Researchers Use 3D Printing To Create Bomb-Sniffing Dog Noses

An Iraqi dog handler in Ramadi trains a German shepherd to find explosive samples.

82nd Airborne Division Public Affairs by Sgt. Mike Macleod

AA Font size + Print

An Iraqi dog handler in Ramadi trains a German shepherd to find explosive samples.

Researchers are using 3D printing to make anatomically correct artificial noses modeled after a female Labrador retriever. By Rebecca Carroll

Bomb-sniffing dogs (and their noses) have for some time been part of federal efforts to detect drugs and explosives at airports and other checkpoints.

Now, a new $228,977 3-D printer will churn out some of the best artificial dog noses anywhere.

Because dogs are precision sniffers able to distinguish odors from a greater distance than ordinary vacuums, scientists at the National Institute of Standards and Technology wondered how much the shape of the creatures’ noses factored into their skill.

The researchers began 3-D printing anatomically correct artificial noses modeled after a female Labrador retriever.

The devices expel strong airjets away from the nostrils — as real dogs do, when exhaling — which helps pull in new smelly air “from impressive distances,“ according to NIST scientist Matthew Staymates. The process repeats up to five times a second.

(Read More: The Defense Industry Is Expanding the Use of 3D Printing)

Dog noses have about 50 times as many olfactory receptors as humans and a huge portion of their brains are devoted to processing that data, according to Paul Waggoner, senior scientist at Auburn University’s Canine Detection Research Institute who is not directly involved with the NIST project.

But the quick sniffs help, too. In fact, Waggoner said. “If you watch or look at somebody who’s apprenticed to become a master wine or food taster, they begin to take on some of the same characteristics,” he said, referring to the repeated inhales.  

Staymates and his colleagues at NIST’s Material Measurement Laboratory use their printed noses in “flow visualization experiments in our schlieren optical system,” he said, referring to a device that can visually render variation in air temperature and density and thus colorfully depict vapor flows.  

The research — published in a host of specialized scientific journals — informs security-checkpoint technology developed by the private sector.

The new printer, the Connex 500, is able to print multiple substances into one object, so designers can specify the hard and soft parts of the model dog nose.

The printer — which won’t be used solely or even primarily for dog noses, by the way — has been sitting for several weeks on a pallet near its new home among other additive manufacturing machines at NIST in Gaithersburg, Maryland, waiting for installation by employees of Stratasys, the company that makes the printers.

The agency originally ordered a Connex 350, but Stratasys offered the NIST an upgrade to the Connex 500 for no additional cost, NIST officials said.

The artificial noses aren’t actually used at security checkpoints. “This is strictly a research tool that we’re using in a larger research program,” Staymates said. But the scientists do share their findings, which inform tomorrow’s vapor sampling devices.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • Military Readiness: Ensuring Readiness with Analytic Insight

    To determine military readiness, decision makers in defense organizations must develop an understanding of complex inter-relationships among readiness variables. For example, how will an anticipated change in a readiness input really impact readiness at the unit level and, equally important, how will it impact readiness outside of the unit? Learn how to form a more sophisticated and accurate understanding of readiness and make decisions in a timely and cost-effective manner.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.