Arsenic detection in water using microfluidic detection systems based on the leucomalachite green method

2019 ◽  
Vol 11 (42) ◽  
pp. 5431-5438 ◽  
Author(s):  
Annija Lace ◽  
David Ryan ◽  
Mark Bowkett ◽  
John Cleary

This work describes the first use of microfluidic detection technology for arsenic detection in water using leucomalachite green dye.

Molecules ◽  
2019 ◽  
Vol 24 (2) ◽  
pp. 339 ◽  
Author(s):  
Annija Lace ◽  
David Ryan ◽  
Mark Bowkett ◽  
John Cleary

Arsenic contamination of drinking water is a global concern. Standard laboratory methods that are commonly used for arsenic detection in water, such as atomic absorption spectroscopy and mass spectroscopy, are not suitable for mass monitoring purposes. Autonomous microfluidic detection systems combined with a suitable colorimetric reagent could provide an alternative to standard methods. Moreover, microfluidic detection systems would enable rapid and cost efficient in situ monitoring of water sources without the requirement of laborious sampling. The aim of this study is to optimize a colorimetric method based on leucomalachite green dye for integration into a microfluidic detection system. The colorimetric method is based on the reaction of arsenic (III) with potassium iodate in acid medium to liberate iodine, which oxidizes leucomalachite green to malachite green. A rapid colour development was observed after the addition of the dye. Beer’s law was obeyed in the range between 0.07–3 µg mL−1. The detection limit and quantitation limit were found to be 0.19 and 0.64 µg mL−1, respectively.


2013 ◽  
Vol 765-767 ◽  
pp. 1415-1418 ◽  
Author(s):  
Ya Fang Lou ◽  
Zhi Jun Yuan ◽  
Hao Wu

As the network is impacting enormously to all aspects of society, the network security becomes a critical problem. The traditional intrusion detection technology exists some disadvantages: the imperfection of architecture, the slow detecting of system, the vulnerable of itself architecture, and so on. This paper presents an intrusion detection model based on BP neural network which has the incomparable advantages against traditional intrusion detection systems. Therefore, the study of this subject possesses the practical significance.


1970 ◽  
Author(s):  
T. M. Trumble

The problems of providing a fire and overheat detection system for turbine-powered vehicles must be solved during the design phase of the vehicle. In order to accomplish this goal the vehicle design engineer must be aware of the basic constraints involved in the application of fire detection technology. This paper presents a condensed method for understanding, designing and evaluating fire and overheat detection systems. Advanced concepts and technologies such as optical redundancy and high temperature ultraviolet sensors are discussed. Performance of fire and overheat detection systems designed using this approach will provide maximum safety for those using the vehicles, as well as those in its operational envelope.


2014 ◽  
Vol 699 ◽  
pp. 891-896 ◽  
Author(s):  
Mohamad Fani Sulaima ◽  
F. Abdullah ◽  
Wan Mohd Bukhari ◽  
Fara Ashikin Ali ◽  
M.N.M. Nasir ◽  
...  

Pipelines leaks normally begin at poor joints, corrosions and cracks, and slowly progress to a major leakage. Accidents, terror, sabotage, or theft are some of human factor of pipeline leak. The primary purpose of Pipeline leak detection systems (PLDS) is to assist pipeline operators in detecting and locating leaks earlier. PLDS systems provide an alarm and display other related data to the pipeline operators for their decision-making. It is also beneficial because PLDS can enhance their productivity by reduced downtime and inspection time. PLDS can be divided into internally based or computational modeling PLDS Systems and external hardware based PLDS. The purpose of this paper is to study the various types of leak detection systems based on internally systemtodefine a set of key criteria for evaluating the characteristics of this system and provide an evaluation method of leak detection technology as a guideline of choosing the appropriate system.


Robotics ◽  
2020 ◽  
Vol 9 (3) ◽  
pp. 55 ◽  
Author(s):  
Zhuo Wang ◽  
Vignesh Ramamoorthy ◽  
Udi Gal ◽  
Allon Guez

Among humans, falls are a serious health problem causing severe injuries and even death for the elderly population. Besides, falls are also a major safety threat to bikers, skiers, construction workers, and others. Fortunately, with the advancements of technologies, the number of proposed fall detection systems and devices has increased dramatically and some of them are already in the market. Fall detection devices/systems can be categorized based on their architectures as wearable devices, ambient systems, image processing-based systems, and hybrid systems, which employ a combination of two or more of these methodologies. In this review paper, a comparison is made among these major fall detection systems, devices, and algorithms in terms of their proposed approaches and measure of performance. Issues with the current systems such as lack of portability and reliability are presented as well. Development trends such as the use of smartphones, machine learning, and EEG are recognized. Challenges with privacy issues, limited real fall data, and ergonomic design deficiency are also discussed.


Author(s):  
Zhaohui Wu ◽  
Tao Song ◽  
Xiaobo Wu ◽  
Xuqiang Shao ◽  
Yan Liu

Fire detection technology aroused people’s attention increasingly. The main challenge of the fire detection systems is how to reduce false alarms caused by objects like fire’s colors. Most existing algorithms used only features of fire in visual field. In this work, we put forward a new algorithm to detect dynamic fire from the surveillance video based on the combination of radiation domain features model. First, a fire color model is used to extract flame-like pixels as candidate areas in YCbCr space. Second, we convert the candidate regions from the traditional color space into radiation domain in advance by camera calibration. And we use seven features to model the spectral spatio-temporal model of the fire to more accurately characterize the physical and optical properties of the fire. Finally, we choose a two-class SVM classifier to identify the fire from the candidate areas and use a radial basis function kernel to improve the accuracy of the recognition. Two different sets of data are used to validate the algorithm we proposed. And the experimental results indicate that our method performs well in video fire surveillance.


2011 ◽  
Vol 460-461 ◽  
pp. 451-454
Author(s):  
Yue Sheng Gu ◽  
Hong Yu Feng ◽  
Jian Ping Wang

Intrusion detection system is an important device of information security. This article describes intrusion detection technology concepts, classifications and universal intrusion detection model, and analysis of the intrusion detection systems weaknesses and limitations. Finally, some directions for future research are addressed.


2018 ◽  
Vol 14 (8) ◽  
pp. 155014771879461 ◽  
Author(s):  
Yan Hu ◽  
An Yang ◽  
Hong Li ◽  
Yuyan Sun ◽  
Limin Sun

The modern industrial control systems now exhibit an increasing connectivity to the corporate Internet technology networks so as to make full use of the rich resource on the Internet. The increasing interaction between industrial control systems and the outside Internet world, however, has made them an attractive target for a variety of cyber attacks, raising a great need to secure industrial control systems. Intrusion detection technology is one of the most important security precautions for industrial control systems. It can effectively detect potential attacks against industrial control systems. In this survey, we elaborate on the characteristics and the new security requirements of industrial control systems. After that, we present a new taxonomy of intrusion detection systems for industrial control systems based on different techniques: protocol analysis based, traffic mining based, and control process analysis based. In addition, we analyze the advantages and disadvantages of different categories of intrusion detection systems and discuss some future developments of intrusion detection systems for industrial control systems, in order to promote further research on intrusion detection technology for industrial control systems.


Author(s):  
Juan R Aguilar

La violencia con armas de fuego es uno de los problemas sociales más grandes de América Latina. Desde hace algunos años, los sistemas de detección de disparos están cobrando relevancia en la región como una herramienta tecnológica que puede reducirla. Este artículo presenta una revisión de la tecnología de detección de disparos, e intenta examinar su utilización en algunos países de América Latina. Se resumen los principales atributos de funcionamiento de estos sistemas y se revisan investigaciones para evaluar su eficacia en el apoyo a la labor policial, la reducción de la violencia y los crímenes con armas de fuego. Con base en sus principios de funcionamiento y las diferencias urbanísticas y demográficas de las ciudades donde se utilizan, se examina cualitativamente el desempeño de los sistemas de detección de disparos en la región. Abstract Gun violence is one of the biggest social problems in Latin America. In recent years gunshot detection systems have been gaining relevance in the region as a technological tool that may reduce it. This article presents a review of gunshot detection technology, and attempt to examine its use in some Latin American countries. The main operating attributes of these systems are described, and researches conducted to evaluate their effectiveness in supporting police work and reducing gun violence and crimes are reviewed. Based upon the operating principles of these systems and considering the urban and demographic differences of the cities where they are used, the performance and effectiveness of the fire detection systems in the region are qualitatively examined.


Author(s):  
V.P. Kshirsagar ◽  
Sonali M. Tidke ◽  
S.S. Vishnu

Network security is of primary concerned now days for large organizations. Various types of Intrusion Detection Systems (IDS) are available in the market like Host based, Network based or Hybrid depending upon the detection technology used by them. Modern IDS have complex requirements. With data integrity, confidentiality and availability, they must be reliable, easy to manage and with low maintenance cost. Various modifications are being applied to IDS regularly to detect new attacks and handle them. In this paper, we are focusing on genetic algorithm (GA) and data mining based Intrusion Detection System.


Sign in / Sign up

Export Citation Format

Share Document