Barron Montgomery1,2, Christopher O’Grady2, Chuck Yoon2, Mark Hunter2+

Slides:



Advertisements
Similar presentations
Unstructured Data Partitioning for Large Scale Visualization CSCAPES Workshop June, 2008 Kenneth Moreland Sandia National Laboratories Sandia is a multiprogram.
Advertisements

Canny Edge Detector1 1)Smooth image with a Gaussian optimizes the trade-off between noise filtering and edge localization 2)Compute the Gradient magnitude.
Information Extraction from Cricket Videos Syed Ahsan Ishtiaque Kumar Srijan.
Implementing Codesign in Xilinx Virtex II Pro Betim Çiço, Hergys Rexha Department of Informatics Engineering Faculty of Information Technologies Polytechnic.
A Software Solution for the Control, Acquisition, and Storage of CAPTAN Network Topologies Ryan Rivera, Marcos Turqueti, Alan Prosser, Simon Kwan Electronic.
TB1: Data analysis Antonio Bulgheroni on behalf of the TB24 team.
Learning to Detect Faces A Large-Scale Application of Machine Learning (This material is not in the text: for further information see the paper by P.
Pure Path Tracing: the Good and the Bad Path tracing concentrates on important paths only –Those that hit the eye –Those from bright emitters/reflectors.
Machine Vision Edge Detection Techniques ENT 273 Lecture 6 Hema C.R.
April 21, 2016Introduction to Artificial Intelligence Lecture 22: Computer Vision II 1 Canny Edge Detector The Canny edge detector is a good approximation.
Content Based Coding of Face Images
MESH Crystal Injectors
The Electromagnetic Spectrum High Harmonic Generation
Mathematical Derivation of Probability
Jonathan Donkers1, Lin Zhang1+
Measuring the Thickness of Cryosheet Jets
Serial Femtosecond Crystallography
Madhu Karra1, Jason Koglin1,2
Sentiment Analysis and Data visualization Techniques of Experiments
Complications and Troubleshooting
Image Processing For Soft X-Ray Self-Seeding
Structure and Function: Ubiquitination of NEMO and Optineurin
EUTelescope Testbeam Analysis: Summer 2014
Characterizing Optics with White-Light Interferometry
Matter in Extreme Conditions at LCLS:
Kevin Shimbo1, Matt Hayes+
X-Ray Shielding Introduction Application Research Conclusions
Crystallography images
Hutch 4 (XCS) Laser System
Anomaly Detection LCLS data: Introduction Research Conclusion
MAKING WAY FOR LCLS II HERRIOTT CELL IGNIS THE NEED FOR LCLS-II
A remote EPICS monitoring tool
EASE: Alert Management
Designing and Prototyping Optics Table and Shelves
Managing Diffraction Beam
Integration of Blu-Ice into
Effects of Wrapping Vacuum
Scintillation Material Encapsulation Fixture
LCLS CXI Sample Chambers and Engineering Solutions
Values to Normalize Data
Designing a molecular probe for detection
LAMP Vacuum System Documentation
G6PD Complex Structural Study Crystallization Setup
Your Name, Elias Catalano, Robert Sublett, Robin Curtis
Determining a Detector’s Saturation Threshold
HXRSD Helium Enclosure
Crystallography Labeling Using Machine Learning
IT Inventory and Optimization
Structural study of soluble ammonia monooxygenase
Creation and development of a PRP database
IT Inventory and Optimization
Electro Optic Sampling of Ultrashort Mid-IR/THz Pulses
Margaret Koulikova1, William Colocho+
Other Algorithms Follow Up
Analytical Solutions for Heat Distribution in KB Mirror Systems
Repeatability Test of Attocube Piezo Stages
Analytical Solutions for Temperature
Computer Vision Lecture 9: Edge Detection II
Elizabeth Van Campen, Barrack Obama2, Stephen Curry1,2, Steve Kerr2+
Advanced Methods of Klystron Phasing
Ryan Dudschus, Alex Wallace, Zachary Lentz
Jennifer Hoover1, William Colocho2
X-Ray Spectrometry Using Cauchois Geometry For Temperature Diagnostics
Redesigning of The SED Calendars
Automatic compression control for the LCLS injector laser
Russell Edmonds1, Matt Hayes2+ 1LCLS Summer Research Intern
Prototype and Design of High-Speed X-Ray Chopper
Title of Your Poster Introduction Research Conclusions Acknowledgments
Reconstruction algorithms Challenges & Future work
Emergency Information
Presentation transcript:

Barron Montgomery1,2, Christopher O’Grady2, Chuck Yoon2, Mark Hunter2+ Detector Protection Ice, Salt, and Mesh Barron Montgomery1,2, Christopher O’Grady2, Chuck Yoon2, Mark Hunter2+ 1Physics Department, Material Science and Engineering Department, Stanford University, 450 Serra Mall, Stanford, CA 94305, USA 2Linac Coherent Light Source, SLAC National Accelerator Laboratory, 2575 Sand Hill Road, Menlo Park, CA 94025, USA. +Contact: mhunter2@slac.stanford.edu Introduction Data Current Research When working with million dollar technology it’s important to also invest in proper and secure protection. More recently, our detectors have been undergoing damage from unforeseen formations of ice, salt, and mesh. All of these formations diffract the light from the beam to extreme intensities, damaging our detector. The current means of protection for the detector is a simple algorithm which looks for pixels of an intensity higher than 5000 ADU. It has served well as a basic level of protection, but has not been able to account for the aforementioned threats. Here is our progress for developing a stronger means of Detector Protection. I’m currently working on a c++ script that searches for pixels above threshold and then uses a flood fill algorithm to find all other above threshold pixels connected to it. It then runs an edge finder algorithm to label the edges of the above threshold region and checks to see if there are edges within the region, which would indicate the finding of a ’Black Hole’ Give Stephen Hawking his Nobel Prize already. Figure 1: Extreme case of ice rings forming on the DsCsPad Past Research After studying many logged events with ice, salt, and mesh, I noticed that ice would remain visible on the CsPad for multiple events before disappearing. Based on this observation, I wrote a python script which searched for pixels with an intensity above a certain threshold (identifying the ice) and then analyzed subsequent events to see if those same pixels remained above the threshold. This would be good indication of ice formation. The algorithm turns a 3-Dimensional image of an event into a binary grid: changing the intensity of each pixel to 1 or 0 depending on if that pixel was above the intensity threshold or not. It then multiplies repeated pixels in subsequent binary images to see if the pixel stayed above threshold for 2 (or more) events. Although this algorithm proved it’s worth, we soon learned that ice actually moves very subtly around the grid, thus rendering the repeated pixel hit algorithm unreliable to catch every ice event. We have decided to combine multiple algorithms (possibly including the subsequence algorithm) in order to fully protect the detector. Existing above-threshold algorithm Geometry-based radial integration algorithm Subsequence algorithm Black-Hole algorithm The current script I’m working on uses flood-fill techniques to identify ‘Black Holes’ as seen in figure 3. These black holes are portions of the grid where the intensities of the pixels are greater than what the detector is capable of outputting. Conclusions… so far Progress: Black hole algorithm looks most promising so far Radial integration algorithm also looks promising, but geometry will be tricky and error-prone Soon: deploy black-hole algorithm in AMI plug-in (optimize performance after we get some experience) to get experience Weaknesses: Only works when the DAQ is running If one shot can kill the detector we are quite powerless If software is not fast enough we will miss events AMI plugin doesn’t see all events. Could move algorithm to DAQ readout node in future and get all events. In future (LCLS-II) we should try to develop hardware (firmware?) protection. Figure 2: Data from subsequence algorithm: [threshold, n of events] Acknowledgments Use of the Linac Coherent Light Source (LCLS), SLAC National Accelerator Laboratory, is supported by the U.S. Department of Energy, Office of Science, Office of Basic Energy Sciences under Contract No. DE-AC02-76SF00515. Figure 3: Ice rings on DsCsPad with a ‘Black Hole’ Date: 09/06/2016