The signature-based radiation-scanning approach to standoff detection of improvised explosive devices

被引:5
|
作者
Brewer, R. L. [1 ]
Dunn, W. L. [1 ]
Heider, S. [1 ]
Matthew, C. [1 ]
Yang, X. [1 ]
机构
[1] Kansas State Univ, Dept Mech & Nucl Engn, Manhattan, KS 66506 USA
关键词
Explosives; Detection; Neutrons; Signature analysis;
D O I
10.1016/j.apradiso.2011.11.031
中图分类号
O61 [无机化学];
学科分类号
070301 ; 081704 ;
摘要
The signature-based radiation-scanning technique for detection of improvised explosive devices is described. The technique seeks to detect nitrogen-rich chemical explosives present in a target. The technology compares a set of "signatures" obtained from a test target to a collection of "templates", sets of signatures for a target that contain an explosive in a specific configuration. Interrogation of nitrogen-rich fertilizer samples, which serve as surrogates for explosives, is shown experimentally to be able to discriminate samples of 3.8 L and larger. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1181 / 1185
页数:5
相关论文
共 50 条
  • [21] SigRace: Signature-Based Data Race Detection
    Muzahid, Abdullah
    Suarez, Dario
    Qi, Shanxiang
    Torrellas, Josep
    ISCA 2009: 36TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE, 2009, : 337 - 348
  • [22] Signature-based portfolio allocation: a network approach
    Gregnanin, Marco
    Zhang, Yanyi
    De Smedt, Johannes
    Gnecco, Giorgio
    Parton, Maurizio
    APPLIED NETWORK SCIENCE, 2024, 9 (01)
  • [23] Signature-based approach to fair document exchange
    Shi, Q
    Zhang, N
    Merabti, M
    IEE PROCEEDINGS-COMMUNICATIONS, 2003, 150 (01): : 21 - 27
  • [24] Signature-Based Community Detection for Time Series
    Gregnanin, Marco
    De Smedt, Johannes
    Gnecco, Giorgio
    Parton, Maurizio
    COMPLEX NETWORKS & THEIR APPLICATIONS XII, VOL 2, COMPLEX NETWORKS 2023, 2024, 1142 : 146 - 158
  • [25] Detection and localization of improvised explosive devices based on 3-axis magnetic sensor array system
    Liu, Renhao
    Wang, Hua
    2010 SYMPOSIUM ON SECURITY DETECTION AND INFORMATION PROCESSING, 2010, 7 : 1 - 9
  • [26] A fog-based privacy-preserving approach for distributed signature-based intrusion detection
    Wang, Yu
    Meng, Weizhi
    Li, Wenjuan
    Li, Jin
    Liu, Wai-Xi
    Xiang, Yang
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 122 : 26 - 35
  • [27] DNA signature-based approaches for bacterial detection and identification
    Albuquerque, Pedro
    Mendes, Marta V.
    Santos, Catarina L.
    Moradas-Ferreira, Pedro
    Tavares, Fernando
    SCIENCE OF THE TOTAL ENVIRONMENT, 2009, 407 (12) : 3641 - 3651
  • [28] A signature-based approach for diagnosis of dynamic faults in SRAMs
    Ney, A.
    Bosio, A.
    Dilillo, L.
    Girard, P.
    Pravossoudovitch, S.
    Virazel, A.
    2008 INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE, 2008, : 229 - 234
  • [29] Signature-based approach for stress-strength systems
    Pakdaman, Zohreh
    Ahmadi, Jafar
    Doostparast, Mahdi
    STATISTICAL PAPERS, 2019, 60 (05) : 1631 - 1647
  • [30] Limits of signature-based detection of buffer overflow attacks
    Kim, S
    Wee, K
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 288 - 293