Sniffers: Fluid-Dynamic Sampling for Olfactory Trace Detection in Nature and Homeland Security—The 2004 Freeman Scholar Lecture

نویسنده

  • Gary S. Settles
چکیده

Vertebrates aim their noses at regions of interest and sniff in order to acquire olfactory trace signals that carry information on food, reproduction, kinship, danger, etc. Invertebrates likewise position antennae in the surrounding fluid to acquire such signals. Some of the fluid dynamics of these natural sensing processes has been examined piecemeal, but the overall topic of sniffing is not well investigated or understood. It is, however, important for several human purposes, especially sampling schemes for sensors to detect chemical and biological traces in the environment. After establishing some background, a general appraisal is given of nature’s accomplishments in the fluid dynamics of sniffing. Opportunities are found for innovation through biomimicry. Since few artificial (“electronic”) noses can currently sniff in the natural sense, ways are considered to help them sniff effectively. Security issues such as explosive trace detection, landmine detection, chemical and biological sniffing, and people sampling are examined. Other sniffing applications including medical diagnosis and leak detection are also considered. Several research opportunities are identified in order to advance this topic of biofluid dynamics. Though written from a fluid dynamics perspective, this review is intended for a broad audience. fDOI: 10.1115/1.1891146g

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Promiscuous Mode Detection Platform

Among various types of attacks on an Ethernet network, “sniffing attack” is probably one of the most difficult attacks to handle. Sniffers are programs that allow a host to capture any packets in an Ethernet network, by putting the host’s Network Interface Card (NIC) into the promiscuous mode. When a host’s NIC is in the normal mode, it captures only the packets sent to the host. Since many bas...

متن کامل

DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers

To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...

متن کامل

Comparative Analysis of Serum Levels of Aluminum and Lead in Dialysis Patients, Pre and post Dialysis

Background: Accumulation or deficiency of trace elements can occur in hemodialysis patients and it increases risk of cardiovascular or other organs disorders. Special ions levels such as sodium and bicarbonate in dialysis fluid are accurately regulated but the remaining elements are not regularly measured. Aluminum and lead belong to the biologic performance free heavy metals .They also has a t...

متن کامل

The effect of Lecture and Focus Group Teaching Methods on Nursing Students Learning in Community Health Course

Introduction. New methods of teaching in nursing education has not been extensively investigated in Iran. Considering the importance of nursing education promotion and successful application of new methods of teaching, especially focus group method, this study was conducted to determine and compare the effect of lecture, and focus group teaching methods on nursing students' learning in communit...

متن کامل

Aickelin, Uwe and Greensmith, Julie and Twycross, Jamie (2004) 'Immune System Approaches to Intrusion Detection - A Review'. In: ICARIS-2004, 3rd International Conference on Artificial Immune Systems, LNCS 3239, 2004, Catalania, Italy

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005