fiber absorbs scintillation light and re-emits the light at a longer wavelength, thereby piping the light to a photodetector whose response to the light indicates the presence of radiation The resulting method and system can simultaneously detect neutrons, gamma rays, x-rays and cosmic rays (MIPs) and identify each.

  18. Method of remote powering and detecting multiple UWB passive tags in an RFID system

    DOE Patents [OSTI]

    Dowla, Farid U. (Castro Valley, CA); Nekoogar, Faranak (San Ramon, CA); Benzel, David M. (Livermore, CA); Dallum, Gregory E. (Livermore, CA); Spiridon, Alex (Palo Alto, CA)

    2012-05-29

    A new Radio Frequency Identification (RFID), tracking, powering apparatus/system and method using coded Ultra-wideband (UWB) signaling is introduced. The proposed hardware and techniques disclosed herein utilize a plurality of passive UWB transponders in a field of an RFID-radar system. The radar system itself enables multiple passive tags to be remotely powered (activated) at about the same time frame via predetermined frequency UWB pulsed formats. Once such tags are in an activated state, an UWB radar transmits specific "interrogating codes" to put predetermined tags in an awakened status. Such predetermined tags can then communicate by a unique "response code" so as to be detected by an UWB system using radar methods.

  19. Methods, media, and systems for detecting attack on a digital processing device

    DOE Patents [OSTI]

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  20. Method for detecting sophisticated cyber attacks

    SciTech Connect (OSTI)

    Potok, Thomas E. (Oak Ridge, TN)

    2008-11-18

    A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

  1. Near-Surface CO2 Monitoring And Analysis To Detect Hidden Geothermal Systems

    SciTech Connect (OSTI)

    Lewicki, Jennifer L.; Oldenburg, Curtis M.

    2005-01-19

    ''Hidden'' geothermal systems are systems devoid of obvious surface hydrothermal manifestations. Emissions of moderate-to-low solubility gases may be one of the primary near-surface signals from these systems. We investigate the potential for CO2 detection and monitoring below and above ground in the near-surface environment as an approach to exploration targeting hidden geothermal systems. We focus on CO2 because it is the dominant noncondensible gas species in most geothermal systems and has moderate solubility in water. We carried out numerical simulations of a CO2 migration scenario to calculate the magnitude of expected fluxes and concentrations. Our results show that CO2 concentrations can reach high levels in the shallow subsurface even for relatively low geothermal source CO2 fluxes. However, once CO2 seeps out of the ground into the atmospheric surface layer, winds are effective at dispersing CO2 seepage. In natural ecological systems in the absence of geothermal gas emissions, near-surface CO2 fluxes and concentrations are predominantly controlled by CO2 uptake by photosynthesis, production by root respiration, microbial decomposition of soil/subsoil organic matter, groundwater degassing, and exchange with the atmosphere. Available technologies for monitoring CO2 in the near-surface environment include the infrared gas analyzer, the accumulation chamber method, the eddy covariance method, hyperspectral imaging, and light detection and ranging. To meet the challenge of detecting potentially small-magnitude geothermal CO2 emissions within the natural background variability of CO2, we propose an approach that integrates available detection and monitoring techniques with statistical analysis and modeling strategies. The proposed monitoring plan initially focuses on rapid, economical, reliable measurements of CO2 subsurface concentrations and surface fluxes and statistical analysis of the collected data. Based on this analysis, are as with a high probability of containing geothermal CO2 anomalies can be further sampled and analyzed using more expensive chemical and isotopic methods. Integrated analysis of all measurements will determine definitively if CO2 derived from a deep geothermal source is present, and if so, the spatial extent of the anomaly. The suitability of further geophysical measurements, installation of deep wells, and geochemical analyses of deep fluids can then be determined based on the results of the near surface CO2 monitoring program.

  2. Optical methods and systems for detecting a constituent in a gas containing oxygen in harsh environments

    DOE Patents [OSTI]

    Carpenter, Michael A. (Scotia, NY); Sirinakis, George (Bronx, NY)

    2011-01-04

    A method for detecting a gas phase constituent such as carbon monoxide, nitrogen dioxide, hydrogen, or hydrocarbons in a gas comprising oxygen such as air, includes providing a sensing material or film having a metal embedded in a catalytically active matrix such as gold embedded in a yttria stabilized zirconia (YSZ) matrix. The method may include annealing the sensing material at about 900.degree. C., exposing the sensing material and gas to a temperature above 400.degree. C., projecting light onto the sensing material, and detecting a change in the absorption spectrum of the sensing material due to the exposure of the sensing material to the gas in air at the temperature which causes a chemical reaction in the sensing material compared to the absorption spectrum of the sensing material in the absence of the gas. Systems employing such a method are also disclosed.

  3. Detection system for high-resolution gamma radiation spectroscopy with neutron time-of-flight filtering

    DOE Patents [OSTI]

    Dioszegi, Istvan; Salwen, Cynthia; Vanier, Peter

    2014-12-30

    A .gamma.-radiation detection system that includes at least one semiconductor detector such as HPGe-Detector, a position-sensitive .alpha.-Detector, a TOF Controller, and a Digitizer/Integrator. The Digitizer/Integrator starts to process the energy signals of a .gamma.-radiation sent from the HPGe-Detector instantly when the HPGe-Detector detects the .gamma.-radiation. Subsequently, it is determined whether a coincidence exists between the .alpha.-particles and .gamma.-radiation signal, based on a determination of the time-of-flight of neutrons obtained from the .alpha.-Detector and the HPGe-Detector. If it is determined that the time-of-flight falls within a predetermined coincidence window, the Digitizer/Integrator is allowed to continue and complete the energy signal processing. If, however, there is no coincidence, the Digitizer/Integrator is instructed to be clear and reset its operation instantly.

  4. System and method for detecting a faulty object in a system (Patent) |

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail. (Conference)Feedback System inStatusandArticle)System Software Resilience.SciTech

  5. System and method for detecting a faulty object in a system (Patent) |

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail. (Conference)Feedback System inStatusandArticle)System Software

  6. DEVELOPMENT OF DEPOSIT DETECTION SYSTEM IN PIPELINES OF THE STEELWORKS USING CS-137 GAMMA-RAY

    SciTech Connect (OSTI)

    Song, Won-Joon; Lee, Seung-Hee; Jeong, Hee-Dong

    2008-02-28

    The deposit is built up in the pipeline of the steelworks by the chemical reaction among COG (coke oven gas), BFG (blast furnace gas), moisture, and steel in the high temperature environment and obstructs the smooth gas flow. In this study a gamma-ray system is developed to detect the deposit accumulated in pipelines and calculate the accumulation rate with respect to the cross section area of pipes. Cs-137 is used as the gamma-ray source and the system is designed to apply to pipes of various diameters. This system also includes the DB for storage and display of the measurement results so that it can be used for the efficient management of the pipelines.

  7. An automated system for lung nodule detection in low-dose computed tomography

    E-Print Network [OSTI]

    Gori, I; Martinez, A Preite; Retico, A

    2007-01-01

    A computer-aided detection (CAD) system for the identification of pulmonary nodules in low-dose multi-detector helical Computed Tomography (CT) images was developed in the framework of the MAGIC-5 Italian project. One of the main goals of this project is to build a distributed database of lung CT scans in order to enable automated image analysis through a data and cpu GRID infrastructure. The basic modules of our lung-CAD system, a dot-enhancement filter for nodule candidate selection and a neural classifier for false-positive finding reduction, are described. The system was designed and tested for both internal and sub-pleural nodules. The results obtained on the collected database of low-dose thin-slice CT scans are shown in terms of free response receiver operating characteristic (FROC) curves and discussed.

  8. Sensing system for detection and control of deposition on pendant tubes in recovery and power boilers

    DOE Patents [OSTI]

    Kychakoff, George; Afromowitz, Martin A; Hugle, Richard E

    2005-06-21

    A system for detection and control of deposition on pendant tubes in recovery and power boilers includes one or more deposit monitoring sensors operating in infrared regions and about 4 or 8.7 microns and directly producing images of the interior of the boiler. An image pre-processing circuit (95) in which a 2-D image formed by the video data input is captured, and includes a low pass filter for performing noise filtering of said video input. An image segmentation module (105) for separating the image of the recovery boiler interior into background, pendant tubes, and deposition. An image-understanding unit (115) matches derived regions to a 3-D model of said boiler. It derives a 3-D structure the deposition on pendant tubes in the boiler and provides the information about deposits to the plant distributed control system (130) for more efficient operation of the plant pendant tube cleaning and operating systems.

  9. Strategies for Detecting Hidden Geothermal Systems by Near-Surface Gas Monitoring

    SciTech Connect (OSTI)

    Lewicki, Jennifer L.; Oldenburg, Curtis M.

    2004-12-15

    ''Hidden'' geothermal systems are those systems above which hydrothermal surface features (e.g., hot springs, fumaroles, elevated ground temperatures, hydrothermal alteration) are lacking. Emissions of moderate to low solubility gases (e.g., CO2, CH4, He) may be one of the primary near-surface signals from these systems. Detection of anomalous gas emissions related to hidden geothermal systems may therefore be an important tool to discover new geothermal resources. This study investigates the potential for CO2 detection and monitoring in the subsurface and above ground in the near-surface environment to serve as a tool to discover hidden geothermal systems. We focus the investigation on CO2 due to (1) its abundance in geothermal systems, (2) its moderate solubility in water, and (3) the wide range of technologies available to monitor CO2 in the near-surface environment. However, monitoring in the near-surface environment for CO2 derived from hidden geothermal reservoirs is complicated by the large variation in CO2 fluxes and concentrations arising from natural biological and hydrologic processes. In the near-surface environment, the flow and transport of CO2 at high concentrations will be controlled by its high density, low viscosity, and high solubility in water relative to air. Numerical simulations of CO2 migration show that CO2 concentrations can reach very high levels in the shallow subsurface even for relatively low geothermal source CO2 fluxes. However, once CO2 seeps out of the ground into the atmospheric surface layer, surface winds are effective at dispersing CO2 seepage. In natural ecological systems in the absence of geothermal gas emissions, near-surface CO2 fluxes and concentrations are primarily controlled by CO2 uptake by photosynthesis, production by root respiration, and microbial decomposition of soil/subsoil organic matter, groundwater degassing, and exchange with the atmosphere. Available technologies for monitoring CO2 in the near-surface environment include (1) the infrared gas analyzer (IRGA) for measurement of concentrations at point locations, (2) the accumulation chamber (AC) method for measuring soil CO2 fluxes at point locations, (3) the eddy covariance (EC) method for measuring net CO2 flux over a given area, (4) hyperspectral imaging of vegetative stress resulting from elevated CO2 concentrations, and (5) light detection and ranging (LIDAR) that can measure CO2 concentrations over an integrated path. Technologies currently in developmental stages that have the potential to be used for CO2 monitoring include tunable lasers for long distance integrated concentration measurements and micro-electronic mechanical systems (MEMS) that can make widespread point measurements. To address the challenge of detecting potentially small-magnitude geothermal CO2 emissions within the natural background variability of CO2, we propose an approach that integrates available detection and monitoring methodologies with statistical analysis and modeling strategies. Within the area targeted for geothermal exploration, point measurements of soil CO2 fluxes and concentrations using the AC method and a portable IRGA, respectively, and measurements of net surface flux using EC should be made. Also, the natural spatial and temporal variability of surface CO2 fluxes and subsurface CO2 concentrations should be quantified within a background area with similar geologic, climatic, and ecosystem characteristics to the area targeted for geothermal exploration. Statistical analyses of data collected from both areas should be used to guide sampling strategy, discern spatial patterns that may be indicative of geothermal CO2 emissions, and assess the presence (or absence) of geothermal CO2 within the natural background variability with a desired confidence level. Once measured CO2 concentrations and fluxes have been determined to be of anomalous geothermal origin with high confidence, more expensive vertical subsurface gas sampling and chemical and isotopic analyses can be undertaken. Integrated analysis of all measurements will d

  10. Experiments using non-intrusive particle tracing techniques for granular chute flows. Final report

    SciTech Connect (OSTI)

    Rosato, A.D.; Dave, R.N.; Fischer, I.S.

    1998-12-31

    The objective of this contract was to develop a system capable of non-intrusively tracking the motion of an individual particle for the study of granular flows down inclined chutes. The result of the project is a system capable of following the three-dimensional translational and rotational motion of an individual particle embedded with a flowing granular material. The basic system consists of a sphere embedded with three orthogonal transmitters emitting at different frequencies which induce voltages in an antenna array surrounding the flow regime. Analysis of the induced voltage signals within the framework of a derived model yields both the position and orientation of the sphere. Tests were performed in a small scale model chute as well as in a cylindrical vibrated granular bed, which clearly demonstrates the capability of the system. As a result of discussions at meetings held semi-annually for the Granular Flow Advanced Research Objectives (GFARO) contractors, it was deemed necessary to pursue an additional experimental program as part of this contract related to the measurement of sphere collision properties. The outcome of the work (reported in Appendix C) is the determination of certain properties which are needed for use in computer simulations and theory.

  11. Methods, microfluidic devices, and systems for detection of an active enzymatic agent

    DOE Patents [OSTI]

    Sommer, Gregory J; Hatch, Anson V; Singh, Anup K; Wang, Ying-Chih

    2014-10-28

    Embodiments of the present invention provide methods, microfluidic devices, and systems for the detection of an active target agent in a fluid sample. A substrate molecule is used that contains a sequence which may cleave in the presence of an active target agent. A SNAP25 sequence is described, for example, that may be cleaved in the presence of Botulinum Neurotoxin. The substrate molecule includes a reporter moiety. The substrate molecule is exposed to the sample, and resulting reaction products separated using electrophoretic separation. The elution time of the reporter moiety may be utilized to identify the presence or absence of the active target agent.

  12. System for detecting and limiting electrical ground faults within electrical devices

    DOE Patents [OSTI]

    Gaubatz, Donald C. (Cupertino, CA)

    1990-01-01

    An electrical ground fault detection and limitation system for employment with a nuclear reactor utilizing a liquid metal coolant. Elongate electromagnetic pumps submerged within the liquid metal coolant and electrical support equipment experiencing an insulation breakdown occasion the development of electrical ground fault current. Without some form of detection and control, these currents may build to damaging power levels to expose the pump drive components to liquid metal coolant such as sodium with resultant undesirable secondary effects. Such electrical ground fault currents are detected and controlled through the employment of an isolated power input to the pumps and with the use of a ground fault control conductor providing a direct return path from the affected components to the power source. By incorporating a resistance arrangement with the ground fault control conductor, the amount of fault current permitted to flow may be regulated to the extent that the reactor may remain in operation until maintenance may be performed, notwithstanding the existence of the fault. Monitors such as synchronous demodulators may be employed to identify and evaluate fault currents for each phase of a polyphase power, and control input to the submerged pump and associated support equipment.

  13. Development of an Integrated Sensor System for Obstacle Detection and Terrain Evaluation for Application to Unmanned Ground

    E-Print Network [OSTI]

    Florida, University of

    Development of an Integrated Sensor System for Obstacle Detection and Terrain Evaluation field of view of 50 degrees and 38 degrees, respectively. Two sensor systems were utilized to evaluate., Wexford Pennsylvania ABSTRACT This paper describes the development and performance of a sensor system

  14. Implementation and Testing of a Fault Detection Software Tool for Improving Control System Performance in a Large Commercial Building

    E-Print Network [OSTI]

    Implementation and Testing of a Fault Detection Software Tool for Improving Control System of faults by monitoring the level of these discrepancies. We present results from the first phase of tests

  15. SMARTx: An Embedded Proximity Detection System for Reducing Collisions Clinton Beasley* Joshua S. Williams* Zachary Brasuell* Sunho Lim Michael Shin

    E-Print Network [OSTI]

    Lim, Sunho

    to reducecollisions significantly. Antenna (nRF905) Arduino GPS Bluetooth Receiver Side Antenna (nRF905) GPS Arduino and developed an embedded proximity detection system using Arduino and its communication components. Proposed

  16. Magnetophoretic bead trapping in a high-flowrate biological detection system.

    SciTech Connect (OSTI)

    Galambos, Paul C.; Hopkins, Matthew Morgan; Rahimian, Kamayar; Martin, James Ellis; Anderson, G. Ronald; Clem, Paul Gilbert; Rohwer, Lauren Elizabeth Shea; Lemp, Thomas; Derzon, Mark Steven; James, Conrad D.

    2005-03-01

    This report contains the summary of the 'Magnetophoretic Bead Trapping in a High-Flowrate Biological Detection System' LDRD project 74795. The objective of this project is to develop a novel biodetection system for high-throughput sample analysis. The chief application of this system is in detection of very low concentrations of target molecules from a complex liquid solution containing many different constituents--some of which may interfere with identification of the target molecule. The system is also designed to handle air sampling by using an aerosol system (for instance a WESP - Wet Electro-Static Precipitator, or an impact spray system) to get air sample constituents into the liquid volume. The system described herein automatically takes the raw liquid sample, whether air converted or initially liquid matrix, and mixes in magnetic detector beads that capture the targets of interest and then performs the sample cleanup function, allowing increased sensitivity and eliminating most false positives and false negatives at a downstream detector. The surfaces of the beads can be functionalized in a variety of ways in order to maximize the number of targets to be captured and concentrated. Bacteria and viruses are captured using antibodies to surface proteins on bacterial cell walls or viral particle coats. In combination with a cell lysis or PCR (Polymerase Chain Reaction), the beads can be used as a DNA or RNA probe to capture nucleic acid patterns of interest. The sample cleanup capability of this system would allow different raw biological samples, such as blood or saliva to be analyzed for the presence of different infectious agents (e.g. smallpox or SARS). For future studies, we envision functionalizing bead surfaces to bind to chemical weapons agents, radio-isotopes, and explosives. The two main objectives of this project were to explore methods for enhancing the mixing of the capture microspheres in the sample, and to develop a novel high-throughput magnetic microsphere trap. We have developed a novel technique using the magnetic capture microspheres as 'stirrer bars' in a fluid sample to enhance target binding to the microsphere surfaces. We have also made progress in developing a polymer-MEMS electromagnet for trapping magnetic spheres in a high-flowrate fluid format.

  17. Ion mobility spectrometer, spectrometer analyte detection and identification verification system, and method

    DOE Patents [OSTI]

    Atkinson, David A. (Idaho Falls, ID)

    2002-01-01

    Methods and apparatus for ion mobility spectrometry and analyte detection and identification verification system are disclosed. The apparatus is configured to be used in an ion mobility spectrometer and includes a plurality of reactant reservoirs configured to contain a plurality of reactants which can be reacted with the sample to form adducts having varying ion mobilities. A carrier fluid, such as air or nitrogen, is used to carry the sample into the spectrometer. The plurality of reactants are configured to be selectively added to the carrier stream by use inlet and outlet manifolds in communication with the reagent reservoirs, the reservoirs being selectively isolatable by valves. The invention further includes a spectrometer having the reagent system described. In the method, a first reactant is used with the sample. Following a positive result, a second reactant is used to determine whether a predicted response occurs. The occurrence of the second predicted response tends to verify the existence of a component of interest within the sample. A third reactant can also be used to provide further verification of the existence of a component of interest. A library can be established of known responses of compounds of interest with various reactants and the results of a specific multi-reactant survey of a sample can be compared against the library to determine whether a component detected in the sample is likely to be a specific component of interest.

  18. Interpreting human activity from electrical consumption data through non-intrusive load monitoring

    E-Print Network [OSTI]

    Gillman, Mark Daniel

    2014-01-01

    Non-intrusive load monitoring (NILM) has three distinct advantages over today's smart meters. First, it offers accountability. Few people know where their kWh's are going. Second, it is a maintenance tool. Signs of wear ...

  19. Osmotic pressure effects upon intrusion of liquid electrolytes inside hydrophobic MOF's

    E-Print Network [OSTI]

    Michelin-Jamois, M; Charlaix, E; Vigier, G

    2014-01-01

    High pressure water intrusion in hydrophobic nanoporous media have been studied in relation with energy storage. It has already been showed that addition of electrolytes in water increases intrusion pressure of liquid leading to an enhancement of storing capacities. We demonstrate here that for a number of salt, a very simple van't Hoff law can explain intrusion and extrusion excess pressures compared with the pure water case. Our results suggest that only pure water can penetrate the pores, the ions being quartered in the bulk liquid around nanoporous medium. This selectivity explains very high pressures for very concentrated ions reported by Tzanis et al (2014). Finally, a partial intrusion of NaI and LiI is observed. This effect could be explained on the basis of particular behaviour or iodide ions over hydrophobic surfaces.

  20. Non-intrusive water utility monitoring and free-space load monitoring

    E-Print Network [OSTI]

    Neuman, Sabrina M

    2011-01-01

    This work presents a non-intrusive, single-point sensing scheme to monitor the water usage for various loads on a water utility pipe network through the vibration of a pipe near the water intake source. Experiments with ...

  1. Effects of droplet size on intrusion of sub-surface oil spills

    E-Print Network [OSTI]

    Chan, Godine Kok Yan

    2013-01-01

    This thesis explores the effects of droplet size on droplet intrusion in sub-surface oil spills. Laboratory experiments were performed where glass beads of various sizes, which serve to simulate oil droplets in deepsea oil ...

  2. Evaluation of non-intrusive monitoring for condition based maintenance applications on US Navy propulsion plants

    E-Print Network [OSTI]

    Greene, William C. (William Calvin)

    2005-01-01

    The thesis explores the use of the Non-intrusive Load Monitor (NILM) in Condition Based Maintenance (CBM) applications on US Navy ships as part of the Office of Naval Research Electric Ship Integration (ESI) Initiative. ...

  3. Sensing system for detection and control of deposition on pendant tubes in recovery and power boilers

    DOE Patents [OSTI]

    Kychakoff, George (Maple Valley, WA); Afromowitz, Martin A. (Mercer Island, WA); Hogle, Richard E. (Olympia, WA)

    2008-10-14

    A system for detection and control of deposition on pendant tubes in recovery and power boilers includes one or more deposit monitoring sensors operating in infrared regions of about 4 or 8.7 microns and directly producing images of the interior of the boiler, or producing feeding signals to a data processing system for information to enable a distributed control system by which the boilers are operated to operate said boilers more efficiently. The data processing system includes an image pre-processing circuit in which a 2-D image formed by the video data input is captured, and includes a low pass filter for performing noise filtering of said video input. It also includes an image compensation system for array compensation to correct for pixel variation and dead cells, etc., and for correcting geometric distortion. An image segmentation module receives a cleaned image from the image pre-processing circuit for separating the image of the recovery boiler interior into background, pendant tubes, and deposition. It also accomplishes thresholding/clustering on gray scale/texture and makes morphological transforms to smooth regions, and identifies regions by connected components. An image-understanding unit receives a segmented image sent from the image segmentation module and matches derived regions to a 3-D model of said boiler. It derives a 3-D structure the deposition on pendant tubes in the boiler and provides the information about deposits to the plant distributed control system for more efficient operation of the plant pendant tube cleaning and operating systems.

  4. Mining Building Energy Management System Data Using Fuzzy Anomaly Detection and Linguistic Descriptions

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Ondrej Linda; Milos Manic; Craig Rieger

    2014-08-01

    Building Energy Management Systems (BEMSs) are essential components of modern buildings that utilize digital control technologies to minimize energy consumption while maintaining high levels of occupant comfort. However, BEMSs can only achieve these energy savings when properly tuned and controlled. Since indoor environment is dependent on uncertain criteria such as weather, occupancy, and thermal state, performance of BEMS can be sub-optimal at times. Unfortunately, the complexity of BEMS control mechanism, the large amount of data available and inter-relations between the data can make identifying these sub-optimal behaviors difficult. This paper proposes a novel Fuzzy Anomaly Detection and Linguistic Description (Fuzzy-ADLD) based method for improving the understandability of BEMS behavior for improved state-awareness. The presented method is composed of two main parts: 1) detection of anomalous BEMS behavior and 2) linguistic representation of BEMS behavior. The first part utilizes modified nearest neighbor clustering algorithm and fuzzy logic rule extraction technique to build a model of normal BEMS behavior. The second part of the presented method computes the most relevant linguistic description of the identified anomalies. The presented Fuzzy-ADLD method was applied to real-world BEMS system and compared against a traditional alarm based BEMS. In six different scenarios, the Fuzzy-ADLD method identified anomalous behavior either as fast as or faster (an hour or more), that the alarm based BEMS. In addition, the Fuzzy-ADLD method identified cases that were missed by the alarm based system, demonstrating potential for increased state-awareness of abnormal building behavior.

  5. A PHOTOMETRIC SYSTEM FOR DETECTION OF WATER AND METHANE ICES ON KUIPER BELT OBJECTS

    SciTech Connect (OSTI)

    Trujillo, Chadwick A.; Sheppard, Scott S.; Schaller, Emily L. E-mail: sheppard@dtm.ciw.edu

    2011-04-01

    We present a new near-infrared photometric system for detection of water ice and methane ice in the solar system. The system consists of two medium-band filters in the K-band region of the near-infrared, which are sensitive to water ice and methane ice, plus continuum observations in the J band and Y band. The primary purpose of this system is to distinguish between three basic types of Kuiper Belt Objects (KBOs)-those rich in water ice, those rich in methane ice, and those with little absorbance. In this work, we present proof-of-concept observations of 51 KBOs using our filter system, 21 of which have never been observed in the near-infrared spectroscopically. We show that our custom photometric system is consistent with previous spectroscopic observations while reducing telescope observing time by a factor of {approx}3. We use our filters to identify Haumea collisional family members, which are thought to be collisional remnants of a much larger body and are characterized by large fractions of water ice on their surfaces. We add 2009 YE{sub 7} to the Haumea collisional family based on our water ice band observations (J - H{sub 2}O = -1.03 {+-} 0.27) which indicate a high amount of water ice absorption, our calculated proper orbital elements, and the neutral optical colors we measured, V - R = 0.38 {+-} 0.04, which are all consistent with the rest of the Haumea family. We identify several objects dynamically similar to Haumea as being distinct from the Haumea family as they do not have water ice on their surfaces. In addition, we find that only the largest KBOs have methane ice, and Haumea itself has significantly less water ice absorption than the smaller Haumea family members. We find no evidence for other families in the Kuiper Belt.

  6. Development of an autonomous continuous monitoring system for mechanical damage detection.

    SciTech Connect (OSTI)

    Sohn, H. (Hoon); Allen, D. W. (David W.); Farrar, C. R. (Charles R.); Worden, K.

    2002-01-01

    The primary objective of damage identification is to ascertain the existence of damage within a mechanical system. This study applies the Sequential Probability Ratio Test (SPRT) to examine if damage is present or not. In the original formulation of the SPRT, the distribution of data is assumed Gaussian and thresholds for monitoring are set focusing on the center mass properties of the distribution. Decision-making for damage identification is, however, often sensitive to the tails of the distribution and the tails may not necessarily be governed by Gaussian characteristics. By modeling the tails using the technique of Extreme Value Statistics (EVS), the thresholds for the SPRT may be set more accurately avoiding the unnecessary normality assumption. The proposed combination of the SPRT and the EVS is demonstrated using experimental data collected from a three-story frame structure with bolted connections. The primary goal of structural health monitoring is simply to identify from measured data if a structure has deviated from a normal operational condition. Particularly, vibration-based damage detection techniques assume that changes of the structure's integrity affect characteristics of the measured vibration signals enabling one to detect damage. Many current approaches to this problem involve methods that leave much to the interpretation of analysts. These methods may enable a trained eye to discern and locate damage but are not easily automated or objective. In an attempt to automate the damage identification procedure, the SPRT is employed for the decision-making procedure. The original SPRT assumes that the extracted features have a Gaussian distribution. This normality assumption, however, may place misleading constraints on the tails of the distribution. As the problem of damage detection specifically focuses attention on the tails, the assumption of normality is likely to lead the analysis astray. To overcome this difficulty, the performance of the SPRT is improved by integrating the EVS, which specifically models behavior in the tails of the distribution of interest, into the SPRT.

  7. SiPMs characterization and selection for the DUNE far detector photon detection system

    E-Print Network [OSTI]

    Sun, Yujing

    2015-01-01

    The Deep Underground Neutrino Experiment (DUNE) together with the Long Baseline Neutrino Facility (LBNF) hosted at the Fermilab will provide a unique, world-leading program for the exploration of key questions at the forefront of neutrino physics and astrophysics. CP violation in neutrino flavor mixing is one of its most important potential discoveries. Additionally, the experiment will determine the neutrino mass hierarchy and precisely measure the neutrino mixing parameters which may potentially reveal new fundamental symmetries of nature. Moreover, the DUNE is also designed for the observation of nucleon decay and supernova burst neutrinos. The photon detection (PD) system in the DUNE far detector provides trigger for cosmic backgrounds, enhances supernova burst trigger efficiency and improves the energy resolution of the detector. The DUNE adopts the technology of liquid argon time projection chamber (LArTPC) that requires the PD sensors, silicon photomultipliers (SiPM), to be carefully chosen to not only...

  8. Physics-based, Bayesian sequential detection method and system for radioactive contraband

    DOE Patents [OSTI]

    Candy, James V; Axelrod, Michael C; Breitfeller, Eric F; Chambers, David H; Guidry, Brian L; Manatt, Douglas R; Meyer, Alan W; Sale, Kenneth E

    2014-03-18

    A distributed sequential method and system for detecting and identifying radioactive contraband from highly uncertain (noisy) low-count, radionuclide measurements, i.e. an event mode sequence (EMS), using a statistical approach based on Bayesian inference and physics-model-based signal processing based on the representation of a radionuclide as a monoenergetic decomposition of monoenergetic sources. For a given photon event of the EMS, the appropriate monoenergy processing channel is determined using a confidence interval condition-based discriminator for the energy amplitude and interarrival time and parameter estimates are used to update a measured probability density function estimate for a target radionuclide. A sequential likelihood ratio test is then used to determine one of two threshold conditions signifying that the EMS is either identified as the target radionuclide or not, and if not, then repeating the process for the next sequential photon event of the EMS until one of the two threshold conditions is satisfied.

  9. Method and system for early detection of incipient faults in electric motors

    DOE Patents [OSTI]

    Parlos, Alexander G; Kim, Kyusung

    2003-07-08

    A method and system for early detection of incipient faults in an electric motor are disclosed. First, current and voltage values for one or more phases of the electric motor are measured during motor operations. A set of current predictions is then determined via a neural network-based current predictor based on the measured voltage values and an estimate of motor speed values of the electric motor. Next, a set of residuals is generated by combining the set of current predictions with the measured current values. A set of fault indicators is subsequently computed from the set of residuals and the measured current values. Finally, a determination is made as to whether or not there is an incipient electrical, mechanical, and/or electromechanical fault occurring based on the comparison result of the set of fault indicators and a set of predetermined baseline values.

  10. Multi-sensor system for the detection and characterization of unexploded ordnance

    DOE Patents [OSTI]

    Morrison, Frank H. (Berkeley, CA); Gasperikova, Erika (Berkeley, CA)

    2011-08-16

    To fully characterize the inductive response of an isolated conductive object, such as buried unexploded ordinance, one needs to measure its response to stimulation by primary magnetic fields in three linearly independent (e.g., approximately orthogonal) directions. In one embodiment this is achieved by measuring the response to magnetic fields of three independent transmitters arranged to have magnetic fields that are linearly independent. According to the apparatus and methods employing the system of this invention, multiple transmitters and receivers of known relative position and orientation on a single platform are used. In a preferred embodiment, matched sets of receiver pairs connected in gradient mode are positioned adjacent to closely spaced pairs of transmitting coils, such that a minor displacement of one or both of the receiver coil pairs relative to the paired transmitting coils will not affect the detected secondary signals emitted by a buried metallic object.

  11. Systems for low frequency seismic and infrasound detection of geo-pressure transition zones

    DOE Patents [OSTI]

    Shook, G. Michael (Idaho Falls, ID); LeRoy, Samuel D. (Houston, TX); Benzing, William M. (Tulsa, OK)

    2007-10-16

    Methods for determining the existence and characteristics of a gradational pressurized zone within a subterranean formation are disclosed. One embodiment involves employing an attenuation relationship between a seismic response signal and increasing wavelet wavelength, which relationship may be used to detect a gradational pressurized zone and/or determine characteristics thereof. In another embodiment, a method for analyzing data contained within a response signal for signal characteristics that may change in relation to the distance between an input signal source and the gradational pressurized zone is disclosed. In a further embodiment, the relationship between response signal wavelet frequency and comparative amplitude may be used to estimate an optimal wavelet wavelength or range of wavelengths used for data processing or input signal selection. Systems for seismic exploration and data analysis for practicing the above-mentioned method embodiments are also disclosed.

  12. Methods and systems for low frequency seismic and infrasound detection of geo-pressure transition zones

    DOE Patents [OSTI]

    Shook, G. Michael; LeRoy, Samuel D.; Benzing, William M.

    2006-07-18

    Methods for determining the existence and characteristics of a gradational pressurized zone within a subterranean formation are disclosed. One embodiment involves employing an attenuation relationship between a seismic response signal and increasing wavelet wavelength, which relationship may be used to detect a gradational pressurized zone and/or determine characteristics thereof. In another embodiment, a method for analyzing data contained within a response signal for signal characteristics that may change in relation to the distance between an input signal source and the gradational pressurized zone is disclosed. In a further embodiment, the relationship between response signal wavelet frequency and comparative amplitude may be used to estimate an optimal wavelet wavelength or range of wavelengths used for data processing or input signal selection. Systems for seismic exploration and data analysis for practicing the above-mentioned method embodiments are also disclosed.

  13. Adverse Event Detection (AED) System for Continuously Monitoring and Evaluating Structural Health Status

    E-Print Network [OSTI]

    Ha, Dong S.

    is capable of detecting, locating, and quantifying various types of damage such as cracks, holes, corrosion, railroads, windmills, bridges, and aircraft. To detect or locate various types of defects, it necessitates

  14. S3A: Secure System Simplex Architecture for Enhanced Security of Cyber-Physical Systems

    E-Print Network [OSTI]

    Mohan, Sibin; Betti, Emiliano; Yun, Heechul; Sha, Lui; Caccamo, Marco

    2012-01-01

    Until recently, cyber-physical systems, especially those with safety-critical properties that manage critical infrastructure (e.g. power generation plants, water treatment facilities, etc.) were considered to be invulnerable against software security breaches. The recently discovered 'W32.Stuxnet' worm has drastically changed this perception by demonstrating that such systems are susceptible to external attacks. Here we present an architecture that enhances the security of safety-critical cyber-physical systems despite the presence of such malware. Our architecture uses the property that control systems have deterministic execution behavior, to detect an intrusion within 0.6 {\\mu}s while still guaranteeing the safety of the plant. We also show that even if an attack is successful, the overall state of the physical system will still remain safe. Even if the operating system's administrative privileges have been compromised, our architecture will still be able to protect the physical system from coming to harm.

  15. Comparison of Two Intrusion Detection Schemes for Sparsely Connected Ad Hoc Networks M. Chuah, P. Yang

    E-Print Network [OSTI]

    Chuah, Mooi-Choo "Mooi"

    ] uses a variant of Telsa [8] to provide source authentication for DSR. All the above approaches suggest

  16. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware

    E-Print Network [OSTI]

    Tierney, Brian L

    2008-01-01

    a similar problem with Bro’s IRC analyzer, which tracks asigni?cant amount of state for each IRC user encountered.campus network, the share of IRC tra?c is relatively large,

  17. A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions

    E-Print Network [OSTI]

    Lee, Wenke

    , Rahul A. Nimbalkar 1 , Kam K. Yee 1 , Sunil B. Patil 1 , Pragneshkumar H. Desai 1 , Thuan T. Tran 1

  18. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware

    E-Print Network [OSTI]

    Tierney, Brian L

    2008-01-01

    Mai, M. , Paxson, V. , Sommer, R. : Dynamic Application-24) (1999) 2435–2463 3. Sommer, R. , Paxson, V. : ExploitingA. , Paxson, V. , Sommer, R. : Operational Experiences with

  19. High resolution biomedical imaging system with direct detection of x-rays via a charge coupled device

    DOE Patents [OSTI]

    Atac, Muzaffer (Wheaton, IL); McKay, Timothy A. (Ann Arbor, MI)

    1998-01-01

    An imaging system is provided for direct detection of x-rays from an irradiated biological tissue. The imaging system includes an energy source for emitting x-rays toward the biological tissue and a charge coupled device (CCD) located immediately adjacent the biological tissue and arranged transverse to the direction of irradiation along which the x-rays travel. The CCD directly receives and detects the x-rays after passing through the biological tissue. The CCD is divided into a matrix of cells, each of which individually stores a count of x-rays directly detected by the cell. The imaging system further includes a pattern generator electrically coupled to the CCD for reading a count from each cell. A display device is provided for displaying an image representative of the count read by the pattern generator from the cells of the CCD.

  20. High resolution biomedical imaging system with direct detection of x-rays via a charge coupled device

    DOE Patents [OSTI]

    Atac, M.; McKay, T.A.

    1998-04-21

    An imaging system is provided for direct detection of x-rays from an irradiated biological tissue. The imaging system includes an energy source for emitting x-rays toward the biological tissue and a charge coupled device (CCD) located immediately adjacent the biological tissue and arranged transverse to the direction of irradiation along which the x-rays travel. The CCD directly receives and detects the x-rays after passing through the biological tissue. The CCD is divided into a matrix of cells, each of which individually stores a count of x-rays directly detected by the cell. The imaging system further includes a pattern generator electrically coupled to the CCD for reading a count from each cell. A display device is provided for displaying an image representative of the count read by the pattern generator from the cells of the CCD. 13 figs.

  1. Improved TPB-coated Light Guides for Liquid Argon TPC Light Detection Systems

    E-Print Network [OSTI]

    Z. Moss; L. Bugel; G. Collin; J. M. Conrad; B. J. P. Jones; J. Moon; M. Toups; T. Wongjirad

    2015-03-25

    Scintillation light produced in liquid argon (LAr) must be shifted from 128 nm to visible wavelengths in light detection systems used for liquid argon time-projection chambers (LArTPCs). To date, LArTPC light collection systems have employed tetraphenyl butadiene (TPB) coatings on photomultiplier tubes (PMTs) or plates placed in front of the PMTs. Recently, a new approach using TPB-coated light guides was proposed. In this paper, we report on light guides with improved attenuation lengths above 100 cm when measured in air. This is an important step in the development of meter-scale light guides for future LArTPCs. Improvements come from using a new acrylic-based coating, diamond-polished cast UV transmitting acrylic bars, and a hand-dipping technique to coat the bars. We discuss a model for connecting bar response in air to response in liquid argon and compare this to data taken in liquid argon. The good agreement between the prediction of the model and the measured response in liquid argon demonstrates that characterization in air is sufficient for quality control of bar production. This model can be used in simulations of light guides for future experiments.

  2. Stragegies to Detect Hidden Geothermal Systems Based on Monitoringand Analysis of CO2 in the Near-Surface Environment

    SciTech Connect (OSTI)

    Lewicki, Jennifer L.; Oldenburg, Curtis M.

    2005-03-29

    We investigate the potential for CO2 monitoring in thenear-surface environment as an approach to exploration for hiddengeothermal systems. Numerical simulations of CO2 migration from a modelhidden geothermal system show that CO2 concentrations can reach highlevels in the shallow subsurface even for relatively low CO2 fluxes.Therefore, subsurface measurements offer an advantage over above-groundmeasurements which are affected by winds that rapidly disperse CO2. Tomeet the challenge of detecting geothermal CO2 emissions within thenatural background variability of CO2, we propose an approach thatintegrates available detection and monitoring techniques with statisticalanalysis and modeling.

  3. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  4. System and method for constructing filters for detecting signals whose frequency content varies with time

    DOE Patents [OSTI]

    Qian, Shie (Austin, TX); Dunham, Mark E. (Los Alamos, NM)

    1996-01-01

    A system and method for constructing a bank of filters which detect the presence of signals whose frequency content varies with time. The present invention includes a novel system and method for developing one or more time templates designed to match the received signals of interest and the bank of matched filters use the one or more time templates to detect the received signals. Each matched filter compares the received signal x(t) with a respective, unique time template that has been designed to approximate a form of the signals of interest. The robust time domain template is assumed to be of the order of w(t)=A(t)cos{2.pi..phi.(t)} and the present invention uses the trajectory of a joint time-frequency representation of x(t) as an approximation of the instantaneous frequency function {.phi.'(t). First, numerous data samples of the received signal x(t) are collected. A joint time frequency representation is then applied to represent the signal, preferably using the time frequency distribution series (also known as the Gabor spectrogram). The joint time-frequency transformation represents the analyzed signal energy at time t and frequency .function., P(t,f), which is a three-dimensional plot of time vs. frequency vs. signal energy. Then P(t,f) is reduced to a multivalued function f(t), a two dimensional plot of time vs. frequency, using a thresholding process. Curve fitting steps are then performed on the time/frequency plot, preferably using Levenberg-Marquardt curve fitting techniques, to derive a general instantaneous frequency function .phi.'(t) which best fits the multivalued function f(t), a trajectory of the joint time-frequency domain representation of x(t). Integrating .phi.'(t) along t yields .phi.(t), which is then inserted into the form of the time template equation. A suitable amplitude A(t) is also preferably determined. Once the time template has been determined, one or more filters are developed which each use a version or form of the time template.

  5. System and method for constructing filters for detecting signals whose frequency content varies with time

    DOE Patents [OSTI]

    Qian, S.; Dunham, M.E.

    1996-11-12

    A system and method are disclosed for constructing a bank of filters which detect the presence of signals whose frequency content varies with time. The present invention includes a novel system and method for developing one or more time templates designed to match the received signals of interest and the bank of matched filters use the one or more time templates to detect the received signals. Each matched filter compares the received signal x(t) with a respective, unique time template that has been designed to approximate a form of the signals of interest. The robust time domain template is assumed to be of the order of w(t)=A(t)cos(2{pi}{phi}(t)) and the present invention uses the trajectory of a joint time-frequency representation of x(t) as an approximation of the instantaneous frequency function {phi}{prime}(t). First, numerous data samples of the received signal x(t) are collected. A joint time frequency representation is then applied to represent the signal, preferably using the time frequency distribution series. The joint time-frequency transformation represents the analyzed signal energy at time t and frequency f, P(t,f), which is a three-dimensional plot of time vs. frequency vs. signal energy. Then P(t,f) is reduced to a multivalued function f(t), a two dimensional plot of time vs. frequency, using a thresholding process. Curve fitting steps are then performed on the time/frequency plot, preferably using Levenberg-Marquardt curve fitting techniques, to derive a general instantaneous frequency function {phi}{prime}(t) which best fits the multivalued function f(t). Integrating {phi}{prime}(t) along t yields {phi}{prime}(t), which is then inserted into the form of the time template equation. A suitable amplitude A(t) is also preferably determined. Once the time template has been determined, one or more filters are developed which each use a version or form of the time template. 7 figs.

  6. First Detection of NaI D lines in High-Redshift Damped Lyman-alpha Systems

    E-Print Network [OSTI]

    Kondo, S; Gässler, W; Hayano, Y; Iye, M; Kamata, Y; Kanzawa, T; Kobayashi, N; Minowa, Y; Nedachi, K; Oya, S; Pyo, T S; Saint-Jacques, D; Takami, H; Takato, N; Terada, H; Tokunaga, A; Tsujimoto, T; Churchill, Christopher W.; Gaessler, Wolfgang; Hayano, Yutaka; Iye, Masanori; Kamata, Yukiko; Kanzawa, Tomio; Kobayashi, Naoto; Kondo, Sohei; Minowa, Yosuke; Nedachi, Ko; Oya, Shin; Pyo, Tae-Soo; Takami, Hideki; Takato, Naruhisa; Terada, Hiroshi; Tokunaga, Alan; Tsujimoto, Takuji

    2006-01-01

    A Near-infrared (1.18-1.35 micron) high-resolution spectrum of the gravitationally-lensed QSO APM 08279+5255 was obtained with the IRCS mounted on the Subaru Telescope using the AO system. We detected strong NaI D 5891,5897 doublet absorption in high-redshift DLAs at z=1.062 and 1.181, confirming the presence of NaI, which was first reported for the rest-frame UV NaI 3303.3,3303.9 doublet by Petitjean et al. This is the first detection of NaI D absorption in a high-redshift (z>1) DLA. In addition, we detected a new NaI component in the z=1.062 DLA and four new components in the z=1.181 DLA. Using an empirical relationship between NaI and HI column density, we found that all "components" have large HI column density, so that each component is classified as DLA absorption. We also detected strong NaI D absorption associated with a MgII system at z=1.173. Because no other metal absorption lines were detected in this system at the velocity of the NaI absorption in previously reported optical spectra (observed 3.6...

  7. Detection technique and front-end RF tunable filter for cognitive radio systems

    E-Print Network [OSTI]

    Park, Sanghoon

    2010-01-01

    Introduction to Microelectromechanical Systems Engineer-high reliability. 2. Microelectromechanical system filters [73–80]: Microelectromechanical systems (MEMS) is the

  8. A comparison of portable and permanent landfill liner leak detection systems

    SciTech Connect (OSTI)

    Taylor, S.B.; White, C.C.; Barker, R.D.

    1999-07-01

    Monitoring of the integrity of electrically non-conductive geomembrane liners installed at waste sites using electrical geophysical techniques has been carried out for a number of years using above-liner leak location surveys and, more recently, below-liner monitoring systems. The authors compare the theoretical response of both types of survey to a hole in a liner and then compare with measurements made in the field. The theoretical leak response indicates that above-liner surveys are sensitive to leaks over a greater area, though both responses result in comparable leak detectability. However, field data suggest that in practice, measurements made on a sparse grid below the liner have the greater sensitivity to certain leaks. This may be due to the differing leak geometries and background conditions present above and below the liner. The results indicate that a sparse below-liner monitoring grid, with its long-term monitoring capabilities, combined with above-liner surveys to pinpoint leaks accurately offer a successful approach to ensuring liner integrity throughout the lifetime of a lined waste site.

  9. Fiber optic sensor system for detecting movement or position of a rotating wheel bearing

    DOE Patents [OSTI]

    Veeser, Lynn R. (Los Alamos, NM); Rodriguez, Patrick J. (Santa Fe, NM); Forman, Peter R. (Los Alamos, NM); Monahan, Russell E. (Ann Arbor, MI); Adler, Jonathan M. (Ypsilanti, MI)

    1997-01-01

    An improved fiber optic sensor system and integrated sensor bearing assembly for detecting movement or position of a rotating wheel bearing having a multi-pole tone ring which produces an alternating magnetic field indicative of movement and position of the rotating member. A magneto-optical material, such as a bismuth garnet iron (B.I.G.) crystal, having discrete magnetic domains is positioned in the vicinity of the tone ring so that the domains align themselves to the magnetic field generated by the tone ring. A single fiber optic cable, preferably single mode fiber, carries light generated by a source of light to the B.I.G. crystal. The light passes through the B.I.G. crystal and is refracted at domain boundaries in the crystal. The intensity of the refracted light is indicative of the amount of alignment of the domains and therefore the strength of the magnetic field. The refracted light is carried by the fiber optic cable to an optic receiver where the intensity is measured and an electrical signal is generated and sent to a controller indicating the frequency of the changes in light intensity and therefore the rotational speed of the rotating wheel bearing.

  10. The role of the total entropy production in dynamics of open quantum systems in detection of non-Markovianity

    E-Print Network [OSTI]

    S. Salimi; S. Haseli; A. S. Khorashad

    2015-04-19

    In the theory of open quantum systems interaction is a fundamental concepts in the review of the dynamics of open quantum systems. Correlation, both classical and quantum one, is generated due to interaction between system and environment. Here, we recall the quantity which well known as total entropy production. Appearance of total entropy production is due to the entanglement production between system an environment. In this work, we discuss about the role of the total entropy production for detecting non-Markovianity. By utilizing the relation between total entropy production and total correlation between subsystems, one can see a temporary decrease of total entropy production is a signature of non-Markovianity.

  11. Oil and gas exploration system and method for detecting trace amounts of hydrocarbon gases in the atmosphere

    DOE Patents [OSTI]

    Wamsley, Paula R. (Littleton, CO); Weimer, Carl S. (Littleton, CO); Nelson, Loren D. (Evergreen, CO); O'Brien, Martin J. (Pine, CO)

    2003-01-01

    An oil and gas exploration system and method for land and airborne operations, the system and method used for locating subsurface hydrocarbon deposits based upon a remote detection of trace amounts of gases in the atmosphere. The detection of one or more target gases in the atmosphere is used to indicate a possible subsurface oil and gas deposit. By mapping a plurality of gas targets over a selected survey area, the survey area can be analyzed for measurable concentration anomalies. The anomalies are interpreted along with other exploration data to evaluate the value of an underground deposit. The system includes a differential absorption lidar (DIAL) system with a spectroscopic grade laser light and a light detector. The laser light is continuously tunable in a mid-infrared range, 2 to 5 micrometers, for choosing appropriate wavelengths to measure different gases and avoid absorption bands of interference gases. The laser light has sufficient optical energy to measure atmospheric concentrations of a gas over a path as long as a mile and greater. The detection of the gas is based on optical absorption measurements at specific wavelengths in the open atmosphere. Light that is detected using the light detector contains an absorption signature acquired as the light travels through the atmosphere from the laser source and back to the light detector. The absorption signature of each gas is processed and then analyzed to determine if a potential anomaly exists.

  12. Development of an Automated Fault Detection and Diagnostic Tool for Unitary HVAC Systems at Industrial Energy Audits 

    E-Print Network [OSTI]

    Parikh, Priyam

    2014-10-30

    their repair with a monetary value without the use of a quick tool. Existing methods and tools require system specific models or manufacturer’s map models that are not easily available to energy auditors. The proposed automated fault detection and diagnostic...

  13. SMARTx: An Embedded Proximity Detection System for Reducing CS4000: Individual Studies in Computer Science -SMARTx: Software and

    E-Print Network [OSTI]

    Lim, Sunho

    detection, we explored development with the use of Arduino boards and compatible sensors. We spend many hours learning how to set up and program our Arduino Uno boards and sensors. It was a great learning we had created a server/client Arduino based system that notified a user when each device was within

  14. Exploring the effects of a factory-type test-bed on a painted slate defect detection system.

    E-Print Network [OSTI]

    Whelan, Paul F.

    conveyor and operating at production line speeds. Laboratory test bed proven image sensing methods to detect visual defects on painted slates using an automated visual inspection system. The inspection work by a manufacturing environment. We describe the production prototype built to replicate factory conditions including

  15. Detection technique and front-end RF tunable filter for cognitive radio systems

    E-Print Network [OSTI]

    Park, Sanghoon

    2010-01-01

    73–80]: Microelectromechanical systems (MEMS) is theSAW), microelectromechanical systems (MEMS), or distributed

  16. Test-Bed of a Real Time Detection System for L/H & H/L Transitions Implemented with the ITMS Platform

    E-Print Network [OSTI]

    Test-Bed of a Real Time Detection System for L/H & H/L Transitions Implemented with the ITMS Platform

  17. Analytical model of surface uplift above axisymmetric flat-lying magma intrusions: Implications for sill emplacement and geodesy

    E-Print Network [OSTI]

    Scheibert, Julien

    Analytical model of surface uplift above axisymmetric flat-lying magma intrusions: Implications model of surface uplift upon sills and laccoliths, based on the formulation of a thin bending plate formulation, our model accounts for (i) axi-symmetrical uplift, (ii) both upon and outside the intrusion

  18. The Anopheles punctulatus complex: DNA probes for identifying the Australian species using isotopic, chromogenic, and chemiluminescence detection systems

    SciTech Connect (OSTI)

    Cooper, L.; Cooper, R.D.; Burkot, T.R. )

    1991-07-01

    Isotopic and enzyme-labeled species-specific DNA probes were made for the three known members of the Anopheles punctulatus complex of mosquitoes in Australia (Anopheles farauti Nos. 1, 2, and 3). Species-specific probes were selected by screening total genomic libraries made from the DNA of individual species with 32P-labeled DNA of homologous and heterologous mosquito species. The 32P-labeled probes for A. farauti Nos. 1 and 2 can detect less than 0.2 ng of DNA while the 32P-labeled probe for A. farauti No. 3 has a sensitivity of 1.25 ng of DNA. Probes were then enzyme labeled for chromogenic and chemiluminescence detection and compared to isotopic detection using 32P-labeled probes. Sequences of the probe repeat regions are presented. Species identifications can be made from dot blots or squashes of freshly killed mosquitoes or mosquitoes stored frozen, dried, and held at room temperature or fixed in isopropanol or ethanol with isotopic, chromogenic, or chemiluminescence detection systems. The use of nonisotopic detection systems will enable laboratories with minimal facilities to identify important regional vectors.

  19. Method of analyzing multiple sample simultaneously by detecting absorption and systems for use in such a method

    DOE Patents [OSTI]

    Yeung, Edward S.; Gong, Xiaoyi

    2004-09-07

    The present invention provides a method of analyzing multiple samples simultaneously by absorption detection. The method comprises: (i) providing a planar array of multiple containers, each of which contains a sample comprising at least one absorbing species, (ii) irradiating the planar array of multiple containers with a light source and (iii) detecting absorption of light with a detetion means that is in line with the light source at a distance of at leaat about 10 times a cross-sectional distance of a container in the planar array of multiple containers. The absorption of light by a sample indicates the presence of an absorbing species in it. The method can further comprise: (iv) measuring the amount of absorption of light detected in (iii) indicating the amount of the absorbing species in the sample. Also provided by the present invention is a system for use in the abov metho.The system comprises; (i) a light source comrnpising or consisting essentially of at leaat one wavelength of light, the absorption of which is to be detected, (ii) a planar array of multiple containers, and (iii) a detection means that is in line with the light source and is positioned in line with and parallel to the planar array of multiple contiainers at a distance of at least about 10 times a cross-sectional distance of a container.

  20. Geophex Airborne Unmanned Survey System

    SciTech Connect (OSTI)

    Won, I.L.; Keiswetter, D.

    1995-12-31

    Ground-based surveys place personnel at risk due to the proximity of buried unexploded ordnance (UXO) items or by exposure to radioactive materials and hazardous chemicals. The purpose of this effort is to design, construct, and evaluate a portable, remotely-piloted, airborne, geophysical survey system. This non-intrusive system will provide stand-off capability to conduct surveys and detect buried objects, structures, and conditions of interest at hazardous locations. During a survey, the operators remain remote from, but within visual distance of, the site. The sensor system never contacts the Earth, but can be positioned near the ground so that weak geophysical anomalies can be detected. The Geophex Airborne Unmanned Survey System (GAUSS) is designed to detect and locate small-scale anomalies at hazardous sites using magnetic and electromagnetic survey techniques. The system consists of a remotely-piloted, radio-controlled, model helicopter (RCH) with flight computer, light-weight geophysical sensors, an electronic positioning system, a data telemetry system, and a computer base-station. The report describes GAUSS and its test results.

  1. DETECTABILITY OF EARTH-LIKE PLANETS IN CIRCUMSTELLAR HABITABLE ZONES OF BINARY STAR SYSTEMS WITH SUN-LIKE COMPONENTS

    SciTech Connect (OSTI)

    Eggl, Siegfried; Pilat-Lohinger, Elke; Haghighipour, Nader

    2013-02-20

    Given the considerable percentage of stars that are members of binaries or stellar multiples in the solar neighborhood, it is expected that many of these binaries host planets, possibly even habitable ones. The discovery of a terrestrial planet in the {alpha} Centauri system supports this notion. Due to the potentially strong gravitational interaction that an Earth-like planet may experience in such systems, classical approaches to determining habitable zones (HZ), especially in close S-type binary systems, can be rather inaccurate. Recent progress in this field, however, allows us to identify regions around the star permitting permanent habitability. While the discovery of {alpha} Cen Bb has shown that terrestrial planets can be detected in solar-type binary stars using current observational facilities, it remains to be shown whether this is also the case for Earth analogs in HZs. We provide analytical expressions for the maximum and rms values of radial velocity and astrometric signals, as well as transit probabilities of terrestrial planets in such systems, showing that the dynamical interaction of the second star with the planet may indeed facilitate the planets' detection. As an example, we discuss the detectability of additional Earth-like planets in the averaged, extended, and permanent HZs around both stars of the {alpha} Centauri system.

  2. SiPMs characterization and selection for the DUNE far detector photon detection system

    E-Print Network [OSTI]

    Yujing Sun; Jelena Maricic

    2015-11-15

    The Deep Underground Neutrino Experiment (DUNE) together with the Long Baseline Neutrino Facility (LBNF) hosted at the Fermilab will provide a unique, world-leading program for the exploration of key questions at the forefront of neutrino physics and astrophysics. CP violation in neutrino flavor mixing is one of its most important potential discoveries. Additionally, the experiment will determine the neutrino mass hierarchy and precisely measure the neutrino mixing parameters which may potentially reveal new fundamental symmetries of nature. Moreover, the DUNE is also designed for the observation of nucleon decay and supernova burst neutrinos. The photon detection (PD) system in the DUNE far detector provides trigger for cosmic backgrounds, enhances supernova burst trigger efficiency and improves the energy resolution of the detector. The DUNE adopts the technology of liquid argon time projection chamber (LArTPC) that requires the PD sensors, silicon photomultipliers (SiPM), to be carefully chosen to not only work properly in cryostat, but also meet certain specifications for the life of the experiment. A comprehensive testing of SiPMs in cryostat is necessary since the datasheet provided by the manufactures in the market does not cover this temperature regime. This paper gives the detailed characterization results of SenSL C-Series 60035 SiPMs, including gain, dark count rate (DCR), cross-talk and after-pulse rate. Characteristic studies on SiPMs from other vendors are also discussed in order to avoid any potential problems associated with using a single source. Moreover, the results of the ongoing mechanical durability tests are shown for the current candidate, SenSL B/C-Series 60035 SiPMs.

  3. A hybrid system for fault detection and sensor fusion based on fuzzy clustering and artificial immune systems 

    E-Print Network [OSTI]

    Jaradat, Mohammad Abdel Kareem Rasheed

    2007-04-25

    In this study, an efficient new hybrid approach for multiple sensors data fusion and fault detection is presented, addressing the problem with possible multiple faults, which is based on conventional fuzzy soft clustering and artificial immune...

  4. Neutrino Solar Flare detection for a saving alert system of satellites and astronauts

    E-Print Network [OSTI]

    Daniele Fargion

    2011-06-19

    Largest Solar Neutrino Flare may be soon detectable by Deep Core neutrino detector immediately and comunicate to satellites or astronauts. Its detection is the fastest manifestation of a later (tens minutes,hours) dangerous cosmic shower. The precursor trigger maybe saving satellites and even long flight astronauts lives. We shall suggest how. Moreover their detection may probe the inner solar flare acceleration place as well as the neutrino flavor mixing in a new different parameter windows. We show the updated expected rate and signature of neutrinos and antineutrinos in largest solar flare for present tens Megaton Deep Core telescope at tens Gev range. Speculation for additional Icecube gigaton array signals are also considered.

  5. Does sea-level rise have an impact on saltwater intrusion? Sun Woo Chang a

    E-Print Network [OSTI]

    Clement, Prabhakar

    of the major environmental issues faced by several coastal cit- ies in India, China, and Mexico [3Does sea-level rise have an impact on saltwater intrusion? Sun Woo Chang a , T. Prabhakar Clement a and Environmental Science, Seoul National University, Seoul 151-742, Republic of Korea a r t i c l e i n f o Article

  6. doi:10.1038/nature04507 Uplift, Thermal Unrest, and Magma Intrusion at

    E-Print Network [OSTI]

    doi:10.1038/nature04507 1 Uplift, Thermal Unrest, and Magma Intrusion at Yellowstone Caldera the last eruption, Yellowstone has remained restless, with high seismicity, continuing uplift infer that the observed pattern of uplift and subsidence results from variations in the movement

  7. Modeling and Verification of Leaders Agreement in the IntrusionTolerant Enclaves Using PVS

    E-Print Network [OSTI]

    Tahar, Sofiène

    Modeling and Verification of Leaders Agreement in the Intrusion­Tolerant Enclaves Using PVS Mohamed issue in formal verification. It arises the problem of how much power should be given to a Byzantine Layouni 1 , Jozef Hooman 2 , and Sofiâ?? ene Tahar 1 1 Department of Electrical and Computer Engineering

  8. Modeling and Verification of Leaders Agreement in the Intrusion-Tolerant Enclaves Using PVS

    E-Print Network [OSTI]

    Tahar, Sofiène

    Modeling and Verification of Leaders Agreement in the Intrusion-Tolerant Enclaves Using PVS Mohamed]. Modeling Byzantine behavior has been always a big issue in formal verification. It arises the problem of how much power should be given to a Byzantine fault and how general the model should be to

  9. Magnetic reconnection as a source of jets from a penumbral intrusion into a sunspot umbra

    E-Print Network [OSTI]

    Bharti, L; Hirzberger, J

    2015-01-01

    We present the results of high resolution co-temporal and co-spatial photospheric and chromospheric observations of sunspot penumbral intrusions. The data was taken with the Swedish Solar Telescope (SST) on the Canary Islands. Time series of Ca\\,II H images show a series of transient jets extending roughly 3000 km above a penumbral intrusion into the umbra. For most of the time series jets were seen along the whole length of the intruding bright filament. Some of these jets develop a clear $\\lambda$-shaped structure, with a small loop appearing at their footpoint and lasting for around a minute. In the framework of earlier studies, the observed transient $\\lambda$ shape of these jets strongly suggests that they are caused by magnetic reconnection between a curved arcade-like or flux-rope like field in the lower part of the penumbral intrusion and the more vertical umbral magnetic field forming a cusp-shaped structure above the penumbral intrusion.

  10. A Comparison of Fault Detection Methods For a Transcritical Refrigeration System 

    E-Print Network [OSTI]

    Janecke, Alex Karl

    2012-10-19

    pairings of four faults: over/undercharge, evaporator fouling, gas cooler fouling, and compressor valve leakage. This technique allows for low cost measurement and independent detection of individual faults even when multiple faults are present. Results...

  11. A multisensor system for detection and characterization of UXO (MM-0437) - Demonstration Report

    E-Print Network [OSTI]

    Gasperikova, Erika; Smith, J.T.; Morrison, H.F.; Becker, A.

    2006-01-01

    AND CHARACTERIZATION OF UXO MM-0437 SITE LOCATION: U.S. ARMYwas designed to detect and characterize UXO in the 20 mm to155 mm size range for depths between 0 and 1 m. The

  12. A Multisensor system for the detection and characterization of UXO MM-0437

    E-Print Network [OSTI]

    Gasperikova, Erika; Becker, A.; Morrison, H.F.; Smith, J.T.

    2006-01-01

    AND CHARACTERIZATION OF UXO MM-0437 SITE LOCATION: U.S. ARMYwas designed to detect and characterize UXO in the 20 mm to155 mm size range for depths between 0 and 1 m. The

  13. Towards the development of an explosives detection system using Neutron Resonance Radiography

    E-Print Network [OSTI]

    Raas, Whitney

    2007-01-01

    Detection of conventional explosives remains a challenge to air security, as indicated by recent reports detailing lapses in security screening and new requirements that mandate screening 100% of checked luggage. Neutron ...

  14. Detection of Explosives Using a Micro-cantilever Array Nano-Calorimeter System 

    E-Print Network [OSTI]

    Lane, Matthew

    2011-08-08

    Over the past few decades, the likeliness of an attack from explosives has increased dramatically. Hence, the need to find a reliable device with the ability to detect explosives has increased even more. Sensing schemes ...

  15. An automated system to detect flash floods and alert at-risk communities

    E-Print Network [OSTI]

    Weaver, Joshua A., 1978-

    2005-01-01

    This thesis describes an automated monitoring station designed to detect flash floods occurring in the Rio Aguan river basin, Honduras. An Atmel microcontroller polls a series of sensors in the river, logging all data for ...

  16. A system for the detection of concealed nuclear weapons and fissile material aboard cargo cotainerships

    E-Print Network [OSTI]

    Gallagher, Shawn P., S.M. Massachusetts Institute of Technology

    2005-01-01

    A new approach to the detection of concealed nuclear weapons and fissile material aboard cargo containerships is proposed. The ship-based approach removes the constraints of current thinking by addressing the threat of ...

  17. Piezoelectric-based in-situ damage detection of composite materials for structural health monitoring systems

    E-Print Network [OSTI]

    Kessler, Seth Stovack, 1977-

    2002-01-01

    Cost-effective and reliable damage detection is critical for the utilization of composite materials. This thesis presents the conclusions of an analytical and experimental survey of candidate methods for in-situ damage ...

  18. Detection and Analysis of Threats to the Energy Sector: DATES

    SciTech Connect (OSTI)

    Alfonso Valdes

    2010-03-31

    This report summarizes Detection and Analysis of Threats to the Energy Sector (DATES), a project sponsored by the United States Department of Energy and performed by a team led by SRI International, with collaboration from Sandia National Laboratories, ArcSight, Inc., and Invensys Process Systems. DATES sought to advance the state of the practice in intrusion detection and situational awareness with respect to cyber attacks in energy systems. This was achieved through adaptation of detection algorithms for process systems as well as development of novel anomaly detection techniques suited for such systems into a detection suite. These detection components, together with third-party commercial security systems, were interfaced with the commercial Security Information Event Management (SIEM) solution from ArcSight. The efficacy of the integrated solution was demonstrated on two testbeds, one based on a Distributed Control System (DCS) from Invensys, and the other based on the Virtual Control System Environment (VCSE) from Sandia. These achievements advance the DOE Cybersecurity Roadmap [DOE2006] goals in the area of security monitoring. The project ran from October 2007 until March 2010, with the final six months focused on experimentation. In the validation phase, team members from SRI and Sandia coupled the two test environments and carried out a number of distributed and cross-site attacks against various points in one or both testbeds. Alert messages from the distributed, heterogeneous detection components were correlated using the ArcSight SIEM platform, providing within-site and cross-site views of the attacks. In particular, the team demonstrated detection and visualization of network zone traversal and denial-of-service attacks. These capabilities were presented to the DistribuTech Conference and Exhibition in March 2010. The project was hampered by interruption of funding due to continuing resolution issues and agreement on cost share for four months in 2008. This resulted in delays in finalizing agreements with commercial partners, and in particular the Invensys testbed was not installed until December 2008 (as opposed to the March 2008 plan). The project resulted in a number of conference presentations and publications, and was well received when presented at industry forums. In spite of some interest on the part of the utility sector, we were unfortunately not able to engage a utility for a full-scale pilot deployment.

  19. Efficient Detection on Stochastic Faults in PLC Based Automated Assembly Systems With Novel Sensor Deployment and Diagnoser Design 

    E-Print Network [OSTI]

    Wu, Zhenhua

    2012-07-16

    Directed Graph SDG Signed Directed Graph GA Genetic Algorithm SA Simulated Annealing TS Tabu Search IP Integer Programming DP Dynamic Programming MINLP Mixed Integer Nonlinear Programming FMEA Failure Mode Effect Analysis AHP Analytical Hierarchy... and target multiple objectives; 2) design a Petri net (PN) diagnoser for detecting stochastic faults in realtime; and 3) evaluate the proposed sensor deployment and diagnoser in a PLC controlled manufacturing system. FMEA Sensor Deployment Model...

  20. Analysis of Computer Intrusions Using Sequences of Function Calls

    E-Print Network [OSTI]

    Peisert, Sean; Bishop, Matt; Karin, Sidney; Marzullo, Keith

    2007-01-01

    Planning Study,” Technical Report ESD-TR-73-51, vol. II,Systems (RISOS),” technical report, Lawrence Liver- moreFinal Report (PA),” technical report, Information Sciences

  1. A Prototype PCI-based Data Acquisition System for Cosmic Ray Detection Below 10^18 eV

    E-Print Network [OSTI]

    Ben-Zvi, S Y; Bán, J; Sippach, W

    2006-01-01

    A prototype flash analog-to-digital readout system for cosmic ray detection at energies below 10^18 eV has been designed and tested at Columbia University Nevis Laboratories. The electronics consist of an FADC module that digitizes 16 photomultipliers at 40 MHz with 14-bit dynamic range. The module is read out to a PC (running Linux) through a PCI interface. Taking advantage of the large bandwidth provided by the PCI bus, we have implemented a software-based data acquisition system. This note describes the software and electronics, as well as preliminary tests carried out using a prototype FADC module.

  2. A Prototype PCI-based Data Acquisition System for Cosmic Ray Detection Below 10^18 eV

    E-Print Network [OSTI]

    S. BenZvi; S. Westerhoff; J. Ban; W. Sippach

    2006-03-28

    A prototype flash analog-to-digital readout system for cosmic ray detection at energies below 10^18 eV has been designed and tested at Columbia University Nevis Laboratories. The electronics consist of an FADC module that digitizes 16 photomultipliers at 40 MHz with 14-bit dynamic range. The module is read out to a PC (running Linux) through a PCI interface. Taking advantage of the large bandwidth provided by the PCI bus, we have implemented a software-based data acquisition system. This note describes the software and electronics, as well as preliminary tests carried out using a prototype FADC module.

  3. System for detecting operating errors in a variable valve timing engine using pressure sensors

    DOE Patents [OSTI]

    Wiles, Matthew A.; Marriot, Craig D

    2013-07-02

    A method and control module includes a pressure sensor data comparison module that compares measured pressure volume signal segments to ideal pressure volume segments. A valve actuation hardware remedy module performs a hardware remedy in response to comparing the measured pressure volume signal segments to the ideal pressure volume segments when a valve actuation hardware failure is detected.

  4. MACHINE LEARNING SYSTEMS FOR DETECTING DRIVER DROWSINESS Esra Vural, Mjdat etin, Aytl Eril

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    closure, and yawning. Here we employ machine learning to data-mine actual human behavior during drowsiness. Moreover, the analysis revealed new information about human behavior during drowsy driv- ing. 1 to drowsiness detection primarily make pre-assumptions about the relevant behavior, focusing on blink rate, eye

  5. Measurement to Error Stability: a Notion of Partial Detectability for Nonlinear Systems

    E-Print Network [OSTI]

    Sontag, Eduardo

    - research completed while the author was at Rutgers University, supported in part by US Air Force Grant F49620-98-1-0242 Supported in part by US Air Force Grant F49620-01- 1-0063 Supported in part by NSF Grant properly de- scribed as zero-detectability). The paper [23] contains a discussion of various definitions

  6. Opportunities for Decay Counting of Environmental Radioisotopes Using Ultra-low-background Detection Systems

    SciTech Connect (OSTI)

    Runkle, Robert C.; Aalseth, Craig E.; Bailey, Vanessa L.; Bonicalzi, Ricco; Moran, James J.; Seifert, Allen; Warren, Glen A.

    2012-08-01

    Executive Summary We present results from a scoping study whose intent was to define challenge measurements to be pursued on the Ultra-Sensitive Nuclear Measurements Initiative. Potential challenge measurements using new radiation detection technology in the shallow underground laboratory that would have substantial impact in environmental science were the focus of this study.

  7. Systems and methods of monitoring acoustic pressure to detect a flame condition in a gas turbine

    DOE Patents [OSTI]

    Ziminsky, Willy Steve (Simpsonville, SC); Krull, Anthony Wayne (Anderson, SC); Healy, Timothy Andrew (Simpsonville, SC), Yilmaz, Ertan (Glenville, NY)

    2011-05-17

    A method may detect a flashback condition in a fuel nozzle of a combustor. The method may include obtaining a current acoustic pressure signal from the combustor, analyzing the current acoustic pressure signal to determine current operating frequency information for the combustor, and indicating that the flashback condition exists based at least in part on the current operating frequency information.

  8. Optimization of Fault Detection/Diagnosis Model for Thermal Storage System Using AIC 

    E-Print Network [OSTI]

    Pan, S.; Zheng, M.; Nakahara, N.

    2006-01-01

    of the event. In addition, human learning, recognition, and optimal judgment process of any event can be simulated by optimizing the most effective pa-rameters and their numbers for detection and diagnosis by the use of variable selection method. In previous...

  9. Excitation, detection, and electrostatic manipulation of terahertz-frequency range plasmons in a two-dimensional electron system

    E-Print Network [OSTI]

    Wu, Jingbo; Wood, Christopher D; Mistry, Divyang; Li, Lianhe; Muchenje, Wilson; Rosamond, Mark C; Chen, Li; Linfield, Edmund H; Davies, A Giles; Cunningham, John E

    2015-01-01

    Terahertz time domain spectroscopy employing free-space radiation has frequently been used to probe the elementary excitations of low-dimensional systems. The diffraction limit blocks its use for the in-plane study of individual laterally defined nanostructures, however. Here, we demonstrate a planar terahertz-frequency plasmonic circuit in which photoconductive material is monolithically integrated with a two-dimensional electron system. Plasmons with a broad spectral range (up to ~400 GHz) are excited by injecting picosecond-duration pulses, generated and detected by a photoconductive semiconductor, into a high mobility two-dimensional electron system. Using voltage modulation of a Schottky gate overlying the two-dimensional electron system, we form a tuneable plasmonic cavity, and observe electrostatic manipulation of the plasmon resonances. Our technique offers a direct route to access the picosecond dynamics of confined transport in a broad range of lateral nanostructures.

  10. First Detection of NaI D lines in High-Redshift Damped Lyman-alpha Systems

    E-Print Network [OSTI]

    Sohei Kondo; Naoto Kobayashi; Yosuke Minowa; Takuji Tsujimoto; Christopher W. Churchill; Naruhisa Takato; Masanori Iye; Yukiko Kamata; Hiroshi Terada; Tae-Soo Pyo; Hideki Takami; Yutaka Hayano; Tomio Kanzawa; D. Saint-Jacques; Wolfgang Gaessler; Shin Oya; Ko Nedachi; Alan Tokunaga

    2006-03-12

    A Near-infrared (1.18-1.35 micron) high-resolution spectrum of the gravitationally-lensed QSO APM 08279+5255 was obtained with the IRCS mounted on the Subaru Telescope using the AO system. We detected strong NaI D 5891,5897 doublet absorption in high-redshift DLAs at z=1.062 and 1.181, confirming the presence of NaI, which was first reported for the rest-frame UV NaI 3303.3,3303.9 doublet by Petitjean et al. This is the first detection of NaI D absorption in a high-redshift (z>1) DLA. In addition, we detected a new NaI component in the z=1.062 DLA and four new components in the z=1.181 DLA. Using an empirical relationship between NaI and HI column density, we found that all "components" have large HI column density, so that each component is classified as DLA absorption. We also detected strong NaI D absorption associated with a MgII system at z=1.173. Because no other metal absorption lines were detected in this system at the velocity of the NaI absorption in previously reported optical spectra (observed 3.6 years ago), we interpret this NaI absorption cloud probably appeared in the line of sight toward the QSO after the optical observation. This newly found cloud is likely to be a DLA based upon its large estimated HI column density. We found that the N(NaI)/N(CaII) ratios in these DLAs are systematically smaller than those observed in the Galaxy; they are more consistent with the ratios seen in the Large Magellanic Cloud. This is consistent with dust depletion generally being smaller in lower metallicity environments. However, all five clouds of the z=1.181 system have a high N(NaI)/N(CaII) ratio, which is characteristic of cold dense gas. We tentatively suggest that the host galaxy of this system may be the most significant contributor to the gravitational-lens toward APM 08279+5255.

  11. A Cabled Acoustic Telemetry System for Detecting and Tracking Juvenile Salmon: Part 2. Three-Dimensional Tracking and Passage Outcomes

    SciTech Connect (OSTI)

    Deng, Zhiqun; Weiland, Mark A.; Fu, Tao; Seim, Thomas A.; Lamarche, Brian L.; Choi, Eric Y.; Carlson, Thomas J.; Eppard, Matthew B.

    2011-05-26

    In Part 1 of this paper [1], we presented the engineering design and instrumentation of the Juvenile Salmon Acoustic Telemetry System (JSATS) cabled system, a nonproprietary technology developed by the U.S. Army Corps of Engineers, Portland District, to meet the needs for monitoring the survival of juvenile salmonids through the 31 dams in the Federal Columbia River Power System. Here in Part 2, we describe how the JSATS cabled system was employed as a reference sensor network for detecting and tracking juvenile salmon. Time-of-arrival data for valid detections on four hydrophones were used to solve for the three-dimensional (3D) position of fish surgically implanted with JSATS acoustic transmitters. Validation tests demonstrated high accuracy of 3D tracking up to 100 m from the John Day Dam spillway. The along-dam component, used for assigning the route of fish passage, had the highest accuracy; the median errors ranged from 0.06 to 0.22 m, and root mean square errors ranged from 0.05 to 0.56 m at distances up to 100 m. For the case study at John Day Dam during 2008, the range for 3D tracking was more than 100 m upstream of the dam face where hydrophones were deployed, and detection and tracking probabilities of fish tagged with JSATS acoustic transmitters were higher than 98%. JSATS cabled systems have been successfully deployed on several major dams to acquire information for salmon protection and for development of more “fish-friendly” hydroelectric facilities.

  12. Improving shipboard maintenance practices using non-intrusive load monitoring

    E-Print Network [OSTI]

    Piber, Mark A. (Mark Augustin)

    2007-01-01

    (cont.) New casualty parameters were recorded and analyzed in an attempt to verify and expand on diagnostic software currently being developed for the vacuum aided sewage collection system. The analysis of the ships service ...

  13. Title: Evaluation of Hydraulic Transients and Damage Detection in Water System under a Disaster Event

    E-Print Network [OSTI]

    Shinozuka, Masanobu

    of the SCADA (Supervisory Control and Data Acquisition) system. Current generation of SCADA system] which identified future development of SCADA as one of the most critical agenda items for enhanced

  14. Development of a modular directional and spectral neutron detection system using solid-state detectors

    E-Print Network [OSTI]

    Danon, Yaron

    resolution. The system used in this paper was comprised of a stack of five high-density polyethylene (HDPE was HDPE moderated, HDPE reflected, lead (Pb) shielded, and bare in order to benchmark the system

  15. System and method for the detection of anomalies in an image

    SciTech Connect (OSTI)

    Prasad, Lakshman; Swaminarayan, Sriram

    2013-09-03

    Preferred aspects of the present invention can include receiving a digital image at a processor; segmenting the digital image into a hierarchy of feature layers comprising one or more fine-scale features defining a foreground object embedded in one or more coarser-scale features defining a background to the one or more fine-scale features in the segmentation hierarchy; detecting a first fine-scale foreground feature as an anomaly with respect to a first background feature within which it is embedded; and constructing an anomalous feature layer by synthesizing spatially contiguous anomalous fine-scale features. Additional preferred aspects of the present invention can include detecting non-pervasive changes between sets of images in response at least in part to one or more difference images between the sets of images.

  16. Results of the Development of Humanitarian Landmine Detection System by a Compact Fusion Neutron Source and Dual Sensors

    SciTech Connect (OSTI)

    Yoshikawa, Kiyoshi; Masuda, Kai; Takamatsu, Teruhisa; Yamamoto, Yasushi; Toku, Hisayuki; Fujimoto, Takashi [Institute of Advanced Energy, Kyoto University, Gokasho, Uji, Kyoto 611-0011 (Japan); Hotta, Eiki; Yamauchi, Kunihito [Department of Energy Sciences, Tokyo Institute of Technology, 4259-G3-36 Nagatsuda-cho, Midori-ku, Yokohama, Kanagawa 226-8502 (Japan); Ohnishi, Masami; Osawa, Hodaka [Department of Electrical Engineering, Kansai University, 3-3-35 Yamate-cho, Suita, Osaka 564-8680 (Japan); Shiroya, Seiji; Misawa, Tsuyoshi; Takahashi, Yoshiyuki [Research Reactor Institute, Kyoto University, Kumatori-cho, Sennan-gun, Osaka 590-0494 (Japan); Kubo, Yoshikazu; Doi, Toshiro [JGC Corporation, Minato-Mirai, Nishi-ku, Yokohama, Kanagawa (Japan)

    2009-03-10

    A 5-year task is described on the research and development of the advanced humanitarian landmine detection system by using a compact discharge-type fusion neutron source called IECF (Inertial-Electrostatic Confinement Fusion) device and 3 dual sensors made of BGO and NaI(Tl). With 10{sup 7} D-D neutrons/s stably produced in steady-state mode, H-2.2 MeV, N-5.3, 10.8 MeV {gamma} rays from (n,{gamma}) reaction with hydrogen and nitrogen atoms in the explosives are measured for two kinds of explosives (TNT, RDX), under the conditions of three different buried depths, and soil moistures each. Final probabilities of detection for arid soil are found to be 100% in the present tests. The neutron backscattering method is also found to be efficient.

  17. Anomaly Detection for Resilient Control Systems Using Fuzzy-Neural Data Fusion Engine

    SciTech Connect (OSTI)

    Ondrej Linda; Milos Manic; Timothy R. McJunkin

    2011-08-01

    Resilient control systems in critical infrastructures require increased cyber-security and state-awareness. One of the necessary conditions for achieving the desired high level of resiliency is timely reporting and understanding of the status and behavioral trends of the control system. This paper describes the design and development of a neural-network based data-fusion system for increased state-awareness of resilient control systems. The proposed system consists of a dedicated data-fusion engine for each component of the control system. Each data-fusion engine implements three-layered alarm system consisting of: (1) conventional threshold-based alarms, (2) anomalous behavior detector using self-organizing maps, and (3) prediction error based alarms using neural network based signal forecasting. The proposed system was integrated with a model of the Idaho National Laboratory Hytest facility, which is a testing facility for hybrid energy systems. Experimental results demonstrate that the implemented data fusion system provides timely plant performance monitoring and cyber-state reporting.

  18. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    SciTech Connect (OSTI)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  19. Thermal Attacks on Storage Systems Nathanael Paul Sudhanva Gurumurthi David Evans

    E-Print Network [OSTI]

    Gurumurthi, Sudhanva

    Thermal Attacks on Storage Systems Nathanael Paul Sudhanva Gurumurthi David Evans University thermal management alternative. Keywords: storage systems, security, thermal management, denial shut-down. Our new thermal attack on future storage systems is unrecognized by current Intrusion

  20. Uniaxial creep as a control on mercury intrusion capillary pressure in consolidating rock salt

    SciTech Connect (OSTI)

    Dewers, Thomas; Heath, Jason E.; Leigh, Christi D.

    2015-09-01

    The nature of geologic disposal of nuclear waste in salt formations requires validated and verified two - phase flow models of transport of brine and gas through intact, damaged, and consolidating crushed salt. Such models exist in oth er realms of subsurface engineering for other lithologic classes (oil and gas, carbon sequestration etc. for clastics and carbonates) but have never been experimentally validated and parameterized for salt repository scenarios or performance assessment. Mo dels for waste release scenarios in salt back - fill require phenomenological expressions for capillary pressure and relative permeability that are expected to change with degree of consolidation, and require experimental measurement to parameterize and vali date. This report describes a preliminary assessment of the influence of consolidation (i.e. volume strain or porosity) on capillary entry pressure in two phase systems using mercury injection capillary pressure (MICP). This is to both determine the potent ial usefulness of the mercury intrusion porosimetry method, but also to enable a better experimental design for these tests. Salt consolidation experiments are performed using novel titanium oedometers, or uniaxial compression cells often used in soil mech anics, using sieved run - of - mine salt from the Waste Isolation Pilot Plant (WIPP) as starting material. Twelve tests are performed with various starting amounts of brine pore saturation, with axial stresses up to 6.2 MPa (%7E900 psi) and temperatures to 90 o C. This corresponds to UFD Work Package 15SN08180211 milestone "FY:15 Transport Properties of Run - of - Mine Salt Backfill - Unconsolidated to Consolidated". Samples exposed to uniaxial compression undergo time - dependent consolidation, or creep, to various deg rees. Creep volume strain - time relations obey simple log - time behavior through the range of porosities (%7E50 to 2% as measured); creep strain rate increases with temperature and applied stress as expected. Mercury porosimetry is used to determine characteri stic capillary pressure curves from a series of consolidation tests and show characteristic saturation - capillary pressure curves that follow the common van Genuchten (1978, 1980) formulation at low stresses. Higher capillary pressure data are suspect due t o the large potential for sample damage, including fluid inclusion decrepitation and pore collapse. Data are supportive of use of the Leverett "J" function (Leverett, 1941) to use for scaling characteristic curves at different degrees of consolidation, but better permeability determinations are needed to support this hypothesis. Recommendations for further and refined testing are made with the goal of developing a self - consistent set of constitutive laws for granular salt consolidation and multiphase (brin e - air) flow.

  1. HST/COS detection of deuterated molecular hydrogen in a damped Ly? system at z = 0.18

    SciTech Connect (OSTI)

    Oliveira, Cristina M.; Sembach, Kenneth R.; Tumlinson, Jason; Thom, Christopher [Space Telescope Science Institute, Baltimore, MD 21218 (United States); O'Meara, John, E-mail: oliveira@stsci.edu [Saint Michael's College, Colchester, VT 05439 (United States)

    2014-03-01

    We report on the detection of deuterated molecular hydrogen, HD, at z = 0.18. HD and H{sub 2} are detected in HST/COS data of a low-metallicity (Z ? 0.07 Z {sub ?}) damped Ly? (DLA) system at z = 0.18562 toward QSO B0120–28, with log N(H I) = 20.50 ± 0.10. Four absorption components are clearly resolved in H{sub 2}, while two components are resolved in HD; the bulk of the molecular hydrogen is associated with the components traced by HD. We find total column densities log N(HD) = 14.82 ± 0.15 and log N(H{sub 2}) = 20.00 ± 0.10. This system has a high molecular fraction, f(H{sub 2}) = 0.39 ± 0.10, and a low HD-to-H{sub 2} ratio, log (HD/2H{sub 2}) = –5.5 ± 0.2 dex. The excitation temperature, T {sub 01} = 65 ± 2 K, in the component containing the bulk of the molecular gas is lower than in other DLAs. These properties are unlike those in other higher redshift DLA systems known to contain HD, but are consistent with what is observed in dense clouds in the Milky Way.

  2. Performance of the moving voxel image reconstruction (MVIR) method in the fixed site detection system (FSDS) prototype

    SciTech Connect (OSTI)

    Estep, Robert J.

    2012-05-31

    We have developed a dynamic image reconstruction method called MVIR (Moving Voxel Image Reconstruction) for lane detection in multilane portal monitor systems. MVIR was evaluated for use in the Fixed Site Detection System, a prototype three-lane portal monitor system for EZ-pass toll plazas. As a baseline, we compared MVIR with a static image reconstruction method in analyzing the same real and simulated data sets. Performance was judged by the distributions of image intensities for source and no-source vehicles over many trials as a function of source strength. We found that MVIR produced significantly better results in all cases. The performance difference was greatest at low count rates, where source/no-source distributions were well separated with the MVIR method, allowing reliable source vehicle identification with a low probability of false positive identifications. Static reconstruction of the same data produced overlapping distributions that made source vehicle identification unreliable. The performance of the static method was acceptable at high count rates. Both algorithms reliably identified two strong sources passing through at nearly the same time.

  3. The use of protective barriers to deter inadvertent human intrusion into a mined geologic facility for the disposal of radioactive waste: A review of previous investigations and potential concepts

    SciTech Connect (OSTI)

    Tolan, T.L. [Tolan, Beeson and Associates, Kennewick, WA (United States)

    1993-06-01

    Sandia National Laboratories is evaluating the feasibility of developing protective barrier system for the Waste Isolation Pilot Plant (WIPP) to thwart inadvertent human intrusion into this radioactive-waste disposal system for a period of 9,900 years after assumed loss of active institutional controls. The protective barrier system would be part of a series of enduring passive institutional controls whose long-term function will be to reduce the likelihood of inadvertent human activities (e.g., exploratory drilling for resources) that could disrupt the WIPP disposal system.

  4. Forest Fire Advanced System Technology (FFAST): A Conceptual Design for Detection and Mapping

    E-Print Network [OSTI]

    is developing a data system to provide near-real-time forest fire information to fire management at the fire of the Technical Staff, Observational Systems Division. California Institute of Technology, Jet Propulsion for the scanner units were difficult to find and in some cases had to be custom built. The Fire Logistics

  5. FAULT DETECTION IN HVAC SYSTEMS USING MODEL-BASED FEEDFORWARD CONTROL

    E-Print Network [OSTI]

    Diamond, Richard

    the controller with a simulated dual-duct air-handling unit. We also discuss recent experiences of implementing, Comfort/Energy, Control/Simulation/Field Tests, Air-Conditioning Systems, Feedforward Control, Diagnostics 1 INTRODUCTION Heating, ventilating, and air-conditioning (HVAC) systems are typically controlled

  6. High-speed atomic force microscope based on an astigmatic detection system

    SciTech Connect (OSTI)

    Liao, H.-S.; Chen, Y.-H.; Hwu, E.-T.; Chang, C.-S.; Hwang, I.-S., E-mail: ishwang@phys.sinica.edu.tw [Institute of Physics, Academia Sinica, Nankang, Taipei 11529, Taiwan (China); Ding, R.-F.; Huang, H.-F.; Wang, W.-M. [Institute of Physics, Academia Sinica, Nankang, Taipei 11529, Taiwan (China); Department of Mechanical Engineering, National Taiwan University, Taipei 10617, Taiwan (China); Huang, K.-Y. [Department of Mechanical Engineering, National Taiwan University, Taipei 10617, Taiwan (China)

    2014-10-15

    High-speed atomic force microscopy (HS-AFM) enables visualizing dynamic behaviors of biological molecules under physiological conditions at a temporal resolution of 1s or shorter. A small cantilever with a high resonance frequency is crucial in increasing the scan speed. However, detecting mechanical resonances of small cantilevers is technically challenging. In this study, we constructed an atomic force microscope using a digital versatile disc (DVD) pickup head to detect cantilever deflections. In addition, a flexure-guided scanner and a sinusoidal scan method were implemented. In this work, we imaged a grating sample in air by using a regular cantilever and a small cantilever with a resonance frequency of 5.5 MHz. Poor tracking was seen at the scan rate of 50 line/s when a cantilever for regular AFM imaging was used. Using a small cantilever at the scan rate of 100 line/s revealed no significant degradation in the topographic images. The results indicate that a smaller cantilever can achieve a higher scan rate and superior force sensitivity. This work shows the potential for using a DVD pickup head in future HS-AFM technology.

  7. Integration of functional components into microfluidic chemical systems: bioimmobilization and electrochemiluminescent detection on-chip 

    E-Print Network [OSTI]

    Zhan, Wei

    2005-08-29

    in microfluidic systems. By using microfluidic electrochemical cells based on either two-electrode or bipolar electrode (one-electrode), electroactive species that undergo reduction can be electrically linked to this anodic ECL process and thus be reported...

  8. Multi-sensor Wireless System for Fault Detection in Induction Motors

    E-Print Network [OSTI]

    Tarkesh Esfahani, Ehsan

    2012-01-01

    Industrial Electric Motor Systems Market Opportunities As- sessment,” US DOE, Washington DC, 1998. [6] “California Energyindustrial motors in California consume about 70 billion kWh. 95% of this energy (

  9. Power Quality/Harmonic Detection: Harmonic Control in Electric Power Systems for the Telecommunications Industry 

    E-Print Network [OSTI]

    Felkner, L. J.; Waggoner, R. M.

    1993-01-01

    The control of harmonics in power systems continues to be a major concern in the telecommunications industry. AC/DC telecommunication conversion equipment has rarely been thought of as playing a major role in the harmonic interaction problem. Yet...

  10. Non-invasive Acceleration-based Methodology for Damage Detection and Assessment of Water Distribution System

    E-Print Network [OSTI]

    Shinozuka, Masanobu

    sensor network 1. INTRODUCTION Urban water distribution systems, particularly underground pipeline networks, can be damaged due to earthquake, pipe corrosion, severely cold weather, heavy traffic load include corrosion and aging, excessive surface traffic load- ing, soil failure, etc. For identifying

  11. DAMAGE DETECTION STRATEGIES IN STRUCTURAL HEALTH MONITORING OF OVERHEAD POWER TRANSMISSION SYSTEM

    E-Print Network [OSTI]

    Boyer, Edmond

    " refers to the low voltage part of T&D System that connects substations and consumers' switchgear boxes or underground), insulators, vibration dampers (e.g. Stockbridge type), switchgears and transformers. Due

  12. A digital autopilot simulator and advisory system for detecting off-nominal behavior 

    E-Print Network [OSTI]

    Bae, Han-Wook

    2002-01-01

    This thesis describes the development and the testing of an advisory system for a digital autopilot on the Space Shuttle. A simplified spacecraft attitude control simulator has also been developed and tested using real-time telemetry data...

  13. Experiments and a model of pilot system failure detection during simulated Lunar landing

    E-Print Network [OSTI]

    Kaderka, Justin David

    2014-01-01

    Future complex systems, such as those found in piloted aircraft and spacecraft, will undoubtedly utilize significant automation to enhance pilot capabilities and enable novel mission scenarios. Off-nominal conditions may ...

  14. Method and apparatus for detecting combustion instability in continuous combustion systems

    DOE Patents [OSTI]

    Benson, Kelly J.; Thornton, Jimmy D.; Richards, George A.; Straub, Douglas L.

    2006-08-29

    An apparatus and method to sense the onset of combustion stability is presented. An electrode is positioned in a turbine combustion chamber such that the electrode is exposed to gases in the combustion chamber. A control module applies a voltage potential to the electrode and detects a combustion ionization signal and determines if there is an oscillation in the combustion ionization signal indicative of the occurrence of combustion stability or the onset of combustion instability. A second electrode held in a coplanar but spaced apart manner by an insulating member from the electrode provides a combustion ionization signal to the control module when the first electrode fails. The control module broadcasts a notice if the parameters indicate the combustion process is at the onset of combustion instability or broadcasts an alarm signal if the parameters indicate the combustion process is unstable.

  15. Method to improve reliability of a fuel cell system using low performance cell detection at low power operation

    SciTech Connect (OSTI)

    Choi, Tayoung; Ganapathy, Sriram; Jung, Jaehak; Savage, David R.; Lakshmanan, Balasubramanian; Vecasey, Pamela M.

    2013-04-16

    A system and method for detecting a low performing cell in a fuel cell stack using measured cell voltages. The method includes determining that the fuel cell stack is running, the stack coolant temperature is above a certain temperature and the stack current density is within a relatively low power range. The method further includes calculating the average cell voltage, and determining whether the difference between the average cell voltage and the minimum cell voltage is greater than a predetermined threshold. If the difference between the average cell voltage and the minimum cell voltage is greater than the predetermined threshold and the minimum cell voltage is less than another predetermined threshold, then the method increments a low performing cell timer. A ratio of the low performing cell timer and a system run timer is calculated to identify a low performing cell.

  16. E-Smart System for In-Situ Detection of Environmental Contaminants

    SciTech Connect (OSTI)

    S. Leffler

    2000-03-01

    A team of industrial, academic, and government organizations participated in the development of the Environmental Systems Management, Analysis and Reporting Network (E-SMART). E-SMART integrates diverse monitoring and control technologies by means of a modular, ''building block'' design approach to allow for flexible system configuration. The E-SMART network treats each smart device-whether a sensor, sampler, or actuator- as a black box that obeys the standard communication protocols and electrical interfaces for the network. This approach allows multiple vendors to produce different sensors which meet the same functional specification and which can be interchanged on the network without affecting operation. The project further developed and advanced the E-SMART standardized network protocol to include new sensors, sampling systems, and graphical user interfaces. Specifically, the E-SMART team developed the following three system elements: (1) Base technology for a new class of smart , highly sensitive, chemically-specific, in-situ, multichannel microsensors utilizing integrated optical interferometry technology, (2) A set of additional E-SMART-compatible sensors adapted from commercial off-the-shelf technologies, and (3) A Data Management and Analysis System (DMAS), including network management components and the user-friendly graphical user interface (GUI) for data evaluation and visualization.

  17. Aptamer- and nucleic acid enzyme-based systems for simultaneous detection of multiple analytes

    DOE Patents [OSTI]

    Lu, Yi (Champaign, IL); Liu, Juewen (Albuquerque, NM)

    2011-11-15

    The present invention provides aptamer- and nucleic acid enzyme-based systems for simultaneously determining the presence and optionally the concentration of multiple analytes in a sample. Methods of utilizing the system and kits that include the sensor components are also provided. The system includes a first reactive polynucleotide that reacts to a first analyte; a second reactive polynucleotide that reacts to a second analyte; a third polynucleotide; a fourth polynucleotide; a first particle, coupled to the third polynucleotide; a second particle, coupled to the fourth polynucleotide; and at least one quencher, for quenching emissions of the first and second quantum dots, coupled to the first and second reactive polynucleotides. The first particle includes a quantum dot having a first emission wavelength. The second particle includes a second quantum dot having a second emission wavelength different from the first emission wavelength. The third polynucleotide and the fourth polynucleotide are different.

  18. Instantaneous Baseline Damage Detection using a Low Power Guided Waves System

    E-Print Network [OSTI]

    Ha, Dong S.

    , Kim and Sohn (2007) [3] proposed a reference-free scheme based on the fact of that mode conversion due in a plate-like structure with a uniform thickness. However, since the mode conversion effects are caused-off factor = 1) window. Our system comprises three functional blocks: a processing unit, a signal actuation

  19. Drought detective: Texas A&M professor works to develop drought prediction system 

    E-Print Network [OSTI]

    Smith, Courtney

    2011-01-01

    . Todd Vo?eler of the Guadalupe-Blanco River Authority in a ???? article for Texas Parks and Wildlife?s magazine. ?Drought prediction is essentially using something in the climate system known as memory, and the primary source of memory...

  20. FAULT DETECTION IN HVAC SYSTEMS USING MODEL-BASED FEEDFORWARD CONTROL

    E-Print Network [OSTI]

    operating conditions change. Poor control performance can lead to occupant discomfort in the treated the process it is controlling. Faults that lead to performance deterioration, or a change in system behavior. The model used in the feedforward controller acts as a baseline of correct behavior, and facilitates

  1. An In-Situ Ion Mobility Spectrometer Sensor System for Detecting Gaseous VOCs in Unsaturated Soils

    E-Print Network [OSTI]

    Baker, R. Jacob

    . The IMS system will be packaged in a probe housing for deployment using direct push methods methods for sampling and analyzing soil gas samples fall into two classes: passive sampling and active sampling. Passive sampling methods involve the shallow burial of a sorbent collector, which adsorbs the VOC

  2. Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2011 Annual Report

    SciTech Connect (OSTI)

    Jarman, Kenneth D.; Robinson, Sean M.; McDonald, Benjamin S.; Gilbert, Andrew J.; Misner, Alex C.; Pitts, W. Karl; White, Timothy A.; Seifert, Allen; Miller, Erin A.

    2011-09-01

    Future arms control treaties may push nuclear weapons limits to unprecedented low levels and may entail precise counting of warheads as well as distinguishing between strategic and tactical nuclear weapons. Such advances will require assessment of form and function to confidently verify the presence or absence of nuclear warheads and/or their components. Imaging with penetrating radiation can provide such an assessment and could thus play a unique role in inspection scenarios. Yet many imaging capabilities have been viewed as too intrusive from the perspective of revealing weapon design details, and the potential for the release of sensitive information poses challenges in verification settings. A widely held perception is that verification through radiography requires images of sufficient quality that an expert (e.g., a trained inspector or an image-matching algorithm) can verify the presence or absence of components of a device. The concept of information barriers (IBs) has been established to prevent access to relevant weapon-design information by inspectors (or algorithms), and has, to date, limited the usefulness of radiographic inspection. The challenge of this project is to demonstrate that radiographic information can be used behind an IB to improve the capabilities of treaty-verification weapons-inspection systems.

  3. A non-intrusive screening methodology for environmental hazard assessment at waste disposal sites for water resources protection

    SciTech Connect (OSTI)

    Simons, B.A.; Woldt, W.E.; Jones, D.D. [Univ. of Nebraska, Lincoln, NE (United States). Dept. of Biological Systems Engineering

    1995-12-31

    The environmental and health risks posed by unregulated waste disposal sites are potential concerns of Pacific Rim regions and island ares because of the need to protect aquifers and other valuable water resources. A non-intrusive screening methodology to determine site characteristics including possible soil and/or groundwater contamination, areal extent of waste, etc. is being developed and tested at waste disposal sites in Nebraska. This type of methodology would be beneficial to Pacific Rim regions in investigating and/or locating unknown or poorly documented contamination areas for hazard assessment and groundwater protection. Traditional assessment methods are generally expensive, time consuming, and potentially exacerbate the problem. Ideally, a quick and inexpensive assessment method to reliably characterize these sites is desired. Electromagnetic (EM) conductivity surveying and soil-vapor sampling techniques, combined with innovative three-dimensional geostatistical methods are used to map the data to develop a site characterization of the subsurface and to aid in tracking any contaminant plumes. The EM data is analyzed to determine/estimate the extent and volume of waste and/or leachate. Soil-vapor data are analyzed to estimate a site`s volatile organic compound (VOC) emission rate to the atmosphere. The combined information could then be incorporated as one part of an overall hazard assessment system.

  4. Nuclear reactor with internal thimble-type delayed neutron detection system

    DOE Patents [OSTI]

    Gross, Kenny C. (Lemont, IL); Poloncsik, John (Downers Grove, IL); Lambert, John D. B. (Wheaton, IL)

    1990-01-01

    This invention teaches improved apparatus for the method of detecting a breach in cladded fuel used in a nuclear reactor. The detector apparatus is located in the primary heat exchanger which conveys part of the reactor coolant past at least three separate delayed-neutron detectors mounted in this heat exchanger. The detectors are spaced apart such that the coolant flow time from the core to each detector is different, and these differences are known. The delayed-neutron activity at the detectors is a function of the delay time after the reaction in the fuel until the coolant carrying the delayed-neutron emitter passes the respective detector. This time delay is broken down into separate components including an isotopic holdup time required for the emitter to move through the fuel from the reaction to the coolant at the breach, and two transit times required for the emitter now in the coolant to flow from the breach to the detector loop and then via the loop to the detector. At least two of these time components are determined during calibrated operation of the reactor. Thereafter during normal reactor operation, repeated comparisons are made by the method of regression approximation of the third time component for the best-fit line correlating measured delayed-neutron activity against activity that is approximated according to specific equations. The equations use these time-delay components and known parameter values of the fuel and of the part and emitting daughter isotopes.

  5. An Algorithm for Detecting Hopf-Birfucation Varieties of Nonlinear Polynomial Systems

    E-Print Network [OSTI]

    Stelios Kotsios

    2008-07-28

    An algorithm is presented here, for discovering Hopf-Bifurcation varieties of polynomial dynamical systems. It is based on the expression of specific polynomials, as sums of products of first degree polynomials, with parametrical coefficients. By giving to these parameters certain values, we ensure the positiveness of some quantities, constructing thereby proper Lyapunov functions, which guarantee the stability of the equilibrium point. The points where the afore mentioned positiveness fails, define the Hopf-Bifurcation varieties upon discussion.

  6. Development of Integrated Online Monitoring Systems for Detection of Diversion at Natural Uranium Conversion Facilities

    SciTech Connect (OSTI)

    Dewji, Shaheen A; Lee, Denise L; Croft, Stephen; McElroy, Robert Dennis; Hertel, Nolan; Chapman, Jeffrey Allen; Cleveland, Steven L

    2013-01-01

    Recent work at Oak Ridge National Laboratory (ORNL) has focused on some source term modeling of uranyl nitrate (UN) as part of a comprehensive validation effort employing gamma-ray detector instrumentation for the detection of diversion from declared conversion activities. Conversion, the process by which natural uranium ore (yellowcake) is purified and converted through a series of chemical processes into uranium hexafluoride gas (UF6), has historically been excluded from the nuclear safeguards requirements of the 235U-based nuclear fuel cycle. The undeclared diversion of this product material could potentially provide feedstock for a clandestine weapons program for state or non-state entities. Given the changing global political environment and the increased availability of dual-use nuclear technology, the International Atomic Energy Agency has evolved its policies to emphasize safeguarding this potential feedstock material in response to dynamic and evolving potential diversion pathways. To meet the demand for instrumentation testing at conversion facilities, ORNL developed the Uranyl Nitrate Calibration Loop Equipment (UNCLE) facility to simulate the full-scale operating conditions of a purified uranium-bearing aqueous stream exiting the solvent extraction process in a natural uranium conversion plant. This work investigates gamma-ray signatures of UN circulating in the UNCLE facility and evaluates detector instrumentation sensitivity to UN for safeguards applications. These detector validation activities include assessing detector responses to the UN gamma-ray signatures for spectrometers based on sodium iodide, lanthanum bromide, and germanium detectors. The results of measurements under static and dynamic operating conditions at concentrations ranging from 10-90g U/L of naturally enriched UN will be presented. A range of gamma-ray lines was examined and self-attenuation factors were calculated, in addition to attenuation for transmission measurement of density, concentration and enrichment. A detailed uncertainty analysis will be presented providing insights into instrumentation limitations to spoofing.

  7. Monitoring CO 2 sequestration into deep saline aquifer and associated salt intrusion using coupled multiphase flow modeling and time lapse electrical resistivity tomography

    SciTech Connect (OSTI)

    Chuan Lu; CHI Zhang; Hai Hanag; Timothy C. Johnson

    2014-04-01

    Successful geological storage and sequestration of carbon dioxide (CO2) require efficient monitoring of the migration of CO2 plume during and after large-scale injection in order to verify the containment of the injected CO2 within the target formation and to evaluate potential leakage risk. Field studies have shown that surface and cross-borehole electrical resistivity tomography (ERT) can be a useful tool in imaging and characterizing solute transport in heterogeneous subsurface. In this synthetic study, we have coupled a 3-D multiphase flow model with a parallel 3-D time-lapse ERT inversion code to explore the feasibility of using time-lapse ERT for simultaneously monitoring the migration of CO2 plume in deep saline formation and potential brine intrusion into shallow fresh water aquifer. Direct comparisons of the inverted CO2 plumes resulting from ERT with multiphase flow simulation results indicate the ERT could be used to delineate the migration of CO2 plume. Detailed comparisons on the locations, sizes and shapes of CO2 plume and intruded brine plumes suggest that ERT inversion tends to underestimate the area review of the CO2 plume, but overestimate the thickness and total volume of the CO2 plume. The total volume of intruded brine plumes is overestimated as well. However, all discrepancies remain within reasonable ranges. Our study suggests that time-lapse ERT is a useful monitoring tool in characterizing the movement of injected CO2 into deep saline aquifer and detecting potential brine intrusion under large-scale field injection conditions.

  8. System and method for ultrafast optical signal detecting via a synchronously coupled anamorphic light pulse encoded laterally

    DOE Patents [OSTI]

    Heebner, John E. (Livermore, CA)

    2010-08-03

    In one general embodiment, a method for ultrafast optical signal detecting is provided. In operation, a first optical input signal is propagated through a first wave guiding layer of a waveguide. Additionally, a second optical input signal is propagated through a second wave guiding layer of the waveguide. Furthermore, an optical control signal is applied to a top of the waveguide, the optical control signal being oriented diagonally relative to the top of the waveguide such that the application is used to influence at least a portion of the first optical input signal propagating through the first wave guiding layer of the waveguide. In addition, the first and the second optical input signals output from the waveguide are combined. Further, the combined optical signals output from the waveguide are detected. In another general embodiment, a system for ultrafast optical signal recording is provided comprising a waveguide including a plurality of wave guiding layers, an optical control source positioned to propagate an optical control signal towards the waveguide in a diagonal orientation relative to a top of the waveguide, at least one optical input source positioned to input an optical input signal into at least a first and a second wave guiding layer of the waveguide, and a detector for detecting at least one interference pattern output from the waveguide, where at least one of the interference patterns results from a combination of the optical input signals input into the first and the second wave guiding layer. Furthermore, propagation of the optical control signal is used to influence at least a portion of the optical input signal propagating through the first wave guiding layer of the waveguide.

  9. Development of an Automated Fault Detection System Tool for Unitary Air Conditioners at Undustrial Energy Audits 

    E-Print Network [OSTI]

    Parikh, P.; Pasmussen, B. P.

    2015-01-01

    Faulty air conditioners are prevalent; as is the related energy inefficiency 57% Of 13,000 systems incorrectly charged 13% Average efficiency loss 10% Efficiency loss due to 30% overcharge 9% Efficiency loss due to 30% undercharge ESL-IE-15... • Refrigerant Type Brochure • Rated Subcooling• Rated Superheat Other • Type of Valve • Avoided Cost of Electricity • Operating Hours • Presence of Accumulator Co In Co Pr Co Out Ev Out Ev In Co In Co Out Ev Pr Ev Out Air side Temperatures Refrigerant side...

  10. Development of a System for Rapid Detection of Contaminants in Water Supplies Using Magnetic Resonance and Nanoparticles

    SciTech Connect (OSTI)

    Lowery, Thomas J; Neely, Lori; Chepin, James; Wellman, Parris; Toso, Ken; Murray, Paul; Audeh, Mark; Demas, Vasiliki; Palazzolo, Robert; Min, Michael; Phung, Nu; Blanco, Matt; Raphel, Jordan; O'Neil, Troy

    2010-09-14

    To keep the water supply safe and to ensure a swift and accurate response to a water supply contamination event, rapid and robust methods for microbial testing are necessary. Current technologies are complex, lengthy and costly and there is a need for rapid, reliable, and precise approaches that can readily address this fundamental security and safety issue. T2 Biosystems is focused on providing solutions to this problem by making breakthroughs in nanotechnology and biosensor techniques that address the current technical restrictions facing rapid, molecular analysis in complex samples. In order to apply the T2 Biosystems nucleic acid detection procedure to the analysis of nucleic acid targets in unprocessed water samples, Bacillus thuringeinsis was selected as a model organism and local river water was selected as the sample matrix. The initial assay reagent formulation was conceived with a manual magnetic resonance reader, was optimized using a high throughput system, and transferred back to the MR reader for potential field use. The final assay employing the designed and manufactured instruments was capable of detecting 10 CFU/mL of B. thuringiensis directly within the environmental water sample within 90 minutes. Further, discrimination of two closely related species of Bacilli was accomplished using the methods of this project; greater than 3-fold discrimination between B. cereus and B. thuringiensis at a concentrations spanning 10 CFU/mL to 10{sup 5} CFU/mL was observed.

  11. HUBBLE SPACE TELESCOPE DETECTION OF THE DOUBLE PULSAR SYSTEM J0737–3039 IN THE FAR-ULTRAVIOLET

    SciTech Connect (OSTI)

    Durant, Martin; Kargaltsev, Oleg; Pavlov, George G. E-mail: kargaltsev@email.gwu.edu

    2014-03-01

    We report on detection of the double pulsar system J0737–3039 in the far-UV with the Advanced Camera for Surveys/Solar-blind Channel detector aboard Hubble Space Telescope. We measured the energy flux F = (4.6 ± 1.0) × 10{sup –17} erg cm{sup –2} s{sup –1} in the 1250-1550 Å band, which corresponds to the extinction-corrected luminosity L ? 1.5 × 10{sup 28} erg s{sup –1} for the distance d = 1.1 kpc and a plausible reddening E(B – V) = 0.1. If the detected emission comes from the entire surface of one of the neutron stars with a 13 km radius, the surface blackbody temperature is in the range T ? (2-5) × 10{sup 5} K for a reasonable range of interstellar extinction. Such a temperature requires an internal heating mechanism to operate in old neutron stars, or, less likely, it might be explained by heating of the surface of the less energetic Pulsar B by the relativistic wind of Pulsar A. If the far-ultraviolet emission is non-thermal (e.g., produced in the magnetosphere of Pulsar A), its spectrum exhibits a break between the UV and X-rays.

  12. A VUV detection system for the direct photonic identification of the first excited isomeric state of $^{229}$Th

    E-Print Network [OSTI]

    Seiferle, Benedict; Laatiaoui, Mustapha; Thirolf, Peter G

    2015-01-01

    With an expected energy of 7.6(5) eV, $^{229}$Th possesses the lowest excited nuclear state in the landscape of all presently known nuclei. The energy corresponds to a wavelength of about 160 nm and would conceptually allow for an optical laser excitation of a nuclear transition. We report on a VUV optical detection system that was designed for the direct detection of the isomeric ground-state transition of $^{229}$Th. $^{229(m)}$Th ions originating from a $^{233}$U $\\alpha$-recoil source are collected on a micro electrode that is placed in the focus of an annular parabolic mirror. The latter is used to parallelize the UV fluorescence that may emerge from the isomeric ground-state transition of $^{229}$Th. The parallelized light is then focused by a second annular parabolic mirror onto a CsI-coated position-sensitive MCP detector behind the mirror exit. To achieve a high signal-to-background ratio, a small spot size on the MCP detector needs to be achieved. Besides extensive ray-tracing simulations of the opt...

  13. Real-time detection method and system for identifying individual aerosol particles

    DOE Patents [OSTI]

    Gard, Eric E. (San Francisco, CA); Coffee, Keith R. (Patterson, CA); Frank, Matthias (Oakland, CA); Tobias, Herbert J. (Kensington, CA); Fergenson, David P. (Alamo, CA); Madden, Norm (Livermore, CA); Riot, Vincent J. (Berkeley, CA); Steele, Paul T. (Livermore, CA); Woods, Bruce W. (Livermore, CA)

    2007-08-21

    An improved method and system of identifying individual aerosol particles in real time. Sample aerosol particles are collimated, tracked, and screened to determine which ones qualify for mass spectrometric analysis based on predetermined qualification or selection criteria. Screening techniques include one or more of determining particle size, shape, symmetry, and fluorescence. Only qualifying particles passing all screening criteria are subject to desorption/ionization and single particle mass spectrometry to produce corresponding test spectra, which is used to determine the identities of each of the qualifying aerosol particles by comparing the test spectra against predetermined spectra for known particle types. In this manner, activation cycling of a particle ablation laser of a single particle mass spectrometer is reduced.

  14. Real-Time Detection Method And System For Identifying Individual Aerosol Particles

    DOE Patents [OSTI]

    Gard, Eric Evan (San Francisco, CA); Fergenson, David Philip (Livermore, CA)

    2005-10-25

    A method and system of identifying individual aerosol particles in real time. Sample aerosol particles are compared against and identified with substantially matching known particle types by producing positive and negative test spectra of an individual aerosol particle using a bipolar single particle mass spectrometer. Each test spectrum is compared to spectra of the same respective polarity in a database of predetermined positive and negative spectra for known particle types and a set of substantially matching spectra is obtained. Finally the identity of the individual aerosol particle is determined from the set of substantially matching spectra by determining a best matching one of the known particle types having both a substantially matching positive spectrum and a substantially matching negative spectrum associated with the best matching known particle type.

  15. Physics based model for online fault detection in autonomous cryogenic loading system

    SciTech Connect (OSTI)

    Kashani, Ali; Ponizhovskaya, Ekaterina; Luchinsky, Dmitry; Smelyanskiy, Vadim; Patterson-Hine, Anna; Sass, Jared; Brown, Barbara

    2014-01-29

    We report the progress in the development of the chilldown model for a rapid cryogenic loading system developed at NASA-Kennedy Space Center. The nontrivial characteristic feature of the analyzed chilldown regime is its active control by dump valves. The two-phase flow model of the chilldown is approximated as one-dimensional homogeneous fluid flow with no slip condition for the interphase velocity. The model is built using commercial SINDA/FLUINT software. The results of numerical predictions are in good agreement with the experimental time traces. The obtained results pave the way to the application of the SINDA/FLUINT model as a verification tool for the design and algorithm development required for autonomous loading operation.

  16. A new population of WIMPs in the solar system and indirect detection rates

    E-Print Network [OSTI]

    Lars Bergstrom; Thibault Damour; Joakim Edsjo; Lawrence M. Krauss; Piero Ullio

    2000-12-11

    A new Solar System population of Weakly Interacting Massive Particle (WIMP) dark matter has been proposed to exist. We investigate the implications of this population on indirect signals in neutrino telescopes (due to WIMP annihilations in the Earth) for the case when the WIMP is the lightest neutralino of the MSSM, the minimal supersymmetric extension of the standard model. The velocity distribution and capture rate of this new population is evaluated and the flux of neutrino-induced muons from the center of the Earth in neutrino telescopes is calculated. We show that the effects of the new population can be crucial for masses around 60-120 GeV, where enhancements of the predicted muon flux from the center of the Earth by up to a factor of 100 compared to previously published estimates occur. As a result of the new WIMP population, neutrino telescopes should be able to probe a much larger region of parameter space in this mass range.

  17. Uniform Laser Excitation And Detection In Capillary Array Electrophoresis System And Method.

    DOE Patents [OSTI]

    Li, Qingbo (State College, PA); Zhou, Songsan (Ferguson, PA); Liu, Changsheng (State College, PA)

    2003-10-07

    A capillary electrophoresis system comprises capillaries positioned in parallel to each other forming a plane. The capillaries are configured to allow samples to migrate. A light source is configured to illuminate the capillaries and the samples therein. This causes the samples to emit light. A lens is configured to receive the light emitted by the samples and positioned directly over a first group of the capillaries and obliquely over a second group of the capillaries. The light source is further configured to illuminate the second group of capillaries more than the first group of the capillaries such that amount of light received by the lens from the first group of capillaries is substantially identical to amount of light received from the second group of capillaries when an identical amount of the samples is migrating through the first and second group capillaries.

  18. Implications of a New Solar System Population of Neutralinos on Indirect Detection Rates

    E-Print Network [OSTI]

    Lars Bergstrom; Thibault Damour; Joakim Edsjo; Lawrence M. Krauss; Piero Ullio

    1999-09-08

    Recently, a new Solar System population of weakly interacting massive particle (WIMP) dark matter has been proposed to exist. We investigate the implications of this population on indirect signals in neutrino telescopes (due to WIMP annihilations in the Earth) for the case when the WIMP is the lightest neutralino of the MSSM, the minimal supersymmetric extension of the standard model. The velocity distribution and capture rate of this new population is evaluated and the flux of neutrino-induced muons from the center of the Earth in neutrino telescopes is calculated. The strength of the signal is very sensitive to the velocity distribution of the new population. We analytically estimate this distribution using the approximate conservation of the component of the WIMP angular momentum orthogonal to the ecliptic plane. The non-linear problem of combining a fixed capture rate from the standard galactic WIMP population with one rising linearly with time from the new population to obtain the present-day annihilation rate in the Earth is also solved analytically. We show that the effects of the new population can be crucial for masses below around 150 GeV, where enhancements of the predicted muon flux from the center of the Earth by up to a factor of 100 compared to previously published estimates occur. As a result of the new WIMP population, the next generation of neutrino telescopes should be able to probe a much larger region of parameter space in the mass range 60-130 GeV.

  19. Optimization of Design and Manufacturing Process of Metal Foam Filled Anti-Intrusion Bars

    SciTech Connect (OSTI)

    Villa, Andrea; Mussi, Valerio; Strano, Matteo

    2011-05-04

    The role of an anti-intrusion bar for automotive use is to absorb the kinetic energy of the colliding bodies that is partially converted into internal work of the bodies involved in the crash. The aim of this paper is to investigate the performances of a new kind of anti-intrusion bars for automotive use, filled with metallic foams. The reason for using a cellular material as a filler deals with its capacity to absorb energy during plastic deformation, while being lightweight. The study is the evolution of a previous paper presented by the authors at Esaform 2010 and will present new results and findings. It is conducted by evaluating some key technical issues of the manufacturing problem and by conducting experimental and numerical analyses. The evaluation of materials and shapes of the closed sections to be filled is made in the perspective of a car manufacturer (production costs, weight reduction, space availability in a car door, etc.). Experimentally, foams are produced starting from an industrial aluminium precursor with a TiH{sub 2} blowing agent. Bars are tested in three point bending, in order to evaluate their performances in terms of force-displacement response and other specific performance parameters. In order to understand the role of interface between the inner surface of the tube and the external surface of the foam, different kinds of interface are tested.

  20. Update on intrusive characterization of mixed contact-handled transuranic waste at Argonne-West

    SciTech Connect (OSTI)

    Dwight, C.C.; Jensen, B.A.; Bryngelson, C.D.; Duncan, D.S.

    1997-02-03

    Argonne National Laboratory and Lockheed Martin Idaho Technologies Company have jointly participated in the Department of Energy`s (DOE) Waste Isolation Pilot Plant (WIPP) Transuranic Waste Characterization Program since 1990. Intrusive examinations have been conducted in the Waste Characterization Area, located at Argonne-West in Idaho Falls, Idaho, on over 200 drums of mixed contact-handled transuranic waste. This is double the number of drums characterized since the last update at the 1995 Waste Management Conference. These examinations have provided waste characterization information that supports performance assessment of WIPP and that supports Lockheed`s compliance with the Resource Conservation and Recovery Act. Operating philosophies and corresponding regulatory permits have been broadened to provide greater flexibility and capability for waste characterization, such as the provision for minor treatments like absorption, neutralization, stabilization, and amalgamation. This paper provides an update on Argonne`s intrusive characterization permits, procedures, results, and lessons learned. Other DOE sites that must deal with mixed contact-handled transuranic waste have initiated detailed planning for characterization of their own waste. The information presented herein could aid these other storage and generator sites in further development of their characterization efforts.

  1. QSO ABSORPTION SYSTEMS DETECTED IN Ne VIII: HIGH-METALLICITY CLOUDS WITH A LARGE EFFECTIVE CROSS SECTION

    SciTech Connect (OSTI)

    Meiring, J. D.; Tripp, T. M. [Department of Astronomy, University of Massachusetts, Amherst, MA 01003 (United States)] [Department of Astronomy, University of Massachusetts, Amherst, MA 01003 (United States); Werk, J. K.; Prochaska, J. X. [University of California Observatories-Lick Observatory, UC Santa Cruz, CA 95064 (United States)] [University of California Observatories-Lick Observatory, UC Santa Cruz, CA 95064 (United States); Howk, J. C. [Department of Physics, University of Notre Dame, 225 Nieuwland Science Hall, Notre Dame, IN 46556 (United States)] [Department of Physics, University of Notre Dame, 225 Nieuwland Science Hall, Notre Dame, IN 46556 (United States); Jenkins, E. B. [Princeton University Observatory, Peyton Hall, Ivy Lane, Princeton, NJ 08544 (United States)] [Princeton University Observatory, Peyton Hall, Ivy Lane, Princeton, NJ 08544 (United States); Lehner, N.; Sembach, K. R. [Space Telescope Science Institute, 3700 San Martin Drive, Baltimore, MD 21218 (United States)] [Space Telescope Science Institute, 3700 San Martin Drive, Baltimore, MD 21218 (United States)

    2013-04-10

    Using high-resolution, high signal-to-noise ultraviolet spectra of the z{sub em} = 0.9754 quasar PG1148+549 obtained with the Cosmic Origins Spectrograph (COS) on the Hubble Space Telescope, we study the physical conditions and abundances of Ne VIII+O VI absorption line systems at z{sub abs} = 0.68381, 0.70152, 0.72478. In addition to Ne VIII and O VI, absorption lines from multiple ionization stages of oxygen (O II, O III, O IV) are detected and are well aligned with the more highly ionized species. We show that these absorbers are multiphase systems including hot gas (T Almost-Equal-To 10{sup 5.7} K) that produces Ne VIII and O VI, and the gas metallicity of the cool phase ranges from Z = 0.3 Z{sub Sun} to supersolar. The cool ( Almost-Equal-To 10{sup 4} K) phases have densities n{sub H} Almost-Equal-To 10{sup -4} cm{sup -3} and small sizes (<4 kpc); these cool clouds are likely to expand and dissipate, and the Ne VIII may be within a transition layer between the cool gas and a surrounding, much hotter medium. The Ne VIII redshift density, dN/dz{approx}7{sup +7}{sub -3}, requires a large number of these clouds for every L > 0.1 L* galaxy and a large effective absorption cross section ({approx}> 100 kpc), and indeed, we find a star-forming {approx}L {sup *} galaxy at the redshift of the z{sub abs} = 0.72478 system, at an impact parameter of 217 kpc. Multiphase absorbers like these Ne VIII systems are likely to be an important reservoir of baryons and metals in the circumgalactic media of galaxies.

  2. The Dynamics of Steady, Partial-Depth Intrusive Gravity M. R. Flynn1,*, T. Boubarne2 and P. F. Linden2

    E-Print Network [OSTI]

    Flynn, Morris R.

    The Dynamics of Steady, Partial-Depth Intrusive Gravity Currents M. R. Flynn1,*, T. Boubarne2 and P] ABSTRACT Experiments of intrusive gravity currents generated by lock exchange offer insights into atmospher- ic and oceanic flows. However, whereas many previous investigations have considered the `full

  3. XAX: a multi-ton, multi-target detection system for dark matter, double beta decay and pp solar neutrinos

    E-Print Network [OSTI]

    K. Arisaka; H. Wang; P. F. Smith; D. Cline; A. Teymourian; E. Brown; W. Ooi; D. Aharoni; C. W. Lam; K. Lung; S. Davies; M. Price

    2009-01-07

    A multi-target detection system XAX, comprising concentric 10 ton targets of 136Xe and 129/131Xe, together with a geometrically similar or larger target of liquid Ar, is described. Each is configured as a two-phase scintillation/ionization TPC detector, enhanced by a full 4pi array of ultra-low radioactivity Quartz Photon Intensifying Detectors (QUPIDs) replacing the conventional photomultipliers for detection of scintillation light. It is shown that background levels in XAX can be reduced to the level required for dark matter particle (WIMP) mass measurement at a 10^-10 pb WIMP-nucleon cross section, with single-event sensitivity below 10^-11 pb. The use of multiple target elements allows for confirmation of the A^2 dependence of a coherent cross section, and the different Xe isotopes provide information on the spin-dependence of the dark matter interaction. The event rates observed by Xe and Ar would modulate annually with opposite phases from each other for WIMP mass >~100 GeV/c^2. The large target mass of 136Xe and high degree of background reduction allow neutrinoless double beta decay to be observed with lifetimes of 10^27-10^28 years, corresponding to the Majorana neutrino mass range 0.01-0.1 eV, the most likely range from observed neutrino mass differences. The use of a 136Xe-depleted 129/131Xe target will also allow measurement of the pp solar neutrino spectrum to a precision of 1-2%.

  4. Load Identification of Non-intrusive Load-monitoring System in Smart HSUEH-HSIEN CHANG

    E-Print Network [OSTI]

    Fernandez, Thomas

    for the management of entrance guard, health care, saving energy and reducing CO2, and comfortable life. Intelligent of saving energy and reducing CO2 of residence using some new techniques. Health care of residence of electric power are also raised. In energy demands, the amount of residence is increasing 5.93% every year

  5. Monitoring CO2 Intrusion and Associated Geochemical Transformations in a Shallow Groundwater System Using Complex

    E-Print Network [OSTI]

    Hubbard, Susan

    Geologic carbon sequestration, which aims to capture and inject carbon dioxide (CO2) into deep subsurface Using Complex Electrical Methods Baptiste Dafflon,, * Yuxin Wu, Susan S. Hubbard, Jens T. Birkholzer: The risk of CO2 leakage from a properly permitted deep geologic storage facility is expected to be very low

  6. A comprehensive system for non-intrusive load monitoring and diagnostics

    E-Print Network [OSTI]

    Paris, James, Ph. D. Massachusetts Institute of Technology

    2013-01-01

    Energy monitoring and smart grid applications have rapidly developed into a multi-billion dollar market. The continued growth and utility of monitoring technologies is predicated upon the ability to economically extract ...

  7. Method and apparatus for distributed intrusion protection system for ultra high bandwidth networks

    DOE Patents [OSTI]

    Goranson, Craig A.; Burnette, John R.; Greitzer, Frank L.; McMillan, Bryan H.

    2013-10-15

    A method for providing security to a network having a data stream with a plurality of portions of data, each having differing levels of sensitivity. The data stream is interrogated to determine the presence of predetermined characteristics associated with at least one of the portions of data within the data stream. At least one of the portions of data is then characterized, based upon the portion of data exhibiting a predetermined combination of characteristics, wherein the predetermined combination of characteristics is related to the sensitivity of the portion of data. The portions of the data stream are then distributed into a plurality of different channels, each of the channels associated with different level of sensitivity.

  8. Tolerating Intrusions in Grid Systems Luis Sardinha Nuno Ferreira Neves Paulo Verissimo

    E-Print Network [OSTI]

    Neves, Nuno

    spread through several organi- zations. These resources can be very tempting for a hacker because- come a target for the hacker community. For ex- ample, the considerable computing power can be used to break passwords, the storage devices can save hacker tools and other information, and the large

  9. Worm-IT A wormhole-based intrusion-tolerant group communication system

    E-Print Network [OSTI]

    Neves, Nuno

    , Departamento de Informa´tica, Campo Grande, Bloco C6, Piso 3, 1749-016 Lisboa, Portugal b Programa de Po´s-Graduac¸a~o em Informa´tica Aplicada, Pontifi´cia Universidade Cato´lica do Parana´, Rua Imaculada Conceic

  10. Development of real time non-intrusive load monitor for shipboard fluid systems

    E-Print Network [OSTI]

    Branch, Perry L. (Perry Lamar)

    2008-01-01

    Since the year 2000, the United States Navy has spent an average of half a billion dollars over the congressionally approved budget for shipbuilding. Additionally, most experts project that in order to meet the Chief of ...

  11. Cyber-Intrusion Auto-Response Policy and Management System (CAPMS)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum Based| Department of Energy Whole-HomeCutting Edge Building5 by1 I N S P E C

  12. V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeploymentDepartmentService

  13. Bisectional fault detection system

    DOE Patents [OSTI]

    Archer, Charles Jens (Rochester, MN); Pinnow, Kurt Walter (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian Edward (Rochester, MN)

    2009-08-04

    An apparatus and program product logically divide a group of nodes and causes node pairs comprising a node from each section to communicate. Results from the communications may be analyzed to determine performance characteristics, such as bandwidth and proper connectivity.

  14. Bisectional fault detection system

    DOE Patents [OSTI]

    Archer, Charles Jens (Rochester, MN); Pinnow, Kurt Walter (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian Edward (Rochester, MN)

    2012-02-14

    An apparatus, program product and method logically divide a group of nodes and causes node pairs comprising a node from each section to communicate. Results from the communications may be analyzed to determine performance characteristics, such as bandwidth and proper connectivity.

  15. Bisectional fault detection system

    DOE Patents [OSTI]

    Archer, Charles Jens (Rochester, MN); Pinnow, Kurt Walter (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian Edward (Rochester, MN)

    2008-11-11

    An apparatus, program product and method logically divides a group of nodes and causes node pairs comprising a node from each section to communicate. Results from the communications may be analyzed to determine performance characteristics, such as bandwidth and proper connectivity.

  16. Radiation detection system

    DOE Patents [OSTI]

    Riedel, Richard A. (Knoxville, TN); Wintenberg, Alan L. (Knoxville, TN); Clonts, Lloyd G. (Knoxville, TN); Cooper, Ronald G. (Oak Ridge, TN)

    2012-02-14

    A preamplifier circuit for processing a signal provided by a radiation detector includes a transimpedance amplifier coupled to receive a current signal from a detector and generate a voltage signal at its output. A second amplification stage has an input coupled to an output of the transimpedance amplifier for providing an amplified voltage signal. Detector electronics include a preamplifier circuit having a first and second transimpedance amplifier coupled to receive a current signal from a first and second location on a detector, respectively, and generate a first and second voltage signal at respective outputs. A second amplification stage has an input coupled to an output of the transimpedance amplifiers for amplifying the first and said second voltage signals to provide first and second amplified voltage signals. A differential output stage is coupled to the second amplification stage for receiving the first and second amplified voltage signals and providing a pair of outputs from each of the first and second amplified voltage signals. Read out circuitry has an input coupled to receive both of the pair of outputs, the read out circuitry having structure for processing each of the pair of outputs, and providing a single digital output having a time-stamp therefrom.

  17. Photovoltaic System Fault Detection

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeeding access| DepartmentPeerFederal FleetUp in thePhotonPhotosPhotovoltaic

  18. Role of intrusion-induced salt mobility in controlling the formation of the enigmatic `Silverpit Crater', UK Southern North Sea

    E-Print Network [OSTI]

    Role of intrusion-induced salt mobility in controlling the formation of the enigmatic `Silverpit of several WNW­ESE-striking Cenozoic folds, including a buried salt withdrawal syncline in the axis of which-depositional diagenetic alteration and structural failure resulting from the geometry of their respective underlying salt

  19. Numerical Model Investigation for Potential Methane Explosion and Benzene Vapor Intrusion Associated with High-Ethanol Blend

    E-Print Network [OSTI]

    Alvarez, Pedro J.

    Associated with High-Ethanol Blend Releases Jie Ma, Hong Luo, George E. DeVaull,§ William G. Rixey, and Pedro ABSTRACT: Ethanol-blended fuel releases usually stimulate methanogenesis in the subsurface, which could conditions exist. Ethanol- derived methane may also increase the vapor intrusion potential of toxic fuel

  20. Apparatus and method for detecting a magnetic anomaly contiguous to remote location by SQUID gradiometer and magnetometer systems

    DOE Patents [OSTI]

    Overton, W.C. Jr.; Steyert, W.A. Jr.

    1981-05-22

    A superconducting quantum interference device (SQUID) magnetic detection apparatus detects magnetic fields, signals, and anomalies at remote locations. Two remotely rotatable SQUID gradiometers may be housed in a cryogenic environment to search for and locate unambiguously magnetic anomalies. The SQUID magnetic detection apparatus can be used to determine the azimuth of a hydrofracture by first flooding the hydrofracture with a ferrofluid to create an artificial magnetic anomaly therein.

  1. System and method of reducing motion-induced noise in the optical detection of an ultrasound signal in a moving body of material

    DOE Patents [OSTI]

    Habeger, Jr., Charles C. (Smyrna, GA); LaFond, Emmanuel F. (Atlanta, GA); Brodeur, Pierre (Smyrna, GA); Gerhardstein, Joseph P. (Decatur, GA)

    2002-01-01

    The present invention provides a system and method to reduce motion-induced noise in the detection of ultrasonic signals in a moving sheet or body of material. An ultrasonic signal is generated in a sheet of material and a detection laser beam is moved along the surface of the material. By moving the detection laser in the same direction as the direction of movement of the sheet of material the amount of noise induced in the detection of the ultrasonic signal is reduced. The scanner is moved at approximately the same speed as the moving material. The system and method may be used for many applications, such in a paper making process or steel making process. The detection laser may be directed by a scanner. The movement of the scanner is synchronized with the anticipated arrival of the ultrasonic signal under the scanner. A photodetector may be used to determine when a ultrasonic pulse has been directed to the moving sheet of material so that the scanner may be synchronized the anticipated arrival of the ultrasonic signal.

  2. Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps u Android Permissions

    E-Print Network [OSTI]

    Tolmach, Andrew

    to detect malicious apps u Android Permissions C. Capps November 28, 2012 Charles Capps Android Permissions of Permissions 3 Developer overprivilege of apps Android Permissions Demystified 4 How to detect malicious apps using privileges Mining Permission Request Patterns Various Approaches in Analyzing Android Applications

  3. 380 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 10, NO. 3, SEPTEMBER 2009 Stereo-Based Pedestrian Detection for

    E-Print Network [OSTI]

    Zhu, Zhigang

    -Based Pedestrian Detection for Collision-Avoidance Applications Sergiu Nedevschi, Member, IEEE, Silviu Bota, and Corneliu Tomiuc Abstract--Pedestrians are the most vulnerable participants in urban traffic. The first step toward protecting pedestrians is to reliably detect them. We present a new approach for standing

  4. Array for detecting microbes

    DOE Patents [OSTI]

    Andersen, Gary L.; DeSantis, Todd D.

    2014-07-08

    The present embodiments relate to an array system for detecting and identifying biomolecules and organisms. More specifically, the present embodiments relate to an array system comprising a microarray configured to simultaneously detect a plurality of organisms in a sample at a high confidence level.

  5. Enterprise Information Security Management Framework [EISMF

    E-Print Network [OSTI]

    Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

    2011-01-01

    There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

  6. Spectroscopic detection

    DOE Patents [OSTI]

    Woskov, Paul P. (Bedford, MA); Hadidi, Kamal (Cambridge, MA)

    2003-01-01

    In embodiments, spectroscopic monitor monitors modulated light signals to detect low levels of contaminants and other compounds in the presence of background interference. The monitor uses a spectrometer that includes a transmissive modulator capable of causing different frequency ranges to move onto and off of the detector. The different ranges can include those with the desired signal and those selected to subtract background contributions from those with the desired signal. Embodiments of the system are particularly useful for monitoring metal concentrations in combustion effluent.

  7. A Micro-Power EEG Acquisition SoC With Integrated Feature Extraction Processor for a Chronic Seizure Detection System

    E-Print Network [OSTI]

    Verma, Naveen

    This paper presents a low-power SoC that performs EEG acquisition and feature extraction required for continuous detection of seizure onset in epilepsy patients. The SoC corresponds to one EEG channel, and, depending on ...

  8. Implementation and testing of a fault detection software tool for improving control system performance in a large commercial building

    E-Print Network [OSTI]

    Salsbury, T.I.

    2011-01-01

    a stand-alone software program for testing with the testImplementation and Testing of a Fault Detection Softwareopens the way for testing the control software on any other

  9. Fiber-Optic Defect and Damage Locator System for Wind Turbine Blades

    SciTech Connect (OSTI)

    Dr. Vahid Sotoudeh; Dr. Richard J. Black; Dr. Behzad Moslehi; Mr. Aleks Plavsic

    2010-10-30

    IFOS in collaboration with Auburn University demonstrated the feasibility of a Fiber Bragg Grating (FBG) integrated sensor system capable of providing real time in-situ defect detection, localization and quantification of damage. In addition, the system is capable of validating wind turbine blade structural models, using recent advances in non-contact, non-destructive dynamic testing of composite structures. This new generation method makes it possible to analyze wind turbine blades not only non-destructively, but also without physically contacting or implanting intrusive electrical elements and transducers into the structure. Phase I successfully demonstrated the feasibility of the technology with the construction of a 1.5 kHz sensor interrogator and preliminary instrumentation and testing of both composite material coupons and a wind turbine blade.

  10. Non-Intrusive Experiemental Investigation of Multi-Scale Flow Behavior in Rod Bundle with Spacer-Grids 

    E-Print Network [OSTI]

    Dominguez Ontiveros, Elvis Efren

    2011-08-08

    , Yassin A. Hassan Committee Members, Kalyan Annamalai William Marlow Victor Ugaz Head of Department, Dennis L. O?Neal May 2010 Major Subject: Mechanical Engineering iii ABSTRACT Non-Intrusive Experimental Investigation... where the correlation coefficient becomes zero D2 D Two dimensional form of the velocity tensor dP Pressure drop f Fraction of the mean velocity g Acceleration due to gravity Dh Hydraulic diameter Lij Integral length scale N Total number...

  11. Intrusive sampling and testing of ferrocyanide tanks, Hanford Site, Richland, Washington: Environmental Assessment

    SciTech Connect (OSTI)

    Not Available

    1992-02-01

    The proposed action involves intrusive sampling and testing of 24 Hanford Site single-shell waste tanks that contain ferrocyanide-nitrate/nitrite mixtures to determine the physical and chemical properties of the waste material. The Department of Energy (DOE) needs to take this action to help define the required controls to prevent or mitigate the potential for an accident during future characterization and monitoring of these tanks. Given the Unreviewed Safety Question associated with the consequences of a potential ferrocyanide nitrate/nitrite reaction, two safety assessments and this environmental assessment (EA) have been prepared to help ensure that the proposed action is conducted in a safe and environmentally sound manner. Standard operating procedures for sampling high-level waste tanks have been revised to reflect the potential presence of flammable or explosive mixtures in the waste. The proposed action would be conducted using nonsparking materials, spark resistant tools, and a portable containment enclosure (greenhouse) and plastic ground cover. The proposed activities involving Hanford Site ferrocyanide-containing tanks would be on land dedicated to DOE waste management.

  12. Detection and Identification of Data Attacks in Power System Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    the attacked transmission lines. I. INTRODUCTION A. SCADA System and State Estimation A modern society relies is supervised and control through the Supervisory Control And Data Acquisition (SCADA) systems. SCADA systems on State Estimation SCADA systems measure data through remote terminal units (RTUs) all over the grid

  13. Simultaneous Detection and Registration for Ileo-Cecal Valve Detection in 3D CT Colonography

    E-Print Network [OSTI]

    Barbu, Adrian

    Simultaneous Detection and Registration for Ileo-Cecal Valve Detection in 3D CT Colonography Le Lu1-Cecal Valve (ICV) detection in both clean and tagged 3D CT colonography scans. Our final ICV detection system

  14. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  15. Development of a rules-based advisory system for detecting off-nominal behavior of spacecraft digital autopilots 

    E-Print Network [OSTI]

    Jung, Hee

    1998-01-01

    the space shuttle dynamic model, and the control torque required, by the phase plane switching logic and jet selection logic. Rules-based methods for detecting off-nominal behavior such as chattering, overshoot, and torque bias are developed. This advisory...

  16. Use of the UNCLE Facility to Assess Integrated Online Monitoring Systems for Detection of Diversions at Uranium Conversion Facilities

    SciTech Connect (OSTI)

    Dewji, Shaheen A; Chapman, Jeffrey Allen; Lee, Denise L; Rauch, Eric; Hertel, Nolan

    2011-01-01

    Historically, the approach to safeguarding nuclear material in the front end of the fuel cycle was implemented only at the stage when UF6 was declared as feedstock for enrichment plants. Recent International Atomic Energy Agency (IAEA) circulars and policy papers have sought to implement safeguards when any purified aqueous uranium solution or uranium oxides suitable for isotopic enrichment or fuel fabrication exist. Oak Ridge National Laboratory has developed the Uranyl Nitrate Calibration Loop Equipment (UNCLE) facility to simulate the full-scale operating conditions for a purified uranium-bearing aqueous stream exiting the solvent extraction process conducted in a natural uranium conversion plant (NUCP) operating at 6000 MTU/year. Monitoring instruments, including the 3He passive neutron detector developed at Los Alamos National Laboratory and the Endress+Hauser Promass 83F Coriolis meter, have been tested at UNCLE and field tested at Springfields. The field trials demonstrated the need to perform full-scale equipment testing under controlled conditions prior to field deployment of operations and safeguards monitoring at additional plants. Currently, UNCLE is testing neutron-based monitoring for detection of noncompliant activities; however, gamma-ray source term monitoring is currently being explored complementary to the neutron detector in order to detect undeclared activities in a more timely manner. The preliminary results of gamma-ray source term modeling and monitoring at UNCLE are being analyzed as part of a comprehensive source term and detector benchmarking effort. Based on neutron source term detection capabilities, alternative gamma-based detection and monitoring methods will be proposed to more effectively monitor NUCP operations in verifying or detecting deviations from declared conversion activities.

  17. An interactive ontology-driven information system for simulating background radiation and generating scenarios for testing special nuclear materials detection algorithms

    SciTech Connect (OSTI)

    Sorokine, Alexandre; Schlicher, Bob G; Ward, Richard C; Wright, Michael C; Kruse, Kara L

    2015-01-01

    This paper describes an original approach to generating scenarios for the purpose of testing the algorithms used to detect special nuclear materials (SNM) that incorporates the use of ontologies. Separating the signal of SNM from the background requires sophisticated algorithms. To assist in developing such algorithms, there is a need for scenarios that capture a very wide range of variables affecting the detection process, depending on the type of detector being used. To provide such a cpability, we developed an ontology-driven information system (ODIS) for generating scenarios that can be used in creating scenarios for testing of algorithms for SNM detection. The ontology-driven scenario generator (ODSG) is an ODIS based on information supplied by subject matter experts and other documentation. The details of the creation of the ontology, the development of the ontology-driven information system, and the design of the web user interface (UI) are presented along with specific examples of scenarios generated using the ODSG. We demonstrate that the paradigm behind the ODSG is capable of addressing the problem of semantic complexity at both the user and developer levels. Compared to traditional approaches, an ODIS provides benefits such as faithful representation of the users' domain conceptualization, simplified management of very large and semantically diverse datasets, and the ability to handle frequent changes to the application and the UI. The approach makes possible the generation of a much larger number of specific scenarios based on limited user-supplied information

  18. A Model of the Lateral Geniculate Complex of the Turtle Visual System: Noise Suppression and Target Motion Detection

    E-Print Network [OSTI]

    Ghosh, Bijoy K.

    A Model of the Lateral Geniculate Complex of the Turtle Visual System: Noise Suppression and Target-Cybernetics and Intelligent Systems (CBCIS) at Texas Tech University, served as my thesis advisor and com- mittee chair of this work - showing an unwavering dedication to the topic of modeling vision neural systems. As a long

  19. Simulated Performance of Algorithms for the Localization of Radioactive Sources from a Position Sensitive Radiation Detecting System (COCAE)

    SciTech Connect (OSTI)

    Karafasoulis, K.; Zachariadou, K.; Seferlis, S.; Kaissas, I.; Potiriadis, C.; Lambropoulos, C.; Loukas, D.

    2011-12-13

    Simulation studies are presented regarding the performance of algorithms that localize point-like radioactive sources detected by a position sensitive portable radiation instrument (COCAE). The source direction is estimated by using the List Mode Maximum Likelihood Expectation Maximization (LM-ML-EM) imaging algorithm. Furthermore, the source-to-detector distance is evaluated by three different algorithms based on the photo-peak count information of each detecting layer, the quality of the reconstructed source image, and the triangulation method. These algorithms have been tested on a large number of simulated photons over a wide energy range (from 200 keV to 2 MeV) emitted by point-like radioactive sources located at different orientations and source-to-detector distances.

  20. Optically Detected Magnetic Resonance Studies on ?-conjugated...

    Office of Scientific and Technical Information (OSTI)

    ThesisDissertation: Optically Detected Magnetic Resonance Studies on -conjugated semiconductor systems Citation Details In-Document Search Title: Optically Detected Magnetic...