Guss P.P.,National Security Technologies LLC |
Stampahar T.G.,National Security Technologies LLC |
Mukhopadhyay S.,Base Technologies |
Barzilov A.,University of Nevada, Las Vegas |
Guckes A.,University of Nevada, Las Vegas
Proceedings of SPIE - The International Society for Optical Engineering | Year: 2015
The problem of accurately detecting extremely low levels of nuclear radiation is rapidly increasing in importance in nuclear counter-proliferation, verification, and environmental and waste management. Because the 239Pu gamma signature may be weak, for instance, even when compared to the natural terrestrial background, coincidence counting with the 239Pu neutron signature may improve overall 239Pu detection sensitivity. However, systems with sufficient multiple-particle detectors require demonstration that the increased sensitivity be sufficiently high to overcome added cost and weight. We report the results of measurements and calculations to determine sensitivity that can be gained in detecting low levels of nuclear radiation from use of a relatively new detector technology based on elpasolite crystals. We have performed investigations exploring cerium (Ce3+)-doped elpasolites Cs2LiYCl6:Ce3+ 0.5% (CLYC) and Cs2LiLa(Br6)90%(Cl6)10%:Ce3+ 0.5% (CLLBC:Ce). These materials can provide energy resolution (r(E) = 2.35σ(E)/E) as good as 2.9% at 662 keV (FWHM). The crystals show an excellent neutron and gamma radiation response. The goals of the investigation were to set up the neutron/gamma pulse shape discrimination electronics for elpasolite detectors; perform limited static source benchmarking, testing, and evaluation to validate system performance; and explore application of a maximum likelihood algorithm for source location. Data were measured and processed through a maximum likelihood estimation algorithm, providing a direction to the radioactive source for each individual position. The estimated directions were good representations for the actual directions to the radioactive source. This paper summarizes the maximum likelihood results for our elpasolite system. © 2015 SPIE.
PubMed | U.S. Air force, Base Technologies and Oak Ridge Institute for Science and Education
Type: Journal Article | Journal: American journal of preventive medicine | Year: 2015
Aeromedical evacuation providers care for patients during air transport. By applying standard medical practices, oftentimes developed for ground care, these practitioners perform their mission duties under additional physical stress in this unique medical environment. Awkward postures and excessive forces are common occurrences among personnel operating in this domain. Additionally, anecdotal reports highlight the risk of developing musculoskeletal injuries for these providers. Currently, there is limited research focusing on musculoskeletal injuries in aeromedical evacuation providers.To determine the prevalence of musculoskeletal injuries and associated symptoms in aeromedical evacuation providers to understand the risk and burden of these injuries to military personnel.This study utilized a retrospective review of military medical records containing ICD-9 codes to investigate the incidence of musculoskeletal injuries within flight nurses and medical technicians compared to their non-flying counterparts from 2006 through 2011. Data were analyzed from 2013 through 2014.Although musculoskeletal injuries were identified within the test populations, results showed fewer injuries for aeromedical evacuation populations compared to non-aeromedical evacuation counterparts.One contributing factor may be a potential under-reporting of musculoskeletal injuries resulting from the fear of being placed on limited flying status. As flyers, aeromedical evacuation personnel must undergo yearly medical examinations and complete training courses that emphasize proper lifting techniques and physical requirements necessary for the safe and efficient transport of patients on various platforms. These additional requirements may create a healthy worker effect, likely contributing to lower musculoskeletal injuries.
Base Technologies and Creative Sport Concepts Inc. | Date: 2011-05-17
Liang F.,Huazhong University of Science and Technology |
Gan H.,Base Technologies |
Wang Z.,Base Technologies |
Lu W.,Huazhong University of Science and Technology
Progress in Electromagnetics Research Symposium | Year: 2012
A novel asymmetric dual quarter-wavelength (λ/4) microstrip resonator is proposed, which is composed of two different λ/4 resonators that share the same grounding via.One of the resonators takes the form of stepped-impedance resonator (SIR) which is designed to operate at 2.4 GHz and 5.2 GHz, the other resonator takes the form of uniform-impedance resonator (UIR) which operats at 3.6 GHz.In this study, the structure of asymmetric dual λ/4 resonator is utilized to design triple-bandpass filter (BPF).Compared with the triple-bandpass filter using λ/2 SIR microstrip resonator, the size of filter with this structure can be miniaturized obviously and the design procedure can also be simplified.To verify the presented concept, example of filter with a triple-band chebyshev response operating at 2.4 GHz, 3.6 GHz, and 5.2 GHz was designed and fabricated.The measured results are in good agreement with the full-wave simulation results.
Mukhopadhyay S.,Base Technologies |
Maurer R.,Base Technologies
NATO Science for Peace and Security Series B: Physics and Biophysics | Year: 2015
This article describes the capabilities and types of radiological emergency responses and preparedness provided by the Remote Sensing Laboratory (RSL). RSL is owned and operated by National Security Technologies, LLC. RSL provides the National Nuclear Security Administration with a broad range of scientific, technological, and operational disciplines with core competencies in emergency response operations and support; remote sensing; and applied science and technologies in support of radiological emergency preparedness, and radiological incident response. © Springer Science+Business Media Dordrecht 2015.
Wood P.,Base Technologies
IET Seminar Digest | Year: 2015
Presents a collection of slides covering the following topics: advanced attack; threat analysis; remote information gathering; on-site reconnaissance; spear phishing plan; spear phishing exercise; branch office attack plan; branch office attack exercise; head office attack plan; head office attack exercise.
Base Technologies | Date: 2015-01-22
A support device adapted to support the base of a post or pile above the base of a foot hole excavated in preparation for pouring concrete having a lower tier adapted to contact the base of the foot hole and provide a support surface and an upper tier adapted to provide a post or pile supporting platform. The lower tier and the upper tier are separated by one or more support walls that define a region beneath the base of the post or pile to be filled with concrete.
Base Technologies | Date: 2010-07-27
News Article | November 25, 2008
The US-based Electronic Frontier Foundation has published a guide on how IT professionals can avoid falling foul of the law as a result of ethical hacking. The Electronic Frontier Foundation (EFF) 'Grey Hat' Guide ponders such questions as what a security researcher should do if they unintentionally "violate the law" in the course of their investigations. "A computer-security researcher who has inadvertently violated the law during the course of her investigation faces a dilemma when thinking about whether to notify a company about a problem she discovered in one of the company's products," the guide states. "By reporting the security flaw, the researcher reveals that she may have committed unlawful activity, which might invite a lawsuit or criminal investigation. On the other hand, withholding information means a potentially serious security flaw may go unremedied." The EFF said that researchers in this situation could reconstruct research using technology they are authorised to use, or report the flaw in general terms. However, both of these options are "undesirable", the EFF said. In terms of US law, researchers could inadvertently flout include the Computer Fraud and Abuse Act, anti-circumvention provisions of the Digital Millennium Copyright Act, other copyright law, and other state and international laws, the EFF warned. The EFF, therefore, recommended that security researchers consult with an attorney before undertaking potentially risky research. The guide adds that companies that regularly deal with vulnerabilities, such as software firms, are less likely to sue "innocent researchers". UK IT professionals also need to try to avoid legal entanglement, penetration-testing company First Base Technologies told ZDNet UK on Tuesday. Potential pitfalls include transgression of the Computer Misuse Act (CMA) and breaking anti-terrorism, privacy and human-rights laws, according to Peter Wood, chief of operations for First Base Technologies. "We engage the owner of a system to get explicit permission before doing penetration testing," said Wood. "Some internal employees get a bit over-enthusiastic and unintentionally bring down systems — more frequently than you would expect. Clients have experienced someone doing something silly a couple of times a year. Doing research on the web and then testing exploits on systems will leave you on very dodgy ground." Using tools such as TCP port scanners inappropriately can transgress the CMA, Wood warned. "Even tools like SuperScan will connect to a service and are not non-invasive," he said. Use of such tools can be illegal under the CMA, as the researcher would be using the system for a purpose other than that for which it was originally intended, said Wood. "For example, to do a vulnerability analysis on an SMTP mail server, it's likely you'd connect to a scanning tool, to answer questions about how the mail server is configured," said Wood. "But that would be using the mail server for a purpose [for which] it was not intended." Gaining explicit consent from the owner of the systems to be tested could circumvent this problem, and also overcome potential problems with privacy and human-rights issues, Wood added. "People evaluating security on individual workstations may not have thought of privacy considerations," said Wood. To overcome potential copyright issues, non-disclosure agreements could be entered into, he added.