Skip to main content

Data Interpretation and Algorithms

  • Chapter
  • First Online:

Abstract

Detection of nuclear threats such as the presence and movement of materials that could be used to construct nuclear weapons is essential to nuclear security and may be accomplished by advanced active interrogation sensing systems. A key to performance of these sensing systems is the ability to analyze and interpret the acquired data. This chapter discusses the analysis and interpretation algorithms applied to data collected by sensing systems in the context of nuclear security. The structure of the chapter is as follows: Sect. 8.1 briefly discusses data analysis in nuclear security. Section 8.2 presents planar and tomographic imaging systems, and the following Sect. 8.3 presents data reduction techniques with the main focus on principal components. Section 8.4 introduces data unfolding methods, while Sect. 8.5 introduces sensor networks and distributed detection algorithms. The main conclusions are summarized at the end of the chapter.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. C. Wirz, E. Egger, Int. Rev. Red Cross 87(859), 497 (2005)

    Article  Google Scholar 

  2. M.D. Chinn, R.W. Fairlie, Oxf. Econ. Pap. 59(1), 16 (2007)

    Article  Google Scholar 

  3. L. Devriendt, B. Derudder, F. Witlox, Telecommun. Policy 34(8), 417 (2010)

    Article  Google Scholar 

  4. L. Atzori, A. Iera, G. Morabito, Comput. Netw. 54(15), 2787 (2010)

    Article  Google Scholar 

  5. C.S. Cho, W.H. Chung, S.Y. Kuo, IEEE Trans. Syst. Man Cybern. Syst. 46(3), 356 (2016)

    Article  Google Scholar 

  6. P.L. Lagari, V. Sobes, M. Alamaniotis, L.H. Tsoukalas, Int. J. Monit. Surveill. Technol. Res. 4(4), 54 (2016)

    Article  Google Scholar 

  7. M. Alamaniotis, L.H. Tsoukalas, in 2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI) (IEEE, Piscataway, 2015), pp. 1114–1121

    Google Scholar 

  8. A. Burger, M. Groza, Y. Cui, U.N. Roy, D. Hillman, M. Guo, L. Li, G.W. Wright, R.B. James, Phys. Status Solidi C 2(5), 1586 (2005)

    Article  ADS  Google Scholar 

  9. M.J. Kristo, S.J. Tumey, Nucl. Instrum. Methods Phys. Res. Sect. B Beam Interact. Mater. Atoms 294, 656 (2013)

    Google Scholar 

  10. M. Alamaniotis, S. Terrill, J. Perry, R. Gao, L. Tsoukalas, T. Jevremović, Nucl. Technol. Radiat. Prot. 24(1), 46 (2009)

    Article  Google Scholar 

  11. J.A. Favorite, Z. Perkó, B.C. Kiedrowski, C.M. Perfetti, Nucl. Sci. Eng. 185(3), 384 (2017)

    Article  Google Scholar 

  12. N. Tsoulfanidis, Measurement and Detection of Radiation (CRC press, Boca Raton, 2013)

    Google Scholar 

  13. T.K. Ho, Multi. Classif. Syst. 2096, 53 (2001)

    Article  Google Scholar 

  14. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Comput. Netw. 38(4), 393 (2002)

    Article  Google Scholar 

  15. A. Koschan, M. Pollefeys, M. Abidi, 3D Imaging for Safety and Security, vol. 35 (Springer Science & Business Media, Berlin, 2007)

    Google Scholar 

  16. R.C. Runkle, D.L. Chichester, S.J. Thompson, Nucl. Instrum. Methods Phys. Res. Sect. A Accel. Spectrom. Detect. Assoc. Equip. 663(1), 75 (2012)

    Article  ADS  Google Scholar 

  17. G. Zentai, Int. J. Signal Imaging Syst. Eng. 3(1), 13 (2010)

    Article  Google Scholar 

  18. N.G. Cutmore, Y. Liu, J.R. Tickner, in 2010 IEEE International Conference on Technologies for Homeland Security (HST) (IEEE, Piscataway, 2010), pp. 330–336

    Google Scholar 

  19. J. Allison, K. Amako, J. Apostolakis, H. Araujo, P.A. Dubois, M. Asai, G. Barrand, R. Capra, S. Chauvie, R. Chytracek, et al., IEEE Trans. Nucl. Sci. 53(1), 270 (2006)

    Article  ADS  Google Scholar 

  20. G. Chen, Nucl. Instrum. Methods Phys. Res. Sect. B Beam Interact. Mater. Atoms 241(1), 810 (2005)

    Article  ADS  Google Scholar 

  21. Y. Xing, L. Zhang, X. Duan, J. Cheng, Z. Chen, IEEE Trans. Nucl. Sci. 58(2), 537 (2011)

    Article  ADS  Google Scholar 

  22. S.R. Deans, The Radon Transform and Some of Its Applications (Courier Corporation, North Chelmsford, 2007)

    MATH  Google Scholar 

  23. A. Katsevich, Adv. Appl. Math. 32(4), 681 (2004)

    Article  MathSciNet  Google Scholar 

  24. K. Takei, Hitachi Rev. 53(2), 97 (2004)

    MathSciNet  Google Scholar 

  25. A. Manickavasagan, N. Yasasvy (eds.), in Imaging with Electromagnetic Spectrum (Springer, Berlin, 2014), pp. 17–31

    Google Scholar 

  26. K. Vetter, M. Burks, L. Mihailescu, Nucl. Instrum. Methods Phys. Res. Sect. A Accel. Spectrom. Detect. Assoc. Equip. 525(1), 322 (2004)

    Article  ADS  Google Scholar 

  27. Z. Zhu, L. Zhao, J. Lei, in IEEE Computer Society Conference on Computer Vision and Pattern Recognition-Workshops, 2005. CVPR Workshops (IEEE, Piscataway, 2005), pp. 126–126

    Google Scholar 

  28. Y. Eisen, A. Shor, I. Mardor, Nucl. Instrum. Methods Phys. Res. Sect. A Accel. Spectrom. Detect. Assoc. Equip. 428(1), 158 (1999)

    Article  ADS  Google Scholar 

  29. J. Eberhardt, S. Rainey, R. Stevens, B. Sowerby, J. Tickner, Appl. Radiat. Isot. 63(2), 179 (2005)

    Article  Google Scholar 

  30. Y. Liu, B. Sowerby, J. Tickner, Appl. Radiat. Isot. 66(4), 463 (2008)

    Article  Google Scholar 

  31. B. Sowerby, J. Tickner, Nucl. Instrum. Methods Phys. Res. Sect. A Accel. Spectrom. Detect. Assoc. Equip. 580(1), 799 (2007)

    Article  ADS  Google Scholar 

  32. L.W. Alvarez, J.A. Anderson, F. El Bedwei, J. Burkhard, A. Fakhry, A. Girgis, A. Goneid, F. Hassan, D. Iverson, G. Lynch, et al., Science 167(3919), 832 (1970)

    Article  ADS  Google Scholar 

  33. C. Morris, C. Alexander, J. Bacon, K. Borozdin, D. Clark, R. Chartrand, C. Espinoza, A. Fraser, M. Galassi, J. Green, et al., Sci. Glob. Secur. 16(1–2), 37 (2008)

    Article  Google Scholar 

  34. J. Armitage, D. Bryman, T. Cousins, G. Gallant, A. Jason, G. Jonkmans, S. Noël, G. Oakham, T.J. Stocki, D. Waller, in AIP Conference Proceedings, vol. 1194 (AIP, College Park, 2009), pp. 24–35

    Google Scholar 

  35. L.J. Schultz, K.N. Borozdin, J.J. Gomez, G.E. Hogan, J. McGill, C. Morris, W. Priedhorsky, A. Saunders, M. Teasdale, Nucl. Instrum. Methods Phys. Res. Sect. A Accel. Spectrom. Detect. Assoc. Equip. 519(3), 687 (2004)

    Article  ADS  Google Scholar 

  36. A. Aleksandrov, A. Bagulya, S. Baklagin, M. Chernyavsky, V. Galkin, V. Grachev, N. Konovalova, A. Managadze, N. Polukhina, T. Roganova, et al., in EPJ Web of Conferences, vol. 125 (EDP Sciences, Les Ulis, 2016), p. 02022

    Google Scholar 

  37. K.N. Borozdin, G.E. Hogan, C. Morris, W.C. Priedhorsky, A. Saunders, L.J. Schultz, M.E. Teasdale, Nature 422(6929), 277 (2003)

    Article  ADS  Google Scholar 

  38. R. Hoch, D. Mitra, K. Gnanvo, M. Hohlmann, Opportunities and Challenges for Next-Generation Applied Intelligence (Springer, Berlin, 2009), pp. 225–231

    Book  Google Scholar 

  39. S. Riggi, V. Antonuccio-Delogu, M. Bandieramonte, U. Becciani, A. Costa, P. La Rocca, P. Massimino, C. Petta, C. Pistagna, F. Riggi, et al., Nucl. Instrum. Methods Phys. Res. Sect. A Accel. Spectrom. Detect. Assoc. Equip. 728, 59 (2013)

    Google Scholar 

  40. M. Hohlmann, P. Ford, K. Gnanvo, J. Helsby, D. Pena, R. Hoch, D. Mitra, IEEE Trans. Nucl. Sci. 56(3), 1356 (2009)

    Article  ADS  Google Scholar 

  41. R.A. Johnson, D.W. Wichern, et al., Applied Multivariate Statistical Analysis, vol. 4 (Prentice-Hall, Upper Saddle River, NJ, 2014)

    MATH  Google Scholar 

  42. M. Najim, Modeling, Estimation and Optimal Filtering in Signal Processing (Wiley, Hoboken, NJ, 2008), pp. 335–340

    Book  Google Scholar 

  43. H. Hoffmann, Pattern Recogn. 40(3), 863 (2007)

    Article  Google Scholar 

  44. M. Alamaniotis, H. Hernandez, T. Jevremovic, in 2013 Fourth International Conference on Information, Intelligence, Systems and Applications (IISA) (IEEE, Piscataway, 2013), pp. 1–4

    Google Scholar 

  45. M. Alamaniotis, S. Lee, T. Jevremovic, Nucl. Technol. 191(1), 41 (2015)

    Article  Google Scholar 

  46. C.M. Bishop, Pattern Recognition and Machine Learning (Springer, New York, 2006)

    MATH  Google Scholar 

  47. K. Fukunaga, Introduction to Statistical Pattern Recognition (Academic Press, Cambridge, 2013)

    MATH  Google Scholar 

  48. A.S. Kapadia, W. Chan, L.A. Moyé, Mathematical Statistics with Applications (CRC Press, Boca Raton, 2017)

    MATH  Google Scholar 

  49. C.E. Rasmussen, C.K. Williams, Gaussian Processes for Machine Learning, vol. 1 (MIT Press, Cambridge, 2006)

    MATH  Google Scholar 

  50. L.H. Tsoukalas, R.E. Uhrig, Fuzzy and Neural Approaches in Engineering (John Wiley & Sons, Hoboken, 1997)

    Google Scholar 

  51. V. Kurkova, Neural Netw. 5(3), 501 (1992)

    Article  Google Scholar 

  52. T. Burr, M. Hamada, Algorithms 2(1), 339 (2009)

    Article  Google Scholar 

  53. J. Mattingly, D.J. Mitchell, IEEE Trans. Nucl. Sci. 57(6), 3734 (2010)

    ADS  Google Scholar 

  54. M. Alamaniotis, J. Mattingly, L.H. Tsoukalas, IEEE Trans. Nucl. Sci. 60(3), 2222 (2013)

    Article  ADS  Google Scholar 

  55. M. Alamaniotis, A. Ikonomopoulos, T. Jevremovic, L.H. Tsoukalas, Nucl. Technol. 175(2), 480 (2011)

    Article  Google Scholar 

  56. C. Sullivan, M. Martinez, S. Garner, IEEE Trans. Nucl. Sci. 53(5), 2916 (2006)

    Article  ADS  Google Scholar 

  57. M. Alamaniotis, A. Heifetz, A.C. Raptis, L.H. Tsoukalas, IEEE Trans. Nucl. Sci. 60(4), 3014 (2013)

    Article  ADS  Google Scholar 

  58. M. Kamuda, J. Stinnett, C. Sullivan, IEEE Trans. Nucl. Sci. 64(7), 1858–1864 (2017)

    Article  ADS  Google Scholar 

  59. D. Culler, D. Estrin, M. Srivastava, Computer 37(8), 41 (2004)

    Article  Google Scholar 

  60. P. Boltryk, C. Harris, N. White, J. Phys. Conf. Ser. 15(1), 155–160 (2005)

    Article  ADS  Google Scholar 

  61. R.J. Nemzek, J.S. Dreicer, D.C. Torney, T.T. Warnock, IEEE Trans. Nucl. Sci. 51(4), 1693 (2004)

    Article  ADS  Google Scholar 

  62. A. Sundaresan, P.K. Varshney, N.S. Rao, in IEEE International Conference on Acoustics, Speech and Signal Processing, 2009. ICASSP 2009 (IEEE, Piscataway, 2009), pp. 2901–2904

    Google Scholar 

  63. N.S. Rao, Measurement-based statistical fusion methods for distributed sensor networks, in Distributed Sensor Networks, ed. by S.S. Iyengar, R.R. Brooks (Chapman and Hall/CRC Publishers, Boca Raton, 2005)

    Google Scholar 

  64. M. Wieneke, W. Koch, H. Friedrich, S. Chmel, in Future Security (Springer, Berlin, 2012), pp. 376–387

    Google Scholar 

  65. A. Sundaresan, P.K. Varshney, N.S. Rao, in 2007 10th International Conference on Information Fusion (IEEE, Piscataway, 2007), pp. 1–7

    Google Scholar 

  66. R. Coulon, V. Kondrasovs, K. Boudergui, S. Normand, IEEE Trans. Nucl. Sci. 61(4), 2189 (2014)

    Article  ADS  Google Scholar 

  67. D.S. Hochbaum, B. Fishbain, Ann. Oper. Res. 187(1), 45 (2011)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Miltiadis Alamaniotis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Alamaniotis, M. (2018). Data Interpretation and Algorithms. In: Jovanovic, I., Erickson, A. (eds) Active Interrogation in Nuclear Security. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-74467-4_8

Download citation

Publish with us

Policies and ethics