Skip to main navigation
Skip to search
Skip to main content
New Jersey Institute of Technology Home
Help & FAQ
Link opens in a new tab
Search content at New Jersey Institute of Technology
Home
Profiles
Research units
Facilities
Federal Grants
Research output
Press/Media
A source-attractor approach to network detection of radiation sources
Chase Q. Wu
, Mark L. Berry
, Kayla M. Grieme
, Satyabrata Sen
, Nageswara S.V. Rao
, Richard R. Brooks
, Guthrie Cordone
Center for Big Data
Computer Science
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
3
Link opens in a new tab
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'A source-attractor approach to network detection of radiation sources'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Radiation Source
100%
Network Anomaly Detection
100%
Radiation Detection
100%
Virtual Point
50%
Detection Method
33%
Detector Network
33%
Computational Complexity
16%
Sensor Systems
16%
Active Field
16%
Security Applications
16%
Operation-based
16%
Existing Algorithms
16%
Homeland Security
16%
Source Location
16%
Source Detection
16%
Sensor Readings
16%
System Testing
16%
Low False Alarm Rate
16%
Estimation Method
16%
Arithmetic Operations
16%
Detection Performance
16%
False Negative Rate
16%
Defense Applications
16%
Radiation Sensor
16%
Grid-based
16%
Likelihood Estimation
16%
Homeland Defense
16%
Detector Location
16%
Simple Arithmetic
16%
Nuclear Detection
16%
Engineering
False Negative
100%
Computational Complexity
100%
Sensor System
100%
Sensor Reading
100%
False Alarm Rate
100%
Detection Performance
100%
Likelihood Estimation
100%
Computer Science
Detection Method
100%
Computational Complexity
50%
Traditional Method
50%
False Alarm Rate
50%
Source Location
50%
Arithmetic Operation
50%
Sensor Reading
50%
Detection Performance
50%
Likelihood Estimation
50%
False Negative
50%
Estimation Method
50%
Homeland Security
50%
Earth and Planetary Sciences
Radiation Source
100%
Detection Method
50%
False Alarm
25%
Estimation Method
25%