US20090058710A1 - Methods and apparatus for detecting threats using radar - Google Patents

Methods and apparatus for detecting threats using radar Download PDF

Info

Publication number
US20090058710A1
US20090058710A1 US11/478,026 US47802606A US2009058710A1 US 20090058710 A1 US20090058710 A1 US 20090058710A1 US 47802606 A US47802606 A US 47802606A US 2009058710 A1 US2009058710 A1 US 2009058710A1
Authority
US
United States
Prior art keywords
threat
target
radar
independent
assessment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US11/478,026
Other versions
US7492303B1 (en
Inventor
Arthur C. Levitan
Lester Kosowsky
Original Assignee
PERSONNEL PROTECTION TECHNOLOGIES LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PERSONNEL PROTECTION TECHNOLOGIES LLC filed Critical PERSONNEL PROTECTION TECHNOLOGIES LLC
Priority to US11/478,026 priority Critical patent/US7492303B1/en
Assigned to PERSONNEL PROTECTION TECHNOLOGIES LLC reassignment PERSONNEL PROTECTION TECHNOLOGIES LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KOSOWSKY, LESTER, LEVITAN, ARTHUR C.
Application granted granted Critical
Publication of US7492303B1 publication Critical patent/US7492303B1/en
Publication of US20090058710A1 publication Critical patent/US20090058710A1/en
Assigned to KOSOWSKY, LESTER reassignment KOSOWSKY, LESTER ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PERSONNEL PROTECTION TECHNOLOGIES LLC
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • G01S13/887Radar or analogous systems specially adapted for specific applications for detection of concealed objects, e.g. contraband or weapons
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/02Systems using reflection of radio waves, e.g. primary radar systems; Analogous systems
    • G01S13/06Systems determining position data of a target
    • G01S13/08Systems for measuring distance only
    • G01S13/10Systems for measuring distance only using transmission of interrupted, pulse modulated waves
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/02Systems using reflection of radio waves, e.g. primary radar systems; Analogous systems
    • G01S13/06Systems determining position data of a target
    • G01S13/08Systems for measuring distance only
    • G01S13/32Systems for measuring distance only using transmission of continuous waves, whether amplitude-, frequency-, or phase-modulated, or unmodulated
    • G01S13/34Systems for measuring distance only using transmission of continuous waves, whether amplitude-, frequency-, or phase-modulated, or unmodulated using transmission of continuous, frequency-modulated waves while heterodyning the received signal, or a signal derived therefrom, with a locally-generated signal related to the contemporaneously transmitted signal
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/87Combinations of radar systems, e.g. primary radar and secondary radar
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S7/00Details of systems according to groups G01S13/00, G01S15/00, G01S17/00
    • G01S7/02Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00
    • G01S7/024Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00 using polarisation effects
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S7/00Details of systems according to groups G01S13/00, G01S15/00, G01S17/00
    • G01S7/02Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00
    • G01S7/41Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00 using analysis of echo signal for target characterisation; Target signature; Target cross-section
    • G01S7/411Identification of targets based on measurements of radar reflectivity

Definitions

  • the invention relates generally to the field of threat detection and, more specifically, to a system and method for identifying potential threats and displaying information indicating the position of the potential threats both indoors and outdoors.
  • U.S. Pat. No. 6,359,582 describes a weapons detector and method utilizing Radar in conjunction with stored spectral signatures.
  • the system is said to be capable of measuring the self-resonant frequencies of weaponry. It is claimed that accuracies of greater than 98% can be obtained at distances, preferably between 4-15 yards. It is also claimed to be capable of detecting metal and non-metal weapons on a human body, in purses, briefcases and under clothing and discerning from objects such as belt buckles, coins, keys, calculators and cellular phones.
  • This system has the disadvantage of relying on the presence of unique spectral signatures, which must be pre-stored or learned by a computer employing artificial intelligence techniques.
  • U.S. Pat. No. 6,243,036, titled Signal Processing for Object Detection System describes another concealed weapon detection system.
  • the patent describes detecting concealed weapons by transmitting a horizontally polarized signal, and receiving the reflected signal in two different polarizations (horizontal and vertical), and calculating the difference between levels of the different polarized reflected energy in the time domain, and by using signal processing methods and apparatus to improve the reliability of the detection process.
  • the Army Research Office (ARO) SBIR Topic A02-061, Terahertz Interferometric Imaging Systems (TIIS) for Detection of Weapons and Explosives seeks to “develop and demonstrate a terahertz-frequency imaging array with sufficient spatial and spectral resolution to enable the rapid and effective detection of concealed weapons and explosives.
  • the envisioned sensing system will provide real-time imaging with adequate sensitivity for the short-range remote interrogation of objects and persons that might be concealing either “weapons or explosives” with a parallel focus on collecting “signature information for a set of expected targets and concealment materials.”
  • the Army Research Lab (ARL) SBIR, Topic A02-037, Explosive Detection System is focused on chemical signatures of explosives.
  • the present invention is directed to concealed weapon/explosive detection including improvised explosive devices (IEDS) and, more specifically, to the data processing for a system and method that isolates and identifies potential concealed weapon carriers and IEDs with sufficient warning, both in time and distance, to permit successful defensive action to limit the loss of life and destruction of property.
  • IEDS improvised explosive devices
  • the invention is appropriate for use both indoors and out, is benign to people and property in the interrogated area, and has the potential to be portable.
  • An exemplary embodiment of a system consistent with the present invention uses two transmitted Radar signals at orthogonal polarizations to simultaneously pan an environment for potential targets, measures the difference between the Radar signal levels returned or reflected and exploits the difference between normal background areas and threat areas resulting from, e.g., the presence of weapons or other hardware, to present to an operator a visual representation of the examined area with potential threats highlighted using visual markers such as distinctive coloring, particular shapes, or other visual indicia of information, e.g., a potential threat, associated with the different areas which are examined.
  • the method and apparatus of the present invention can be mounted on mobile devices or positioned at fixed locations.
  • the mobile mounted embodiments can be used by trucks and/or other vehicles to identify possible roadside threats or threats which may exist in the vehicle's direction of travel.
  • threats include, e.g., above ground mines, improvised explosive devices and/or other types of weapons.
  • the display may limit the visual display of information to areas, e.g., cells of a scanned region, where a human presence is detected, e.g., through the use of thermal or other information.
  • areas e.g., cells of a scanned region
  • thermal or other information e.g., through the use of thermal or other information.
  • One embodiment of the present invention focuses on active millimeter wave (MMW) Radar to detect explosives and weapons because Radars at this frequency have several advantages.
  • MMW millimeter wave
  • some of the components found in hidden explosives have dimensions comparable to the wavelength of the Radar. In theory, this fact indicates that any conductive components will be significant reflectors of electromagnetic (EM) energy.
  • EM electromagnetic
  • the explosive component has a significant dielectric constant that will alter the EM field making it more likely to be detectable by this Radar. Other wavelengths of Radar could also provide valuable algorithm inputs.
  • One embodiment of the present invention uses a Frequency Modulation/Continuous Wave (FM/CW) waveform alone.
  • FM/CW Frequency Modulation/Continuous Wave
  • another embodiment recognized by those skilled in the art would be the utilization of other waveforms, such as Pulse Doppler or Frequency Shift Keying (FSK).
  • FSK Frequency Shift Keying
  • another embodiment could utilize several waveforms transmitted simultaneously or near simultaneously that would take advantage of the differences in the way the waveform interacts with the target to provide additional independent assessments of the threat potential of a given detected target.
  • One embodiment of the active millimeter multiple polarization threat detection system consistent with the present invention transmits and receives Radar signals of both horizontal and vertical polarizations.
  • the “population independent” approach can be utilized independently for threat detection.
  • the combination of these two families of assessments provides a higher probability of threat detection and a lower probability of false alarm than either one by itself
  • the algorithms that are crucial to rapidly evaluating the threat potential of an individual amongst other individuals at a relatively long distance and the existence of above surface IEDs rely on the availability of orthogonally polarized target information and/or a multiplicity of Radar waveforms and/or a multiplicity of radar wavelengths.
  • the systems or methods are capable of being implemented without the need for complex signal processing, thereby reducing implementation costs relative to many of the known systems.
  • the methods and/or apparatus provide an integrated, threat-driven solution to the threat detection problems discussed above.
  • the present invention can distinguish a homicide bomber outfitted with an explosive vest from an average innocent individual, can distinguish an individual carrying a hidden weapon from an average innocent individual, and can distinguish IEDs from the background environment.
  • the noise-like returns from objects, like foliage add incoherently to each other from scan to scan, whereas the return from man-made objects or hard targets add coherently.
  • the summation of the scans is the integration process whereby returns from the individual will separate from the background at the same range.
  • a multi-stage method can be employed, which advantageously utilizes the relationship between the peak returns per scan over the target or the peak returns from a dwelling on a target and the summation of all returns per scan over the target or the summation of all returns from a dwelling on a target, obtained from the transmission and reception of different polarizations as one “vote” (population independent) and the relationship between the returns from the individual or object in question and the average of returns from other individuals or objects and/or background interrogated during that deployment session provides another “vote” (population dependent).
  • the measured data that contributes to each vote passes a threshold test in order to make a threat declaration.
  • FIG. 1 illustrates an exemplary system and various signals passed between the system components in accordance with the present invention.
  • FIG. 2 illustrates an exemplary system and various signals passed between the system components in accordance with the present invention.
  • FIG. 3 illustrates a data file used to implement an embodiment of the present invention.
  • FIG. 4 illustrates a flowchart of operations consistent with the present invention.
  • FIG. 5 illustrates the appearance of the image display on the monitor during the target acquisition process including superimposing reflected signal strength, which above a certain identified threshold level identifies a target to be evaluated further to identify if the target is a threat.
  • FIG. 6 illustrates a table of received reflected signals of varying polarity which are utilized to determine whether the target is a threat.
  • FIG. 7 illustrates a table of received reflected signals of varying polarity which are utilized to determine whether the target is a threat.
  • FIG. 8 illustrates a table of received reflected signals of varying polarity which are utilized to determine whether the target is a threat.
  • FIG. 9 illustrates actual data representative of targets which are threats and non-threats, with their associated detected reflected energy levels.
  • FIG. 10 illustrates raw signal return plots indicative of a threat and a non-threat.
  • FIG. 11 illustrates a flowchart of operations consistent with the present invention.
  • FIG. 12 illustrates the modeled geometry of a typical target that is a threat.
  • a family of threat declaration methods and systems identifies targets which are threats, independent of analyses of other targets, dependent on analysis of other targets and/or both in concert. It accomplishes this by addressing the relationship between two independent data sets gathered and analyzed individually on each target.
  • the two independent data sets consist of data obtained by transmission of a Radar signal on a vertical polarization and receiving reflected returns on a vertical polarization (VV) and the simultaneous transmission of a Radar signal on a horizontal polarization and receiving a portion of the reflected horizontally polarized return (HH).
  • the dual polarization of transmitted signals using vertical polarization on transmit and vertical polarization on receive and using horizontal polarization on transmit and horizontal polarization on receive is constructed in real time in order to create a database which is used in both the “independent” and “dependent” families of threat declaration methodologies and systems described generally above, and in detail below.
  • the determination of whether an individual is a threat or not can be accomplished in a typical instance of a person (target) wearing a bomber vest (threat) by recognizing the following.
  • the bomber vest is typically composed primarily of cylinders consisting of metallic pipes and/or high dielectric material shaped in the form of cylinders. While these cylinders are generally placed vertically around the torso of the suicide bomber, the application of the multi vote process eliminates the orientation of the explosives as a factor in the final assessment.
  • this arrangement of vertical cylinders yields larger returns (Radar signal reflections), in this instance VV, than the other co-polarization pair, in this instance HH.
  • the ratio of
  • ratios is then utilized to identify a target who is a threat. It should be noted that this ratio is independent of the returns from other targets and non-targets within the Radar scanning area (scene).
  • HH could be larger than VV.
  • differences between the returns corresponding to different transmitted signal polarizations, e.g., horizontal and vertical, could be used in detecting a threat.
  • threat detection can therefore be based on the ratio of returns corresponding to different polarizations, using, e.g.,
  • a threat may be declared present when R exceeds a first threshold (experimentally determined to be some amount above 2) indicating a significant difference between vertical and horizontal signal components.
  • the threshold may be predetermined or dynamically determined.
  • the values input to the R calculation are obtained from the target peak signal return and summation of returns within the azimuth and range expanse of the target as a function of polarization of each target. Thus, several calculations of the ratio are made, e.g.:
  • R peak
  • R peak is constantly replaced by subsequent measures if that measure is greater and R summation is constantly updated and becomes R cumulative summation after the initial scan over or the dwell on the target.
  • certain threats may have unique attributes of changing the polarization of a reflected signal from the transmitted signal.
  • these threats may be detected in whole or in part by factoring into the detection process the relative amount of horizontal returns from a vertically polarized transmitted signal, and/or the vertically polarized returns reflected back by a target which has been illuminated by a horizontally polarized signal.
  • the values of X and Y may advantageously be determined empirically by evaluation of experimental or “on-scene” results.
  • the above-described family of threat declaration systems which are independent of other targets' returns can and should be augmented by additionally performing threat declaration methods which are dependent on the returns (either real-time, historic, or both) of other targets in the Radar scanned scene to deal with random orientations of explosive materials. Applying both families of threat declaration methods or systems to gathered data will yield a higher probability of threat detection and a lower probability of false alarm than for either family implemented individually.
  • This second family of dependent threat detection methodologies comprises the broader set of conclusions relative to the expected returns from someone wearing concealed explosives and/or carrying a concealed weapon versus the rest of the population at or before the time of current measurement. For this set of methodologies, one can
  • Transceiver 110 is a homodyne type in which a linearized sweep of the transmitter oscillator is sampled, sent to signal processor 109 over VV link 102 and HH link 101 , and mixed with the target return to generate an IF frequency representing twice the range to the target in signal processor 109 .
  • the two IF analog frequencies are digitized, processed in FFT, and used by the operating code to generate target information. Data from multiple scans or dwells on a target for each polarization pair and waveform is fused into a set of features about each detected target.
  • Data from the scans is transferred to population dependent decision algorithms 105 and population independent decision algorithms 104 .
  • VV data could be sent to population dependent decision algorithms 105 to be compared with a threshold signal strength for threats (based on average or typical returns from non-threat targets). This would result in a “vote” for the target to either be declared a threat or not, and the vote forwarded to threat declaration 108 .
  • VV and HH data may be sent to population independent decision algorithms 104 , where the ratio of
  • Threat declaration 108 would combine the two votes, and declare a threat if, for instance, both votes indicated a threat. Alternatively, a threat could be declared if either vote indicated a threat. Another possibility would be to declare a “possible threat” if the votes are not the same.
  • VH (transmitted with vertical polarization and received with horizontal polarization) data 103 could be sent from a receive only Radar receiver 110 to signal processor 109 , and this additional data could be processed in population independent decision algorithms 104 to either modify its “threat” vote, or to provide an additional vote, to threat declaration 108 .
  • signal processor 109 may identify the average detected signals at each polarization, and the peak detected signals at each polarization, and additional threat assessments could be made based on these inputs. For example, while the cumulative
  • FIG. 2 illustrates an alternative embodiment of the present invention.
  • there are two transceivers each transmitting and receiving on vertical and horizontal polarizations (using antennas 211 ).
  • FMCW Two Channel Radar Transmitter/Receiver 205 utilizes FMCW signals
  • Pulse Doppler Two Channel Radar Transmitter/Receiver 202 utilizes Pulse Doppler Radar signals.
  • the resultant vertical and horizontal reflected signals 201 are passed to signal processor 210 .
  • Pulse Doppler Population Dependent Algorithms 206 Pulse Doppler Population Independent Decision Algorithms 208 , FMCW Population Dependent Decision Algorithms 207 , and FMCW Population Independent Decision Algorithms 209 .
  • These algorithm processors 204 transmit their threat “votes” to Threat Declaration 203 , which processes the various threat determinations (votes) into an overall threat assessment (i.e., Threat, No Threat, or Ambiguous or Uncertain).
  • FIG. 3 illustrates a data file of Radar returns consistent with the present invention.
  • the Radar systems feed FFT sampled data for each polarization/waveform pair for subsequent analysis by the threat determination/declaration algorithms.
  • the raw data is in the form of a tabulated list consisting of polarization pair (e.g., vertical/vertical and vertical/horizontal) 301 , scan number (time) 302 , and ⁇ range, azimuth, elevation, velocity and signal amplitude ⁇ 303 .
  • This data is compiled for each target within the Radar scanned scene. This data file is then used to perform the Population Independent and Population Dependent threat determination evaluations.
  • FIG. 4 illustrates an advantageous process for performing threat determination evaluations consistent with some embodiments of the present invention.
  • This process involves receiving inputs from transceivers of orthogonal polarizations (such as horizontal and vertical) illuminating the same target scene.
  • the received inputs are used to compute a “vote” regarding the determination of a threat using Population Independent evaluations, such as by taking the ratio of vertical polarized returns over horizontal polarized returns, and voting for the existence of a threat based on this ratio.
  • a second “vote” regarding the determination of a threat using Population Dependent evaluations such as by comparing the target's returns (or the average target returns, or the peak target returns, or the cumulative target returns, for example) with the returns for other targets in the scanned scene, or with historic “non-threat” target returns. These “votes” are then utilized to calculate an overall threat assessment (discussed in relation to FIG. 8 ).
  • target extent and target centroid processing schemes need to be determined. This is accomplished in the Data Pre-Processing 401 stage, which receives signal data from Signal Processor 420 .
  • the total, target caused Radar return is made up of a plurality of range-azimuth cell Radar returns 402 resulting from a multiplicity of transmitted pulses.
  • a sliding window in range 403 and angle 404 allows the accumulation of all the amplitudes in all the range-azimuth cells associated with each target.
  • the range-azimuth cell Radar returns must be pre-processed to prepare them for the data assessment algorithm 413 . Since the system utilizes multiple polarizations, the data from both channels needs to be associated with each target and conclusions drawn from the differences. Scan by scan data needs to be associated for each target, also, to deal with issues of target track continuity, masking and unmasking, and orientation.
  • both the scene-averaging algorithm (target dependent) 405 and the polarization ratios algorithm (target independent) 406 are implemented. This is accomplished by measurement of the level of all the pulses transmitted and received in all the populated cells associated with each target for each scan over the scene by each independent Radar at its corresponding polarization. This advantageously yields a dynamic determination of the range adjusted 407 peak 408 and summation of levels returned from all the target-associated cells 409 in the scene at both polarizations.
  • the average level 412 is also computed. All detected returns within the target expanse are tagged with a time stamp, polarization and waveform along with its range, range rate, azimuth angle and elevation angle 410 . Once the peak level, average level and sum of levels are obtained, this information is added to the tag for each target 411 .
  • FIG. 5 shows the returns that would be identified as relating to a specific target 503 .
  • the amplitude of all the returns from the range expanse of the target that occur from both small errors in the range measurement and because of the finite range expanse of the target and the amplitude of the return (scanning from left to right) reaches a predetermined threshold indicative of the beginning of a target (the leftmost edge of target 503 ), such as the return signal 502 reaching threshold 505 , subsequent scan returns are marked as being from target 503 , until the signal level 502 drops below threshold 505 on the rightmost edge of target 503 , signifying the final return from target 503 for that Radar scan.
  • this is operation 402 to determine target expanse in range and azimuth.
  • operation 407 adjusts all amplitudes by a normalization factor, such as for signal attenuation due to the range (distance) from the transmitter to the target (here, 120 feet).
  • a normalization factor such as for signal attenuation due to the range (distance) from the transmitter to the target (here, 120 feet).
  • amplitude figures for the target can be compared with amplitude figures for other targets (in the present scene or from historic data) at varying distances from the transmitter.
  • FIG. 5 depicts a scanned scene as it would appear on a visual-monitor 501 , with the returns 502 of a specific target 503 (and also shown individually as an inset 506 on monitor 501 ), with the range 507 superimposed on the monitor, as well as threshold 505 , which would indicate a signal amplitude indicative of a target, and threshold 504 , which may be indicative of the amplitude of a threat, for reference in a target dependent threat analysis.
  • FIGS. 6 , 7 , and 8 show hypothetical examples of vertical and horizontal polarized signal return data for a selected target, along with an indication of the threat determination based on a target independent threat analysis.
  • Each scan (from right to left) of each transmitter (one for each polarization) in each example takes 100 msecs.
  • the “resolution bin width” for each example is 10 msecs.
  • the transmitter angle is “1”, as seen in columns 601 and 602 , row 611 of FIG. 6 , and in columns 701 , 702 , 801 , 802 , and rows 711 and 811 of FIGS. 7 and 8 , respectively.
  • the amplitude 603 of the vertically polarized return is 1,200, and the horizontal return amplitude 604 is 1,000. Assuming that a target would have a return amplitude of at least 6,000, the determination 605 is that there is no target in this portion of the Radar scanned scene.
  • the vertical return 603 is 32,300 and the horizontal return 604 is 8,800. Since both are above the threshold of a target (6,000), determination 605 is that this portion of the scene contains a target.
  • the horizontal and vertical polarized returns are then accumulated in columns 607 and 606 , respectively.
  • 608 factor is computed at 3.94 for the target at this point in time. Assuming a historical determination that a
  • both vertical 603 and horizontal 604 returns (36,200 and 9,200 respectively) exceed the historic threshold for a target return (6,000), and therefore target indicator 605 indicates a “Y” for the existence of a target
  • the vertical polarized return of 36,200 is added to the accumulated return of vertical polarized returns for this target in the first “sweep” of 97,600, yielding a new cumulative magnitude of 133,800 (column 606 ).
  • the new horizontal polarized return cumulative value is 36,100 (column 607 ), and the newly computed cumulative
  • the target is still present at angles 4 and 5 of scan 2 , and these signal return amplitudes (columns 603 and 604 ) are added to the cumulative totals of columns 606 and 607 .
  • ratios are 4.03 and 4.06, respectively, and therefore threat determination 609 continues to be “no threat”.
  • the target is no longer present, as indicated by the values in columns 603 and 604 .
  • FIG. 7 is a data file similar to that of FIG. 6 , except that the VV returns 703 and VV cum 706 are larger when a target is present (rows 712 and 715 ) but similar to FIG. 6 when there is no target present (rows 713 , 714 , and 716 ).
  • the HH returns 704 and HH cum 707 , and target determination 705 are the same as FIG. 6 .
  • FIG. 8 is a data file similar to that of FIGS. 6 and 7 , except that the VV returns (column 803 and rows 812 and 815 ) and VV cum 806 returns are higher than for either FIG. 6 or FIG. 7 , but similar to FIGS. 6 and 7 when there is no target present (rows 813 , 814 , and 816 ).
  • the HH returns 804 and HH cum 807 , and target determination 805 are the same as FIGS. 6 and 7 .
  • These returns result in cumulative
  • an additional threat “vote” could be based on a
  • the VV levels of column 803 can be compared to the average VV levels over the entire scene (normalized for range distances). These latter targets are likely non-threatening, and would illustratively average about 35,000 per “resolution bin width”. As the present target's VV values from FIG. 8 are approximately double the average value of the other targets in the scene (or of historical target values from the scene in previous scans), the “vote” from this analysis would also be “Yes”, indicating a threat.
  • the “Yes” indication from the target independent determination, combined with the “Yes” vote from the target dependent determination would strongly indicate that the target was a threat, and the combined threat determination would be “Yes”.
  • the time ordered summation of the data for each scan and each direction is generated.
  • the process adds to the summation over tune, keeping track of the value at each time interval and the summed value at each time value. Every time the scan and direction state changes (for purposes of discussion, every 100 msec), the sum is computed for that condition.
  • This summed data is averaged over time and number of data points to feed into the threat declaration algorithm sequence. The number of contributors to each summation and the average level is computed and also feeds the threat declaration algorithm.
  • the integration time has to be set shorter than that time for the probability of false designation to be zero. For this exemplary evaluation, for targets at 30 meters and for an empirical threshold setting of 12,000,000 and an integration time of 0.6 seconds, P cd approaches 100 percent with no P fd .
  • FIG. 10 shows a typical plot of a Radar return.
  • the x-axis 1010 is a measurement of the distance from the Radar.
  • the y-axis 1020 is a power measurement for each pulse in normalized units. Similar plots can be generated for each channel, for single and multiple individuals, and polarization choices. In this case 4 seconds of data is shown.
  • the peak signal achieved is determined by examining the returns in each 100 msec interval.
  • the Peak Sum is the summation of all signals in the dominant 100 msec interval.
  • Clutter which is defined as any returns that are not a result of the targets of interest, can play an important role in the ultimate system.
  • Known objects are both clutter and valuable reference points.
  • fixed objects buildings, cars, poles, etc.
  • clutter they have to be suppressed so that they do not desensitize the target detection process because of their size (buildings, cars, mailboxes, etc.) relative to a person.
  • valuable reference points they provide range and azimuth clues that can keep the system design as simple as possible. They also have, in the case of fixed, stationary objects, fixed GPS coordinates that can be exploited for threat suppression. They define the “detection zone” and provide scene references. Creating a “detection zone” allows for clutter suppression by simple post-processing rather than complex Radar implementation techniques.
  • FIG. 11 addresses what is done once the data starts coming in from the deployment.
  • the process of threat declaration takes the human operator out of the loop as much as possible and presents no extraneous information that has to be interpreted.
  • the essence of the concept is that it is recognized that the way Radar interacts with complex targets is not well known or quantifiable.
  • the final Radar signal processing will calibrate itself continuously, based on the average of the reflected energy at the time of measurement for the target dependent algorithms and by establishing the thresholds for the target independent algorithms at the time of the deployment on any given day. Both numbers improve as more targets are examined.
  • the operations of FIG. 11 are applicable to both the target independent and target dependent threat detection systems.
  • the region to be protected is scanned.
  • automatic operation 1120 all azimuths in the “detection zone” which detect a target are identified, and the associated amplitude and range data is gathered for that target.
  • a 1 meter (an exemplary range resolution cell) window slides in 0.1 meter increments over the range data to establish the amplitude vs. angle data to automatically populate the associated data (file) table.
  • the amplitudes are automatically adjusted by the range attenuation calibration curve (algorithm).
  • the actual amplitude vs. angle data is compared to the expected antenna gain pattern to establish the validity of the detection.
  • the summation of all Radar returns is automatically stored in 160 .
  • the amplitudes obtained on each scan for up to 1 second are automatically summed.
  • the sum of the amplitudes (up to 1 second worth) is automatically compared with the threat declaration threshold.
  • a threat is automatically declared, and the operator's display is automatically annotated with the range and azimuth of the threat target.
  • the video display and the Radar are automatically fused, and marked as a threat.
  • an alert is signaled (such as an aural alarm or visual alert symbol).
  • the technology incorporated in some embodiments described herein utilize the intensity and polarization characteristics of the Radar return from a potential threat together with system algorithms to remotely detect modest amounts of metal/dielectric that could indicate the presence of explosives or other concealed weapons.
  • These embodiments which would be capable of screening potential threats at ranges in excess of 50 meters, demonstrate a low-cost COTS (Commercial Off-The-Shelf) design which satisfies the requirements of civil law enforcement, force protection, military, and public safety in buildings and schools.
  • COTS Common Off-The-Shelf
  • the selection of a Radar system at frequency 77 GHz has several performance and cost advantages. From a performance standpoint, some of the components found in an explosive vest have dimensions comparable to the wavelength of the Radar. This fact indicates that any conductive components will be significant reflectors of electromagnetic (EM) energy. Second, the explosive component has a significant dielectric constant that will alter the EM field making it more likely to be detectable by this Radar.
  • EM electromagnetic
  • the Radar return from a suicide vest is made up of reflections from all the components of the vest, which include wires and cylinders found in the vest, rifle barrels, weapons components, and the individual.
  • the theoretical contribution of each of these components to the Radar backscatter can be derived from the Radar and Radar-Cross-Section equations.
  • modeling is complicated by the orientation of the components and the complex interactions between the person wearing the vest and the vest components. An incomplete understanding of these interactions compounds modeling these complex interactions. In addition, at this frequency, the interactions change with small movements of the target.
  • the calculation of the signal strength and the signal strength dependencies as set forth below describe how the design parameters determine the performance of the system and how some of the design parameters are determined from the proposed system requirements.
  • the energy reflected from a target competes with background noise from many sources.
  • the Radar Range Equation rearranged to calculate Signal to Noise Ratio
  • the signal to noise ratio is directly proportional to the Transmitted Power, PT, the square of the Antenna Gain, G, the square of the Wavelength, ⁇ , and the Radar Cross Section of the target, ⁇ , and inversely proportional to the fourth power of the distance to the target, R, the Bandwidth of the Receiver, B, the Noise Figure, NF, and miscellaneous Losses, L T .
  • K is the Boltzmann constant
  • T is the receiver temperature in degrees Kelvin.
  • the elevation beamwidth at a distance to the target should encompass the height of the individual. Assuming an individual to be on the order of 2 meters, the calculation determines the resultant angle or beamwidth to be 1.15 degrees, for a proposed distance to the furthest target of 50 meters. The beamwidth determines the diameter of the antenna at the proposed frequency of 77 GHz.
  • the Diameter, D equals a constant factor, typically 1.22, times the speed of light, c, and divided by the product of the beamwidth and the frequency, f, and equals 0.12 meters.
  • the Diameter, D is represented as
  • the calculation of the Signal to Noise Ratio for an embodiment of the proposed solution is 2.8 dB or nearly twice the noise present in the system for a miniscule 0.1 square meter target. This suggests that even for the very modest transmitted power levels and conservative design parameters described herein, sufficient detectable signal will be available for the system to differentiate target backscatter from the noise background.
  • the unique visual characteristics of explosives vests consist of their size, shape, explosive charge, and fuse mechanism. Similarly the vest possesses unique Radar characteristics, including its reflectivity, polarization, resonance effects, and interference patterns.
  • FDFD finite difference frequency domain
  • the computed two-dimensional farfield distribution was approximately extended to three dimensions to account for the finite heights of the human and the cylinders. Approximating the human torso as a rectangle with height 100 cm and width 35 cm (about 3 feet by 14 inches), and the height of the cylinders being 25 cm (about 10 inches), it is reasonable to scale the 2D farfield signals by the heights of each target respectively. This follows from the fact that the farfield radiation pattern of an electrically large aperture is proportional to its illuminated area, and the target area is already being accounted for in the 2D computation. In each polarization case, the intensities are normalized to that of the rectangle of human tissue medium 1230 without the cylinders.
  • the sidelobes are higher when the human rectangle scatterer has the metal cylinders attached.
  • the main beam signal for both human and cylinders is 92.5% (7.5% below) that of the human rectangle alone for horizontal polarization.
  • the cylinders add 7.7% signal level to 107.7% of the human alone. This is due to the strong scattering of the vertically oriented cylinders 1250 reflecting all of the vertically polarized electric field.

Abstract

Methods and apparatus for early detection and identification of a threat such as individuals carrying hidden explosive materials, land mines on roads, etc. are disclosed. One method comprises illuminating a target with radiation at a first polarization, collecting first radiation reflected from the target which has the same polarization as the first polarization, illuminating a target with radiation at a second polarization, and collecting second radiation reflected from the target which has the same polarization as the second polarization. A threat determination is then made based on the difference between the energy values of the first and second collected radiations. In other embodiments, the difference between energy values is used in conjunction with an evaluation of the returned energy in comparison with returned energy from other targets in order to additionally assess whether the primary target is a threat.

Description

    RELATED APPLICATIONS
  • The present application claims the benefit of U.S. Provisional Patent Application Ser. No. 60/798,885, filed on May 9, 2006, titled “SYSTEMS AND METHODS FOR THE DETECTION OF CARRIED AND “LEFT BEHIND” IMPROVISED EXPLOSIVE DEVICES”, which is hereby expressly incorporated by reference.
  • FIELD OF THE INVENTION
  • The invention relates generally to the field of threat detection and, more specifically, to a system and method for identifying potential threats and displaying information indicating the position of the potential threats both indoors and outdoors.
  • BACKGROUND OF THE INVENTION
  • The suicide or homicide bomber has been identified as the one threat that is virtually unstoppable. The thinking of the bomber defies all societal norms. With that being said, the logical solution to the problem would be the development of a means for detecting the bomber at a safe distance from a potential target. To date, there are no known concealed weapons or explosive detection systems available that purport to detect a concealed weapon (or weapons) or explosive devices from a distance of more than 20 yards. Reference is made to an article in the July 2002 Discover Magazine entitled “Beyond X-ray Vision” by Ivan Amato for a recent survey of the current state of the technology. Attention is also called to an article in the fall 1998 The Bridge published by the National Academy of Sciences entitled “Preventing Aircraft Bombings” by Lyle Malotky and Sandra Hyland for additional background information on the problem to be solved.
  • Almost every known detection system is electromagnetic-based and requires an individual to pass through a fixed passageway. When metallic objects pass through the passageway, a warning signal is activated because a change in magnetic flux is detected. This type of system either detects or does not detect a metal object and makes no determination relative to the amount of metal present. Keys, jewelry, watches, and metal-framed eyeglasses may all trigger such a system.
  • U.S. Pat. No. 6,359,582 describes a weapons detector and method utilizing Radar in conjunction with stored spectral signatures. The system is said to be capable of measuring the self-resonant frequencies of weaponry. It is claimed that accuracies of greater than 98% can be obtained at distances, preferably between 4-15 yards. It is also claimed to be capable of detecting metal and non-metal weapons on a human body, in purses, briefcases and under clothing and discerning from objects such as belt buckles, coins, keys, calculators and cellular phones. This system has the disadvantage of relying on the presence of unique spectral signatures, which must be pre-stored or learned by a computer employing artificial intelligence techniques.
  • Another patent, U.S. Pat. No. 6,243,036, titled Signal Processing for Object Detection System describes another concealed weapon detection system. The patent describes detecting concealed weapons by transmitting a horizontally polarized signal, and receiving the reflected signal in two different polarizations (horizontal and vertical), and calculating the difference between levels of the different polarized reflected energy in the time domain, and by using signal processing methods and apparatus to improve the reliability of the detection process.
  • Information at http://www.nlectc.orv/virlib/InfoDetail.asp?intinfoID=201 and http://www.rl.af.mil/div/IFB/tefchtrans/datasheets/CWD-LPR.html, indicates that Lockheed Martin, under contract to the Air Force Research Laboratories and the National Institute of Justice, is in the process of developing a dual-mode (millimeter wave/infrared) camera to detect weapons concealed on an individual. The information indicates that the system will operate at a range of 10 to 40 feet, without the control or cooperation of the individual under surveillance. The described system develops images from the returned Radar energy. The image information is processed using algorithms to automatically detect and recognize concealed weapons. The detection and position information from the Radar sensor would be linked to a second sensor IR or visual camera to display the subject to authorities.
  • In addition to the above described detection systems, there are several new initiatives being pursued under the auspices of the Small Business Innovation Research (SBIR) program in the Concealed Weapons Detection arena. The DARPA SBIR, Topic SB022-033 entitled Personnel and Vehicular Monitoring and Tracking at a Distance seeks to “develop 3D biometric technologies as part of a multi-modal system to detect, track and recognize humans . . . at a distance to support early warning, force protection, and operations against terrorist, criminal and other human based threats.” The particular focus of this work is 3D imaging. The Army Research Office (ARO) SBIR Topic A02-061, Terahertz Interferometric Imaging Systems (TIIS) for Detection of Weapons and Explosives seeks to “develop and demonstrate a terahertz-frequency imaging array with sufficient spatial and spectral resolution to enable the rapid and effective detection of concealed weapons and explosives. The envisioned sensing system will provide real-time imaging with adequate sensitivity for the short-range remote interrogation of objects and persons that might be concealing either “weapons or explosives” with a parallel focus on collecting “signature information for a set of expected targets and concealment materials.” The Army Research Lab (ARL) SBIR, Topic A02-037, Explosive Detection System, is focused on chemical signatures of explosives. Such development programs further highlight the need for improved concealed weapon detection systems. The Air Force SBIR, Topic AF03-123 entitled Hidden Threat Detection Techniques seeks to “capitalize on emerging non-contact nondestructive evaluation detection techniques as well as revolutionary concepts for sensors and detectors and tailor them to specific applications for personnel protection.”
  • Current fielded concealed weapons and/or explosive detection devices operate at close range, typically less than 0.5 meter in portal, hand-wand or hand-held applications. The detection of concealed explosives or metallic and non-metallic weapons carried on persons under clothing in controlled environments, such as building entry (schools, government buildings) or transportation terminals, and uncontrolled environments, such as shopping malls or sporting events, at safe distances, typically in excess of 50 meters would be desirable.
  • Side-attack mines and improvised explosive devices (IEDs) that attack vehicles and personnel from the side as the target passes by are numerous and are a growing threat. An ability to detect devices that are concealed by camouflage or foliage at distances up to 200 meters with a high probability of detection, high clutter discrimination, and low false alarm rate at convoy rates of advance are desirable.
  • What is needed is the ability to:
      • Detect individuals wearing a modest quantity of hidden metal material in the form of pipes configured like an explosive device
      • Detect individuals carrying a hidden rifle
      • Distinguish armed individuals from the general population in less than one second
      • Detect IEDs in camouflage
      • Routinely make this assessment at ranges in the open on the order of 30 meters or more from the sensor
      • Implement a low cost system concept from existing commercially available subsystems
  • In view of the above discussion, it is apparent that there is a need for new or improved systems and methods for rapidly evaluating the threat potential of an individual amongst other individuals at a relatively long distance both indoors and outdoors, and the presence of roadside bombs. It is also desirable that the methods and/or apparatus provide an integrated, threat-driven solution to the threat detection problems discussed above.
  • SUMMARY OF THE INVENTION
  • The above needs are met by the present invention. The present invention is directed to concealed weapon/explosive detection including improvised explosive devices (IEDS) and, more specifically, to the data processing for a system and method that isolates and identifies potential concealed weapon carriers and IEDs with sufficient warning, both in time and distance, to permit successful defensive action to limit the loss of life and destruction of property. The invention is appropriate for use both indoors and out, is benign to people and property in the interrogated area, and has the potential to be portable.
  • An exemplary embodiment of a system consistent with the present invention uses two transmitted Radar signals at orthogonal polarizations to simultaneously pan an environment for potential targets, measures the difference between the Radar signal levels returned or reflected and exploits the difference between normal background areas and threat areas resulting from, e.g., the presence of weapons or other hardware, to present to an operator a visual representation of the examined area with potential threats highlighted using visual markers such as distinctive coloring, particular shapes, or other visual indicia of information, e.g., a potential threat, associated with the different areas which are examined.
  • The method and apparatus of the present invention can be mounted on mobile devices or positioned at fixed locations. The mobile mounted embodiments can be used by trucks and/or other vehicles to identify possible roadside threats or threats which may exist in the vehicle's direction of travel. Such threats include, e.g., above ground mines, improvised explosive devices and/or other types of weapons.
  • In cases where hidden weapons on individuals is the primary concern, the display may limit the visual display of information to areas, e.g., cells of a scanned region, where a human presence is detected, e.g., through the use of thermal or other information. Such an embodiment reduces clutter on the display and helps a user focus on potential threats.
  • One embodiment of the present invention focuses on active millimeter wave (MMW) Radar to detect explosives and weapons because Radars at this frequency have several advantages. First, some of the components found in hidden explosives have dimensions comparable to the wavelength of the Radar. In theory, this fact indicates that any conductive components will be significant reflectors of electromagnetic (EM) energy. Second, the explosive component has a significant dielectric constant that will alter the EM field making it more likely to be detectable by this Radar. Other wavelengths of Radar could also provide valuable algorithm inputs.
  • One embodiment of the present invention uses a Frequency Modulation/Continuous Wave (FM/CW) waveform alone. However, another embodiment recognized by those skilled in the art, would be the utilization of other waveforms, such as Pulse Doppler or Frequency Shift Keying (FSK). Second, another embodiment could utilize several waveforms transmitted simultaneously or near simultaneously that would take advantage of the differences in the way the waveform interacts with the target to provide additional independent assessments of the threat potential of a given detected target.
  • One embodiment of the active millimeter multiple polarization threat detection system consistent with the present invention transmits and receives Radar signals of both horizontal and vertical polarizations.
      • The population dependent relationship between the two independent data sets gathered on each target and the corresponding data sets on the average of all targets (or historic values of such targets) yields a threat assessment that only requires a small number of innocent targets to establish the initial thresholds for the deployment and no other calibration was previously disclosed in the prior art for a single polarization. In this embodiment we examine two orthogonal polarizations, VV and HH with the same objective. Each such ratio of the individual being examined relative to the average values of the population being examined provides an assessment. For example, the VV value of a target with a vertical cylindrical weapon would be higher than the VV value for the average of all persons with no such weapon. If the orientation of the weapon were horizontal the HH value of the target with the weapon would be higher than the HH value for the average of all persons with no such weapon. Since it is not possible, a priori, to know the orientation of a concealed weapon, both relationships are evaluated and provide input to the total threat assessment algorithm.
      • The population independent relationship between the two independent polarization specific data sets (horizontal polarization on transmit and receive (HH), and vertical polarization on transmit and receive (VV)) gathered on each target yield a threat assessment indicator that does not rely on data about other targets nor system calibration. This threat assessment takes the form of a band, below which there is a high probability that the target is not a threat, and above which there is a high probability that the target is a threat. Since it is not possible, a priori, to know the orientation of a concealed weapon, we examine the absolute values of the ratios |VV/HH| plus |HH/VV|. Ideally, one would measure this ratio in the field, to determine what the sum of the ratios would be for the specific conditions at that time for “normal” (non-threat) targets. This would establish a baseline sum (2, 3, 4, etc.) If there is no concealed explosive or weapon, or the orientation of the explosives is random, i.e., neither more vertical nor more horizontal, the ratio summation of |VV/HH| plus |HH/VV| will approximate the baseline. If there is a concealed explosive or weapon that has a dominant orientation of vertical or horizontal, the ratio summation of |VV/HH| plus |HH/VV| will be greater than the baseline amount. It is also possible that a target with some amount of horizontally disposed weaponry could result in a ratio sum between 2 and the established “normal” baseline, which also might be indicative of a threat.
  • As a vehicle for threat declaration, the “population independent” (orthogonal polarization) approach can be utilized independently for threat detection. However, the combination of these two families of assessments (target independent and target dependent) provides a higher probability of threat detection and a lower probability of false alarm than either one by itself
  • The algorithms that are crucial to rapidly evaluating the threat potential of an individual amongst other individuals at a relatively long distance and the existence of above surface IEDs rely on the availability of orthogonally polarized target information and/or a multiplicity of Radar waveforms and/or a multiplicity of radar wavelengths. The systems or methods are capable of being implemented without the need for complex signal processing, thereby reducing implementation costs relative to many of the known systems. The methods and/or apparatus provide an integrated, threat-driven solution to the threat detection problems discussed above.
  • Based upon the dual polarized Radar, the present invention can distinguish a homicide bomber outfitted with an explosive vest from an average innocent individual, can distinguish an individual carrying a hidden weapon from an average innocent individual, and can distinguish IEDs from the background environment. From a straight detection standpoint, the noise-like returns from objects, like foliage, add incoherently to each other from scan to scan, whereas the return from man-made objects or hard targets add coherently. The summation of the scans is the integration process whereby returns from the individual will separate from the background at the same range. In one embodiment that addresses both the homicide bomber detection problem and the IED detection problem, a multi-stage method can be employed, which advantageously utilizes the relationship between the peak returns per scan over the target or the peak returns from a dwelling on a target and the summation of all returns per scan over the target or the summation of all returns from a dwelling on a target, obtained from the transmission and reception of different polarizations as one “vote” (population independent) and the relationship between the returns from the individual or object in question and the average of returns from other individuals or objects and/or background interrogated during that deployment session provides another “vote” (population dependent). The measured data that contributes to each vote passes a threshold test in order to make a threat declaration.
  • Utilization of both multiple polarizations and multiple waveforms, where economically feasible, will further enhance the performance of the system. The simultaneous or near simultaneous raw data at multiple polarizations transmitted simultaneously or from pulse to pulse and multiple waveforms produce a time driven, multi-dimensional processing chain of events leading to a threat declaration that has a high probability of detection and a low probability of false alarm.
  • The implementation of multiple, near simultaneous waveforms illuminating the same target will also enhance the probability of detection, decrease the probability of false alarms, and reduce the incidence of being unable to make a determination. Different waveforms provide a basis for improved signal to noise ratio depending on the motion of the target, the environment in which the threat is located and the configuration of the weapons/explosives. In one embodiment, simultaneous or near simultaneous FMCW and Pulse Doppler waveforms are transmitted. Those skilled in the art understand that other waveform combinations could be selected without departing from the spirit and scope of the invention.
  • Numerous additional features, embodiments and benefits of the methods and apparatus of the present invention are discussed below in the detailed description which follows.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates an exemplary system and various signals passed between the system components in accordance with the present invention.
  • FIG. 2 illustrates an exemplary system and various signals passed between the system components in accordance with the present invention.
  • FIG. 3 illustrates a data file used to implement an embodiment of the present invention.
  • FIG. 4 illustrates a flowchart of operations consistent with the present invention.
  • FIG. 5 illustrates the appearance of the image display on the monitor during the target acquisition process including superimposing reflected signal strength, which above a certain identified threshold level identifies a target to be evaluated further to identify if the target is a threat.
  • FIG. 6 illustrates a table of received reflected signals of varying polarity which are utilized to determine whether the target is a threat.
  • FIG. 7 illustrates a table of received reflected signals of varying polarity which are utilized to determine whether the target is a threat.
  • FIG. 8 illustrates a table of received reflected signals of varying polarity which are utilized to determine whether the target is a threat.
  • FIG. 9 illustrates actual data representative of targets which are threats and non-threats, with their associated detected reflected energy levels.
  • FIG. 10 illustrates raw signal return plots indicative of a threat and a non-threat.
  • FIG. 11 illustrates a flowchart of operations consistent with the present invention.
  • FIG. 12 illustrates the modeled geometry of a typical target that is a threat.
  • DETAILED DESCRIPTION
  • In one embodiment of the present invention, a family of threat declaration methods and systems identifies targets which are threats, independent of analyses of other targets, dependent on analysis of other targets and/or both in concert. It accomplishes this by addressing the relationship between two independent data sets gathered and analyzed individually on each target. The two independent data sets consist of data obtained by transmission of a Radar signal on a vertical polarization and receiving reflected returns on a vertical polarization (VV) and the simultaneous transmission of a Radar signal on a horizontal polarization and receiving a portion of the reflected horizontally polarized return (HH).
  • Combining the data from several scans over the target will increase the probability of detection while reducing the probability of false alarm. For conventional Radar systems, criteria have been developed to evaluate system performance depending on signal to noise ratio. These criteria ensure the detection of the target but do not provide its threat status. In a threat detection system, an evaluation must be made as to whether or not the detected target constitutes a threat. This is advantageously accomplished by setting the threat detection threshold dynamically in the field during each deployment based on measured target polarization returns (integrating the values over time) of all observed targets, most of whom are without explosives. The longer the integration time, the better the performance that can be achieved.
  • It is the relationship of the levels in all the target associated cells (each individual Radar return making up the sum total of returns associated with that particular target) to the average level of all other target associated cell returns that determines the presence of a threat on the one hand (target dependent) and the |VV/HH| and |HH/VV| ratios, which are independent of other targets in the scene, on the other. The summations and averaging discussed above in relation to the “dependent” family of threat declaration methods and systems are extensions of the basic methods and systems disclosed in the prior referenced patents (U.S. Pat. Nos. 6,720,905 B2 and 6,856,272 B2 incorporated herein by reference), which generally concentrate purely on relative levels of the peak values.
  • The dual polarization of transmitted signals using vertical polarization on transmit and vertical polarization on receive and using horizontal polarization on transmit and horizontal polarization on receive (and in some cases using vertical transmission and horizontal reception and/or horizontal transmission and vertical reception) is constructed in real time in order to create a database which is used in both the “independent” and “dependent” families of threat declaration methodologies and systems described generally above, and in detail below.
  • While a sensor operated at 76.5 GHz, transmitting and receiving on both horizontal and vertical polarization and using FM-CW modulation is advantageous, those skilled in the art will recognize that the operating frequency could be replaced by other frequencies, the polarization could be right and left circular or any combination of orthogonal polarization senses and the waveform could be FM-CW modulation, pulse Doppler, FSK or other waveforms, either alone or in concert.
  • The determination of whether an individual is a threat or not can be accomplished in a typical instance of a person (target) wearing a bomber vest (threat) by recognizing the following. The bomber vest is typically composed primarily of cylinders consisting of metallic pipes and/or high dielectric material shaped in the form of cylinders. While these cylinders are generally placed vertically around the torso of the suicide bomber, the application of the multi vote process eliminates the orientation of the explosives as a factor in the final assessment.
  • By way of example, this arrangement of vertical cylinders, yields larger returns (Radar signal reflections), in this instance VV, than the other co-polarization pair, in this instance HH. In this instance, the ratio of |VV/HH| for the target with a bomber vest will be significantly larger than the ratio for a target who is not a threat (not carrying a hidden weapon). This difference in |VV/HH| ratios is then utilized to identify a target who is a threat. It should be noted that this ratio is independent of the returns from other targets and non-targets within the Radar scanning area (scene).
  • Other threats hidden on a human body, such as a rifle, will also yield a similar larger ratio of |VV/HH| or |HH/VV| depending on the orientation of the threat, than for a target who is not a threat. Also, since IED's are typically made of cylindrical components, simultaneous Radar signals of orthogonally opposed polarizations will yield a significantly greater ratio of returns from one polarization over returns of another polarization than the ratios of similar returns from objects which are not IED's. Threats that do not have longitudinal symmetry (randomly aligned materials vs. cylinders and rectangular solids) are addressed by the “dependent” threat test.
  • For a different bomb surrogate configuration, HH could be larger than VV. Thus, it should be recognized that differences between the returns corresponding to different transmitted signal polarizations, e.g., horizontal and vertical, could be used in detecting a threat.
  • In some embodiments of the present invention, threat detection can therefore be based on the ratio of returns corresponding to different polarizations, using, e.g.,

  • R=(VV/HH)|+|(HH/VV)|
  • where a threat may be declared present when R exceeds a first threshold (experimentally determined to be some amount above 2) indicating a significant difference between vertical and horizontal signal components. The threshold may be predetermined or dynamically determined. The values input to the R calculation are obtained from the target peak signal return and summation of returns within the azimuth and range expanse of the target as a function of polarization of each target. Thus, several calculations of the ratio are made, e.g.:

  • R peak=|(VV peak /HH peak)|+|(HH peak /VV peak)| and

  • R summation=(VV summation /HH summation)|+|( HH summation /VV summation)|
  • per dwell or scan over the target as well as

  • R cumulative summation=|(VV cumulative summation /HH cumulative summation)|+|(HH cumulative summation /VV cumulative summation)|
  • and each provides a vote as to the threat status of the detected target. Rpeak is constantly replaced by subsequent measures if that measure is greater and Rsummation is constantly updated and becomes Rcumulative summation after the initial scan over or the dwell on the target.
  • Additionally, certain threats may have unique attributes of changing the polarization of a reflected signal from the transmitted signal. In such a case, these threats may be detected in whole or in part by factoring into the detection process the relative amount of horizontal returns from a vertically polarized transmitted signal, and/or the vertically polarized returns reflected back by a target which has been illuminated by a horizontally polarized signal.
  • Advantageously, a threshold band can be defined above R=X (where X is 2 or some baseline value above 2) and below R=Y (where Y is a value above X). Below this band there is a high probability that the target is not a threat, and above this band there is a high probability that the target is a threat. Results within this band may indicate a possible threat. The values of X and Y may advantageously be determined empirically by evaluation of experimental or “on-scene” results.
  • In another embodiment of the present invention, the above-described family of threat declaration systems which are independent of other targets' returns can and should be augmented by additionally performing threat declaration methods which are dependent on the returns (either real-time, historic, or both) of other targets in the Radar scanned scene to deal with random orientations of explosive materials. Applying both families of threat declaration methods or systems to gathered data will yield a higher probability of threat detection and a lower probability of false alarm than for either family implemented individually.
  • This second family of dependent threat detection methodologies comprises the broader set of conclusions relative to the expected returns from someone wearing concealed explosives and/or carrying a concealed weapon versus the rest of the population at or before the time of current measurement. For this set of methodologies, one can
      • Compare the target peak signal return and summation of returns within the azimuth and range expanse of the target as a function of polarization of each target to the corresponding range attenuation adjusted value for the average of all targets in the scanned scene, and
      • Compare each target's determined values to its corresponding threshold (based on average returns from targets within the scene, or to average targets historically) to maximize probability of detection while minimizing false alarms.
  • In the embodiment shown in FIG. 1, two antennas 106, 107 are mounted one above the other and connected to independent receivers in the two channel Radar transmitter/receiver (transceiver) 110. Transceiver 110 is a homodyne type in which a linearized sweep of the transmitter oscillator is sampled, sent to signal processor 109 over VV link 102 and HH link 101, and mixed with the target return to generate an IF frequency representing twice the range to the target in signal processor 109. The two IF analog frequencies are digitized, processed in FFT, and used by the operating code to generate target information. Data from multiple scans or dwells on a target for each polarization pair and waveform is fused into a set of features about each detected target.
  • Data from the scans is transferred to population dependent decision algorithms 105 and population independent decision algorithms 104. For example, VV data could be sent to population dependent decision algorithms 105 to be compared with a threshold signal strength for threats (based on average or typical returns from non-threat targets). This would result in a “vote” for the target to either be declared a threat or not, and the vote forwarded to threat declaration 108. Simultaneously, VV and HH data may be sent to population independent decision algorithms 104, where the ratio of |VV/HH| and |HH/VV| is computed for the returns from a particular target. If this ratio yields a result above a pre-determined threshold indicative of a threat, a “threat vote” is declared and forwarded to threat declaration 108. Threat declaration 108 would combine the two votes, and declare a threat if, for instance, both votes indicated a threat. Alternatively, a threat could be declared if either vote indicated a threat. Another possibility would be to declare a “possible threat” if the votes are not the same.
  • It is possible that particular threats could manifest themselves by reflecting a polarization orthogonal to the transmitted polarization. In such a case, VH (transmitted with vertical polarization and received with horizontal polarization) data 103 could be sent from a receive only Radar receiver 110 to signal processor 109, and this additional data could be processed in population independent decision algorithms 104 to either modify its “threat” vote, or to provide an additional vote, to threat declaration 108.
  • Further, it may be advantageous for signal processor 109 to identify the average detected signals at each polarization, and the peak detected signals at each polarization, and additional threat assessments could be made based on these inputs. For example, while the cumulative |VV/HH| plus |HH/VV| might not be indicative of a threat, the peak of these ratios for a given Radar sweep of the target might result in an indication of a threat.
  • FIG. 2 illustrates an alternative embodiment of the present invention. In this case, there are two transceivers, each transmitting and receiving on vertical and horizontal polarizations (using antennas 211). FMCW Two Channel Radar Transmitter/Receiver 205 utilizes FMCW signals, and Pulse Doppler Two Channel Radar Transmitter/Receiver 202 utilizes Pulse Doppler Radar signals. The resultant vertical and horizontal reflected signals 201 are passed to signal processor 210. Data from these scans is transferred from signal processor 210 to Pulse Doppler Population Dependent Algorithms 206, Pulse Doppler Population Independent Decision Algorithms 208, FMCW Population Dependent Decision Algorithms 207, and FMCW Population Independent Decision Algorithms 209. These algorithm processors 204 transmit their threat “votes” to Threat Declaration 203, which processes the various threat determinations (votes) into an overall threat assessment (i.e., Threat, No Threat, or Ambiguous or Uncertain).
  • By utilizing two different Radar transmission systems (FMCW and Pulse Doppler), threats which may have been missed by either system individually (due to the complexities in the way a particular waveform is reflected by a target, for example), may be advantageously identified by the combination system of FIG. 2.
  • FIG. 3 illustrates a data file of Radar returns consistent with the present invention. The Radar systems feed FFT sampled data for each polarization/waveform pair for subsequent analysis by the threat determination/declaration algorithms. The raw data is in the form of a tabulated list consisting of polarization pair (e.g., vertical/vertical and vertical/horizontal) 301, scan number (time) 302, and {range, azimuth, elevation, velocity and signal amplitude} 303. This data is compiled for each target within the Radar scanned scene. This data file is then used to perform the Population Independent and Population Dependent threat determination evaluations.
  • FIG. 4 illustrates an advantageous process for performing threat determination evaluations consistent with some embodiments of the present invention. This process involves receiving inputs from transceivers of orthogonal polarizations (such as horizontal and vertical) illuminating the same target scene. The received inputs are used to compute a “vote” regarding the determination of a threat using Population Independent evaluations, such as by taking the ratio of vertical polarized returns over horizontal polarized returns, and voting for the existence of a threat based on this ratio. Simultaneously, using the same inputs, a second “vote” regarding the determination of a threat using Population Dependent evaluations, such as by comparing the target's returns (or the average target returns, or the peak target returns, or the cumulative target returns, for example) with the returns for other targets in the scanned scene, or with historic “non-threat” target returns. These “votes” are then utilized to calculate an overall threat assessment (discussed in relation to FIG. 8).
  • In order to effectively accomplish the threat declaration, target extent and target centroid processing schemes need to be determined. This is accomplished in the Data Pre-Processing 401 stage, which receives signal data from Signal Processor 420. The total, target caused Radar return is made up of a plurality of range-azimuth cell Radar returns 402 resulting from a multiplicity of transmitted pulses. A sliding window in range 403 and angle 404 allows the accumulation of all the amplitudes in all the range-azimuth cells associated with each target. The range-azimuth cell Radar returns must be pre-processed to prepare them for the data assessment algorithm 413. Since the system utilizes multiple polarizations, the data from both channels needs to be associated with each target and conclusions drawn from the differences. Scan by scan data needs to be associated for each target, also, to deal with issues of target track continuity, masking and unmasking, and orientation.
  • In one embodiment of the present invention, both the scene-averaging algorithm (target dependent) 405 and the polarization ratios algorithm (target independent) 406 are implemented. This is accomplished by measurement of the level of all the pulses transmitted and received in all the populated cells associated with each target for each scan over the scene by each independent Radar at its corresponding polarization. This advantageously yields a dynamic determination of the range adjusted 407 peak 408 and summation of levels returned from all the target-associated cells 409 in the scene at both polarizations. The average level 412 is also computed. All detected returns within the target expanse are tagged with a time stamp, polarization and waveform along with its range, range rate, azimuth angle and elevation angle 410. Once the peak level, average level and sum of levels are obtained, this information is added to the tag for each target 411.
  • FIG. 5 shows the returns that would be identified as relating to a specific target 503. When the nominal range to a target is measured to be 120 feet at range 507, the amplitude of all the returns from the range expanse of the target that occur from both small errors in the range measurement and because of the finite range expanse of the target and the amplitude of the return (scanning from left to right) reaches a predetermined threshold indicative of the beginning of a target (the leftmost edge of target 503), such as the return signal 502 reaching threshold 505, subsequent scan returns are marked as being from target 503, until the signal level 502 drops below threshold 505 on the rightmost edge of target 503, signifying the final return from target 503 for that Radar scan. Returning to FIG. 4, this is operation 402, to determine target expanse in range and azimuth.
  • As described above, operation 407 adjusts all amplitudes by a normalization factor, such as for signal attenuation due to the range (distance) from the transmitter to the target (here, 120 feet). In this way, amplitude figures for the target can be compared with amplitude figures for other targets (in the present scene or from historic data) at varying distances from the transmitter.
  • FIG. 5 depicts a scanned scene as it would appear on a visual-monitor 501, with the returns 502 of a specific target 503 (and also shown individually as an inset 506 on monitor 501), with the range 507 superimposed on the monitor, as well as threshold 505, which would indicate a signal amplitude indicative of a target, and threshold 504, which may be indicative of the amplitude of a threat, for reference in a target dependent threat analysis.
  • FIGS. 6, 7, and 8 show hypothetical examples of vertical and horizontal polarized signal return data for a selected target, along with an indication of the threat determination based on a target independent threat analysis. Each scan (from right to left) of each transmitter (one for each polarization) in each example takes 100 msecs. The “resolution bin width” for each example is 10 msecs. For the first scan (scan 1), for the first 10 msecs., the transmitter angle is “1”, as seen in columns 601 and 602, row 611 of FIG. 6, and in columns 701, 702, 801, 802, and rows 711 and 811 of FIGS. 7 and 8, respectively. The amplitude 603 of the vertically polarized return is 1,200, and the horizontal return amplitude 604 is 1,000. Assuming that a target would have a return amplitude of at least 6,000, the determination 605 is that there is no target in this portion of the Radar scanned scene.
  • At angle 2 of scan 1 (column 601, row 612), the vertical return 603 is 32,300 and the horizontal return 604 is 8,800. Since both are above the threshold of a target (6,000), determination 605 is that this portion of the scene contains a target. The horizontal and vertical polarized returns are then accumulated in columns 607 and 606, respectively. A cumulative |VV/HH|+|HH/VV| 608 factor is computed at 3.94 for the target at this point in time. Assuming a historical determination that a |VV/HH| ratio of less than 4.5 is not a threat, and a |VV/HH| ratio of more than 7.0 is a threat, threat determination 609 is set at “N” for “no threat.
  • At angles 3 and 4 of scan 1 the returns are still indicative of a target, so these values are accumulated in columns 606 and 607, and the cumulative |VV/HH| calculations of column 608 are still below 4.5, so threat determination 609 continues to indicate “no threat”.
  • At angle 5 of scan 1 (row 613), the VV and HH values drop below the target threshold of 6,000, and therefore target determination 605 indicates that this portion of the scanned scene does not include a target. Therefore, the associated returns for this area are not accumulated in columns 606 and 607 for the identified target.
  • For angle 1 of the second sweep (scan) of the scene (row 614), the return levels 603 and 604 are below the threshold of a target (6,000), and therefore these returns are not accumulated in columns 606 and 607. The same is true for angle 2 of scan 2 (the target has moved out of the angle 2 portion of the scanned scene since the first scan).
  • At angle 3 of scan 2 (row 615), both vertical 603 and horizontal 604 returns (36,200 and 9,200 respectively) exceed the historic threshold for a target return (6,000), and therefore target indicator 605 indicates a “Y” for the existence of a target, the vertical polarized return of 36,200 is added to the accumulated return of vertical polarized returns for this target in the first “sweep” of 97,600, yielding a new cumulative magnitude of 133,800 (column 606). The new horizontal polarized return cumulative value is 36,100 (column 607), and the newly computed cumulative |VV/HH| is 3.98, which is still below the lower end of the predetermined threat band of 4.5 to 7.0, and therefore threat determination 609 continues to indicate “no threat”.
  • The target is still present at angles 4 and 5 of scan 2, and these signal return amplitudes (columns 603 and 604) are added to the cumulative totals of columns 606 and 607. The resultant cumulative |VV/HH| ratios are 4.03 and 4.06, respectively, and therefore threat determination 609 continues to be “no threat”. At angle 6 of scan 2 (row 616), the target is no longer present, as indicated by the values in columns 603 and 604.
  • FIG. 7 is a data file similar to that of FIG. 6, except that the VV returns 703 and VV cum 706 are larger when a target is present (rows 712 and 715) but similar to FIG. 6 when there is no target present ( rows 713, 714, and 716). The HH returns 704 and HH cum 707, and target determination 705 are the same as FIG. 6. This results in larger cumulative |VV/HH|+|HH/VV| ratios 708. Since the ratios are greater than 4.5, but less than 7.0, they are within the “band” of predetermined possible threats (ratios in this range were judged to possibly indicate a weapon or explosive on a target). Threat determinations 709 are therefore “A” for “ambiguous”. These targets would require additional time on target, inspection or analysis to determine if they were indeed threats.
  • FIG. 8 is a data file similar to that of FIGS. 6 and 7, except that the VV returns (column 803 and rows 812 and 815) and VV cum 806 returns are higher than for either FIG. 6 or FIG. 7, but similar to FIGS. 6 and 7 when there is no target present ( rows 813, 814, and 816). The HH returns 804 and HH cum 807, and target determination 805 are the same as FIGS. 6 and 7. These returns result in cumulative |VV/HH|+|HH/VV| ratios 808 in excess of 8.0. Since these ratios are above the upper limit of the 4.5 to 7.0 threat band, threat determination 809 classifies these returns as threats (“Y”). This would result in a “yes” vote for the target independent family of threat determinations for this target.
  • Alternatively, as described previously, an additional threat “vote” could be based on a |VV/HH+HH/VV| ratio of the peak VV value (for instance, the 75,200 amplitude of row 815, column 803 is made up of 100's of individual amplitudes, each attributable to a transmitted pulse during the individual time period 802 wherein an exemplary peak amplitude could be 1,400) to the peak HH value within that scan sweep (scan 2), (in this instance, for the summation of the individual amplitudes 9,200 of row 815, column 804 an exemplary peak amplitude could be 120.) In some instances, this ratio might indicate a threat, whereas the cumulative |VV/HH|+|HH/VV| ratio might not indicate a threat.
  • Turning to the target dependent family of threat determinations, the same data of FIGS. 6, 7, and 8 can be utilized. For example, in FIG. 8, the VV levels of column 803 can be compared to the average VV levels over the entire scene (normalized for range distances). These latter targets are likely non-threatening, and would illustratively average about 35,000 per “resolution bin width”. As the present target's VV values from FIG. 8 are approximately double the average value of the other targets in the scene (or of historical target values from the scene in previous scans), the “vote” from this analysis would also be “Yes”, indicating a threat.
  • The “Yes” indication from the target independent determination, combined with the “Yes” vote from the target dependent determination would strongly indicate that the target was a threat, and the combined threat determination would be “Yes”.
  • Alternatively, if one of the votes was “Yes” and one “No”, the overall threat assessment would be “ambiguous”, indicating a possible threat. If both votes were “No”, the combined threat determination would be a strong “No”. In any event, a final threat determination of “Yes” or “No” would be more reliable than either target independent or target dependent determinations individually.
  • Generally, since the data are generated over time, for a selectable (variable) range-(variable) azimuth bin, the time ordered summation of the data for each scan and each direction is generated. The process adds to the summation over tune, keeping track of the value at each time interval and the summed value at each time value. Every time the scan and direction state changes (for purposes of discussion, every 100 msec), the sum is computed for that condition. This summed data is averaged over time and number of data points to feed into the threat declaration algorithm sequence. The number of contributors to each summation and the average level is computed and also feeds the threat declaration algorithm.
  • As an example of a threat determination process, based on the data shown in FIG. 9, returns from “threat” individuals (Bob Vest 910 and Sharie Rifle 920) and “non-threat” individuals (Bob No Vest 930 and Sharie No Vest 940) are plotted as a function of integration time. Probability of Correct Designation, Pcd, and Probability of False Designation, Pfd, are derived. The rationale for declaring accomplishment of a Pcd and Pfd is explained by this example data. At each integration time increment and at a specific threshold setting, e.g., a threshold which may be predetermined, derived experimentally, or dynamically determined depending on the embodiment, a determination is made as to which Radar returns exceed the threshold setting. In this exemplary analysis a determination was made as to how long it would take for all threat individuals to exceed the threshold and no non-threat individuals to exceed the threshold setting. At that point, the probability of correct designation is 100 percent. Similarly, analysis determined how long it would take for a non-threat individual to exceed the threshold. The integration time has to be set shorter than that time for the probability of false designation to be zero. For this exemplary evaluation, for targets at 30 meters and for an empirical threshold setting of 12,000,000 and an integration time of 0.6 seconds, Pcd approaches 100 percent with no Pfd.
  • FIG. 10 shows a typical plot of a Radar return. The x-axis 1010 is a measurement of the distance from the Radar. The y-axis 1020 is a power measurement for each pulse in normalized units. Similar plots can be generated for each channel, for single and multiple individuals, and polarization choices. In this case 4 seconds of data is shown. The peak signal achieved is determined by examining the returns in each 100 msec interval. The Peak Sum is the summation of all signals in the dominant 100 msec interval.
  • Clutter, which is defined as any returns that are not a result of the targets of interest, can play an important role in the ultimate system. Known objects are both clutter and valuable reference points. In particular, fixed objects (buildings, cars, poles, etc.) which will be detected by the Radar can serve as reference points and markers to allow for hand-off to other systems or personnel that are charged with the mission. As clutter, they have to be suppressed so that they do not desensitize the target detection process because of their size (buildings, cars, mailboxes, etc.) relative to a person. As valuable reference points, they provide range and azimuth clues that can keep the system design as simple as possible. They also have, in the case of fixed, stationary objects, fixed GPS coordinates that can be exploited for threat suppression. They define the “detection zone” and provide scene references. Creating a “detection zone” allows for clutter suppression by simple post-processing rather than complex Radar implementation techniques.
  • FIG. 11 addresses what is done once the data starts coming in from the deployment. The process of threat declaration takes the human operator out of the loop as much as possible and presents no extraneous information that has to be interpreted.
  • The essence of the concept is that it is recognized that the way Radar interacts with complex targets is not well known or quantifiable. The final Radar signal processing will calibrate itself continuously, based on the average of the reflected energy at the time of measurement for the target dependent algorithms and by establishing the thresholds for the target independent algorithms at the time of the deployment on any given day. Both numbers improve as more targets are examined. The operations of FIG. 11 are applicable to both the target independent and target dependent threat detection systems.
  • In operation 1110, the region to be protected is scanned. Next, in automatic operation 1120, all azimuths in the “detection zone” which detect a target are identified, and the associated amplitude and range data is gathered for that target. Next, in 130, a 1 meter (an exemplary range resolution cell) window slides in 0.1 meter increments over the range data to establish the amplitude vs. angle data to automatically populate the associated data (file) table.
  • In operation 1140, the amplitudes are automatically adjusted by the range attenuation calibration curve (algorithm). In automatic operation 1150, the actual amplitude vs. angle data is compared to the expected antenna gain pattern to establish the validity of the detection.
  • For each window in which there is a validated detection, the summation of all Radar returns is automatically stored in 160. In 170, the amplitudes obtained on each scan for up to 1 second are automatically summed. In 1180, for each validated detection, the sum of the amplitudes (up to 1 second worth) is automatically compared with the threat declaration threshold.
  • In operation 1190, if the threat declaration-threshold is exceeded, a threat is automatically declared, and the operator's display is automatically annotated with the range and azimuth of the threat target. In 1195, the video display and the Radar are automatically fused, and marked as a threat. In operation 1199, an alert is signaled (such as an aural alarm or visual alert symbol).
  • The technology incorporated in some embodiments described herein utilize the intensity and polarization characteristics of the Radar return from a potential threat together with system algorithms to remotely detect modest amounts of metal/dielectric that could indicate the presence of explosives or other concealed weapons. These embodiments, which would be capable of screening potential threats at ranges in excess of 50 meters, demonstrate a low-cost COTS (Commercial Off-The-Shelf) design which satisfies the requirements of civil law enforcement, force protection, military, and public safety in buildings and schools. While the invention has been particularly shown and described with reference to the preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and detail, including tradeoffs of Radar design parameter selection, may be made therein without departing from the spirit and scope of the invention.
  • The selection of a Radar system at frequency 77 GHz has several performance and cost advantages. From a performance standpoint, some of the components found in an explosive vest have dimensions comparable to the wavelength of the Radar. This fact indicates that any conductive components will be significant reflectors of electromagnetic (EM) energy. Second, the explosive component has a significant dielectric constant that will alter the EM field making it more likely to be detectable by this Radar.
  • The Radar return from a suicide vest is made up of reflections from all the components of the vest, which include wires and cylinders found in the vest, rifle barrels, weapons components, and the individual. The theoretical contribution of each of these components to the Radar backscatter can be derived from the Radar and Radar-Cross-Section equations. However, modeling is complicated by the orientation of the components and the complex interactions between the person wearing the vest and the vest components. An incomplete understanding of these interactions compounds modeling these complex interactions. In addition, at this frequency, the interactions change with small movements of the target.
  • The calculation of the signal strength and the signal strength dependencies as set forth below describe how the design parameters determine the performance of the system and how some of the design parameters are determined from the proposed system requirements. The energy reflected from a target competes with background noise from many sources. The Radar Range Equation rearranged to calculate Signal to Noise Ratio
  • S N R = P T G 2 λ 2 σ ( 4 π ) 3 R 4 KT 0 BN F L T
  • explains the ability of the Radar to detect a target. The signal to noise ratio is directly proportional to the Transmitted Power, PT, the square of the Antenna Gain, G, the square of the Wavelength, λ, and the Radar Cross Section of the target, σ, and inversely proportional to the fourth power of the distance to the target, R, the Bandwidth of the Receiver, B, the Noise Figure, NF, and miscellaneous Losses, LT. K is the Boltzmann constant, and T is the receiver temperature in degrees Kelvin.
  • For an individual target threat, the elevation beamwidth at a distance to the target should encompass the height of the individual. Assuming an individual to be on the order of 2 meters, the calculation determines the resultant angle or beamwidth to be 1.15 degrees, for a proposed distance to the furthest target of 50 meters. The beamwidth determines the diameter of the antenna at the proposed frequency of 77 GHz. The Diameter, D, equals a constant factor, typically 1.22, times the speed of light, c, and divided by the product of the beamwidth and the frequency, f, and equals 0.12 meters. The Diameter, D, is represented as
  • D = 1.22 ( c ) ( f ) ( Beamwidth )
  • The calculation of the Signal to Noise Ratio for an embodiment of the proposed solution is 2.8 dB or nearly twice the noise present in the system for a miniscule 0.1 square meter target. This suggests that even for the very modest transmitted power levels and conservative design parameters described herein, sufficient detectable signal will be available for the system to differentiate target backscatter from the noise background.
  • The unique visual characteristics of explosives vests consist of their size, shape, explosive charge, and fuse mechanism. Similarly the vest possesses unique Radar characteristics, including its reflectivity, polarization, resonance effects, and interference patterns.
  • A finite difference frequency domain (FDFD) calculation of a realistic body-worn explosive geometry was conducted. Three infinitely long (into the page) 3 inch diameter perfectly conducting cylinders held in place against a planar half-space of human tissue by means of a sheet of polyester material 1 mm thick was used as the model (no clothing separating the cylinders from the body). The nearfield computational space was discretized into 237 by 749 square cells (FIG. 12), as seen looking down on the human with sides h=0.24 mm.
  • Assuming a 77 GHz uniform plane wave incident from the left with unity amplitude, polarized vertically to the ground, the scattered field due to the presence of the cylinders 1220 and the strapping 1210 (FIG. 12) was calculated. For the alternate polarization (with E-field parallel to both the ground and the body), the magnetic field, H_z was computed. It was observed that there is less scattering from the sides of the cylinders, but more in front (toward the left).
  • To compare the effects of the scattered signals from a human (represented by “body tissue” 1230 and surrounding air 1240), with and without the three circular metal cylinders 1250, the computed two-dimensional farfield distribution was approximately extended to three dimensions to account for the finite heights of the human and the cylinders. Approximating the human torso as a rectangle with height 100 cm and width 35 cm (about 3 feet by 14 inches), and the height of the cylinders being 25 cm (about 10 inches), it is reasonable to scale the 2D farfield signals by the heights of each target respectively. This follows from the fact that the farfield radiation pattern of an electrically large aperture is proportional to its illuminated area, and the target area is already being accounted for in the 2D computation. In each polarization case, the intensities are normalized to that of the rectangle of human tissue medium 1230 without the cylinders.
  • As would be expected, the sidelobes are higher when the human rectangle scatterer has the metal cylinders attached. The main beam signal for both human and cylinders is 92.5% (7.5% below) that of the human rectangle alone for horizontal polarization. For vertical polarization the cylinders add 7.7% signal level to 107.7% of the human alone. This is due to the strong scattering of the vertically oriented cylinders 1250 reflecting all of the vertically polarized electric field.
  • It was concluded from the simulation that while the predicted differences are small, there are distinct differences in the scattering of a torso with and without an array of metal cylinder explosives, depending on polarization and observation angle. Actual measurements corroborated that the differences exist and are exploitable. The effects of the much smaller cylinder array relative to the human torso would not be expected to be great, but the details of the variations may indeed be observable. In particular, illumination of the human target from directions other than normal to the skin-so that the main beam of the field scattered by the torso is away from the backscatter direction—may lead to enhanced relative scattering in the backscatter direction by the cylinders. Also, examining the cross-polarized waves, say when illuminating at +45 degrees (both vertical and horizontal illumination), and observing at −45 degrees, will be much greater for the torso with straight vertical cylinders than without.
  • While the invention has been particularly shown and described with reference to the preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and detail, including tradeoffs of Radar design parameter selection, may be made therein without departing from the spirit and scope of the invention.

Claims (17)

1-29. (canceled)
30. A method of detecting a threat, the method comprising:
operating a multi-channel frequency modulated continuous wave radar module to transmit and receive both horizontally and vertically polarized waveforms;
operating a multi-channel pulse Doppler channel radar to transmit and receive both horizontally and vertically polarized waveforms;
making a first independent threat assessment based on received multi-channel frequency modulated continuous wave signals;
making a second independent threat assessment based on received Doppler channel radar signals; and
based on the first and second independent threat assessments making a threat determination.
31. The method of claim 30, where making a first independent threat assessment includes making a threat assessment using a frequency modulated continuous wave population independent decision process.
32. The method of claim 31, where making a second independent threat assessment includes making a threat assessment using a pulse Doppler population independent decision process.
33. The method of claim 32 further comprising:
making a third threat assessment, the third threat assessment being a population dependent assessment based on the received multi-channel frequency modulated continuous wave signals; and
wherein said step of making a threat determination is further based on said third threat assessment.
34. The method of claim 33, further comprising:
making a fourth threat assessment, the fourth threat assessment being a population dependent assessment based on the received Doppler channel radar signals; and
wherein said step of making a threat determination is further based on said fourth threat assessment.
35. The method of claim 30, wherein said Doppler radar signals and said continuous wave radar signals are transmitted simultaneously.
36. The method of claim 32, wherein said first independent threat determination is a function of a frequency modulated continuous waveform transmitted using a vertical polarization and received on a horizontal polarization.
37. The method of claim 36, wherein said second independent threat determination is a function of a pulse Doppler waveform transmitted using a vertical polarization and received on a horizontal polarization.
38. The method of claim 36 wherein multi-channel frequency modulated continuous wave radar module supports both horizontal and vertical radar channels.
39. The method of claim 38 wherein multi-channel pulse Doppler radar module supports both horizontal and vertical radar channels.
40. A threat detection system, comprising:
a multi-channel frequency modulated continuous wave radar module configured to transmit and receive both horizontally and vertically polarized waveforms;
a multi-channel pulse Doppler channel radar configured to transmit and receive both horizontally and vertically polarized waveforms;
a first threat assessment module configured to make a first independent threat assessment based on received multi-channel frequency modulated continuous wave signals;
a second threat assessment module configured to make a second independent threat assessment based on received Doppler channel radar signals; and
a threat declaration module configured to make a threat determination based on the first and second independent threat assessments.
41. The threat detection system of claim 40, wherein said first threat assessment module is configured to make a threat assessment using a frequency modulated continuous wave population independent decision process.
42. The threat detection system of claim 41, wherein said second threat assessment module is configured to make a second independent threat assessment using a pulse Doppler population independent decision process.
43. The threat detection system of claim 42 further comprising:
a third threat assessment module configured to make a population dependent threat assessment based on the received multi-channel frequency modulated continuous wave signals; and
wherein said threat determination is configured to use said third threat assessment in making said threat determination.
44. The threat detection system of claim 43, further comprising:
a fourth threat assessment module configured to make a population dependent assessment based on the received pulse Doppler wave signals; and
wherein said threat determination module is configured to use said fourth threat assessment in making said threat determination.
45. The threat detection system of claim 40, wherein a multi-channel frequency modulated continuous wave radar module and said multi-channel pulse Doppler channel radar are configured to transmit signals simultaneously.
US11/478,026 2006-05-09 2006-06-29 Methods and apparatus for detecting threats using radar Active 2026-09-30 US7492303B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/478,026 US7492303B1 (en) 2006-05-09 2006-06-29 Methods and apparatus for detecting threats using radar

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US79888506P 2006-05-09 2006-05-09
US11/478,026 US7492303B1 (en) 2006-05-09 2006-06-29 Methods and apparatus for detecting threats using radar

Publications (2)

Publication Number Publication Date
US7492303B1 US7492303B1 (en) 2009-02-17
US20090058710A1 true US20090058710A1 (en) 2009-03-05

Family

ID=40349325

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/478,026 Active 2026-09-30 US7492303B1 (en) 2006-05-09 2006-06-29 Methods and apparatus for detecting threats using radar

Country Status (1)

Country Link
US (1) US7492303B1 (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090060272A1 (en) * 2007-06-20 2009-03-05 Reinpoldt Iii Willem H System and method for overlaying computer generated highlights in a display of millimeter wave imagery
US20090184861A1 (en) * 2007-12-18 2009-07-23 Brijot Imaging Systems, Inc. Inclusion of assessment data in millimeter wave concealed object detection systems
US20090195435A1 (en) * 2006-06-19 2009-08-06 Ariel-University Research And Develoment Company Ltd. Hand-held device and method for detecting concealed weapons and hidden objects
US7586433B1 (en) * 2007-03-26 2009-09-08 Mala Geoscience Ab Dual port memory trigger system for a ground penetrating radar
US20100295717A1 (en) * 2008-01-29 2010-11-25 Rourk Christopher J Weapon detection and elimination system
US20110050480A1 (en) * 2007-11-19 2011-03-03 Michael Kroning Method and Device For The Spatially Resolved Detection and Reconstruction of Objects By Means of Microwaves
WO2012063241A1 (en) * 2010-11-11 2012-05-18 Avi Buzaglo Yoresh System and method for detection of minefields
US20130106643A1 (en) * 2011-10-27 2013-05-02 Raytheon Company Rf gun barrel detection system
US20140022118A1 (en) * 2009-11-03 2014-01-23 Vawd Applied Science And Technology Corporation Standoff range sense through obstruction radar system
WO2014120289A1 (en) * 2012-10-10 2014-08-07 Raytheon Company Detection of concealed object on a body using radio frequency signatures on frequencies and polarizations
US8842035B2 (en) * 2010-04-08 2014-09-23 L-3 Communications Security And Detection Systems, Inc. Sensor head
US20140320331A1 (en) * 2013-04-25 2014-10-30 Battelle Memorial Institute Footwear Scanning Systems and Methods
US20160223646A1 (en) * 2011-04-13 2016-08-04 Raytheon Company Enhanced detection and automatic signature extraction of radar resonance reflections in above and below-ground man-made objects
US20160223660A1 (en) * 2010-03-17 2016-08-04 George Mason Intellectual Properties, Inc. Cavity Length Determination Apparatus
US20170212059A1 (en) * 2015-09-16 2017-07-27 Massachusetts Institute Of Technology Methods and apparatus for imaging of near-field objects with microwave or terahertz radiation
US20170245361A1 (en) * 2016-01-06 2017-08-24 Nokomis, Inc. Electronic device and methods to customize electronic device electromagnetic emissions
WO2018195546A1 (en) * 2017-04-21 2018-10-25 Tlc Millimeter Wave Products, Inc. Millimeter wave advanced threat detection system network
WO2018226407A1 (en) * 2017-06-05 2018-12-13 Apstec Systems Usa Llc Methods and systems for non-cooperative automatic security screening in crowded areas
JP2020003217A (en) * 2018-06-25 2020-01-09 パナソニックIpマネジメント株式会社 Radio wave sensor and radio wave detection method
US20210190929A1 (en) * 2019-12-19 2021-06-24 Utc Fire & Security Emea Bvba Radar presence sensor device
US11303662B2 (en) * 2015-04-20 2022-04-12 Micro Focus Llc Security indicator scores
US11520069B2 (en) 2020-04-20 2022-12-06 Battelle Memorial Institute Footwear scanning systems and methods

Families Citing this family (95)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102004047086A1 (en) * 2004-09-29 2006-03-30 Robert Bosch Gmbh Radar sensor for motor vehicles
GB0617586D0 (en) * 2006-09-07 2006-10-18 Mbda Uk Ltd Improvements in or relating to scanners
US7768444B1 (en) 2008-01-29 2010-08-03 Rourk Christopher J Weapon detection and elimination system
US8437556B1 (en) * 2008-02-26 2013-05-07 Hrl Laboratories, Llc Shape-based object detection and localization system
GB2474966C (en) 2008-03-18 2012-08-01 Univ Manchester Metropolitan Remote detection and measurement of objects
US8610622B2 (en) * 2008-04-18 2013-12-17 Flex Force Enterprises LLC Firearm threat detection, classification, and location using wideband radar
US8643539B2 (en) * 2008-11-19 2014-02-04 Nokomis, Inc. Advance manufacturing monitoring and diagnostic tool
GB0916300D0 (en) * 2009-09-17 2009-10-28 Univ Manchester Metropolitan Remote detection of bladed objects
GB2491307A (en) * 2010-02-16 2012-11-28 Sky Holdings Company Llc Systems, methods and apparatuses for remote device detection
EP2697671A2 (en) * 2011-04-15 2014-02-19 Ariel-University Research and Development Company, Ltd Passive millimeter-wave detector
JP2013224893A (en) * 2012-04-23 2013-10-31 Honda Elesys Co Ltd Direction detection device, direction detection method, and direction detection program
CN102866387B (en) * 2012-10-16 2014-06-04 清华大学 Millimeter wave frequency modulated continuous wave (FMCW) two-unit phased array distance and velocity measurement monolithic radar transceiver
US9279883B2 (en) 2013-02-19 2016-03-08 Infineon Technologies Ag Method and device for radar applications
US9689964B2 (en) * 2013-04-23 2017-06-27 The Curators Of The University Of Missouri Electronic receiver device detection system and method
US9179107B1 (en) 2013-07-26 2015-11-03 SkyBell Technologies, Inc. Doorbell chime systems and methods
US9060103B2 (en) 2013-07-26 2015-06-16 SkyBell Technologies, Inc. Doorbell security and safety
US11004312B2 (en) 2015-06-23 2021-05-11 Skybell Technologies Ip, Llc Doorbell communities
US9342936B2 (en) 2013-07-26 2016-05-17 SkyBell Technologies, Inc. Smart lock systems and methods
US9769435B2 (en) 2014-08-11 2017-09-19 SkyBell Technologies, Inc. Monitoring systems and methods
US20170263067A1 (en) 2014-08-27 2017-09-14 SkyBell Technologies, Inc. Smart lock systems and methods
US11889009B2 (en) 2013-07-26 2024-01-30 Skybell Technologies Ip, Llc Doorbell communication and electrical systems
US9197867B1 (en) 2013-12-06 2015-11-24 SkyBell Technologies, Inc. Identity verification using a social network
US9058738B1 (en) 2013-07-26 2015-06-16 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9165444B2 (en) 2013-07-26 2015-10-20 SkyBell Technologies, Inc. Light socket cameras
US9237318B2 (en) 2013-07-26 2016-01-12 SkyBell Technologies, Inc. Doorbell communication systems and methods
US8937659B1 (en) 2013-07-26 2015-01-20 SkyBell Technologies, Inc. Doorbell communication and electrical methods
US9179108B1 (en) 2013-07-26 2015-11-03 SkyBell Technologies, Inc. Doorbell chime systems and methods
US9060104B2 (en) 2013-07-26 2015-06-16 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9094584B2 (en) 2013-07-26 2015-07-28 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9113052B1 (en) 2013-07-26 2015-08-18 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9736284B2 (en) 2013-07-26 2017-08-15 SkyBell Technologies, Inc. Doorbell communication and electrical systems
US8823795B1 (en) 2013-07-26 2014-09-02 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9142214B2 (en) 2013-07-26 2015-09-22 SkyBell Technologies, Inc. Light socket cameras
US8941736B1 (en) 2013-07-26 2015-01-27 SkyBell Technologies, Inc. Doorbell communication systems and methods
US8872915B1 (en) 2013-07-26 2014-10-28 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9053622B2 (en) 2013-07-26 2015-06-09 Joseph Frank Scalisi Light socket cameras
US9172920B1 (en) 2014-09-01 2015-10-27 SkyBell Technologies, Inc. Doorbell diagnostics
US9230424B1 (en) 2013-12-06 2016-01-05 SkyBell Technologies, Inc. Doorbell communities
US9113051B1 (en) 2013-07-26 2015-08-18 SkyBell Technologies, Inc. Power outlet cameras
US20180343141A1 (en) 2015-09-22 2018-11-29 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9118819B1 (en) 2013-07-26 2015-08-25 SkyBell Technologies, Inc. Doorbell communication systems and methods
US11651665B2 (en) 2013-07-26 2023-05-16 Skybell Technologies Ip, Llc Doorbell communities
US9065987B2 (en) 2013-07-26 2015-06-23 SkyBell Technologies, Inc. Doorbell communication systems and methods
US8953040B1 (en) 2013-07-26 2015-02-10 SkyBell Technologies, Inc. Doorbell communication and electrical systems
US8947530B1 (en) 2013-07-26 2015-02-03 Joseph Frank Scalisi Smart lock systems and methods
US9172921B1 (en) 2013-12-06 2015-10-27 SkyBell Technologies, Inc. Doorbell antenna
US9179109B1 (en) 2013-12-06 2015-11-03 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9172922B1 (en) 2013-12-06 2015-10-27 SkyBell Technologies, Inc. Doorbell communication systems and methods
US10672238B2 (en) 2015-06-23 2020-06-02 SkyBell Technologies, Inc. Doorbell communities
US9247219B2 (en) 2013-07-26 2016-01-26 SkyBell Technologies, Inc. Doorbell communication systems and methods
US10708404B2 (en) 2014-09-01 2020-07-07 Skybell Technologies Ip, Llc Doorbell communication and electrical systems
US10044519B2 (en) 2015-01-05 2018-08-07 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9049352B2 (en) 2013-07-26 2015-06-02 SkyBell Technologies, Inc. Pool monitor systems and methods
US10733823B2 (en) 2013-07-26 2020-08-04 Skybell Technologies Ip, Llc Garage door communication systems and methods
US10440165B2 (en) 2013-07-26 2019-10-08 SkyBell Technologies, Inc. Doorbell communication and electrical systems
US9160987B1 (en) 2013-07-26 2015-10-13 SkyBell Technologies, Inc. Doorbell chime systems and methods
US9196133B2 (en) 2013-07-26 2015-11-24 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9235943B2 (en) 2013-07-26 2016-01-12 Joseph Frank Scalisi Remote identity verification of lodging guests
US10204467B2 (en) 2013-07-26 2019-02-12 SkyBell Technologies, Inc. Smart lock systems and methods
US9013575B2 (en) 2013-07-26 2015-04-21 SkyBell Technologies, Inc. Doorbell communication systems and methods
USD747733S1 (en) 2013-08-30 2016-01-19 SkyBell Technologies, Inc. Display screen or portion thereof with a graphical user interface
USD737283S1 (en) 2013-08-30 2015-08-25 SkyBell Technologies, Inc. Display screen or portion thereof with a graphical user interface
USD747732S1 (en) 2013-08-30 2016-01-19 SkyBell Technologies, Inc. Display screen or portion thereof with a graphical user interface
US9799183B2 (en) 2013-12-06 2017-10-24 SkyBell Technologies, Inc. Doorbell package detection systems and methods
US9786133B2 (en) 2013-12-06 2017-10-10 SkyBell Technologies, Inc. Doorbell chime systems and methods
US9253455B1 (en) 2014-06-25 2016-02-02 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9743049B2 (en) 2013-12-06 2017-08-22 SkyBell Technologies, Inc. Doorbell communication systems and methods
JP6349938B2 (en) * 2014-05-09 2018-07-04 日本電気株式会社 Measuring point information providing apparatus, fluctuation detecting apparatus, method and program
USD762688S1 (en) 2014-05-16 2016-08-02 SkyBell Technologies, Inc. Display screen or a portion thereof with a graphical user interface
CN106461780B (en) * 2014-05-28 2019-06-18 特林布尔有限公司 The method and apparatus of the range measurement of compensation
US9888216B2 (en) 2015-09-22 2018-02-06 SkyBell Technologies, Inc. Doorbell communication systems and methods
US11184589B2 (en) 2014-06-23 2021-11-23 Skybell Technologies Ip, Llc Doorbell communication systems and methods
US20170085843A1 (en) 2015-09-22 2017-03-23 SkyBell Technologies, Inc. Doorbell communication systems and methods
US10687029B2 (en) 2015-09-22 2020-06-16 SkyBell Technologies, Inc. Doorbell communication systems and methods
PL3161516T3 (en) * 2014-06-30 2023-10-16 Bodidata, Inc. Handheld multi-sensor system for sizing irregular objects
US9997036B2 (en) 2015-02-17 2018-06-12 SkyBell Technologies, Inc. Power outlet cameras
JP6271384B2 (en) * 2014-09-19 2018-01-31 株式会社東芝 Inspection device
WO2016101973A1 (en) * 2014-12-22 2016-06-30 Trimble Ab Distance measurement instrument
US10742938B2 (en) 2015-03-07 2020-08-11 Skybell Technologies Ip, Llc Garage door communication systems and methods
US11575537B2 (en) 2015-03-27 2023-02-07 Skybell Technologies Ip, Llc Doorbell communication systems and methods
US11381686B2 (en) 2015-04-13 2022-07-05 Skybell Technologies Ip, Llc Power outlet cameras
US10345431B1 (en) * 2015-06-09 2019-07-09 Baron Services, Inc. Dual polarization radar systems and methods
US20180047269A1 (en) 2015-06-23 2018-02-15 SkyBell Technologies, Inc. Doorbell communities
US10706702B2 (en) 2015-07-30 2020-07-07 Skybell Technologies Ip, Llc Doorbell package detection systems and methods
US10043332B2 (en) 2016-05-27 2018-08-07 SkyBell Technologies, Inc. Doorbell package detection systems and methods
US10514770B2 (en) * 2016-06-17 2019-12-24 Texas Instruments Incorporated Hidden Markov model-based gesture recognition with FMCW radar
US10782394B2 (en) * 2017-02-08 2020-09-22 Texas Instruments Incorporated Slim object detection using multi-polarized millimeter wave signals
US10448864B1 (en) 2017-02-24 2019-10-22 Nokomis, Inc. Apparatus and method to identify and measure gas concentrations
US10909825B2 (en) 2017-09-18 2021-02-02 Skybell Technologies Ip, Llc Outdoor security systems and methods
CA3086930A1 (en) * 2017-12-29 2019-07-04 First Responder Technologies Inc. Body-mounted threat detection system and methods of using same
US11489847B1 (en) 2018-02-14 2022-11-01 Nokomis, Inc. System and method for physically detecting, identifying, and diagnosing medical electronic devices connectable to a network
US11686810B2 (en) * 2018-04-11 2023-06-27 Sony Corporation Radar apparatus, radar control apparatus, and radar system
DE102019117609B3 (en) * 2019-06-28 2020-09-10 RUHR-UNIVERSITäT BOCHUM Device and method for determining material properties of a sample by means of a one-port measuring device
JP2022545039A (en) 2019-08-24 2022-10-24 スカイベル テクノロジーズ アイピー、エルエルシー Doorbell communication system and method
US11919479B2 (en) 2021-05-18 2024-03-05 Ford Global Technologies, Llc Systems and methods for providing security to a vehicle

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3707672A (en) * 1971-06-02 1972-12-26 Westinghouse Electric Corp Weapon detector utilizing the pulsed field technique to detect weapons on the basis of weapons thickness
US4031545A (en) * 1975-09-08 1977-06-21 American Science & Engineering, Inc. Radiant energy alarm system
US4035797A (en) * 1975-11-14 1977-07-12 General Motors Corporation Polarized radar system for providing target identification and discrimination
US4791427A (en) * 1985-11-22 1988-12-13 United Technologies Corporation Multimode, multispectral antenna
US4794398A (en) * 1986-10-01 1988-12-27 United Technologies Corporation Multimode, multispectral scanning and detection
US5001650A (en) * 1989-04-10 1991-03-19 Hughes Aircraft Company Method and apparatus for search and tracking
US5552705A (en) * 1995-06-01 1996-09-03 Keller; George V. Non-obtrusive weapon detection system and method for discriminating between a concealed weapon and other metal objects
US6243036B1 (en) * 1999-05-25 2001-06-05 Macaleese Companies, Inc. Signal processing for object detection system
US6359582B1 (en) * 1996-09-18 2002-03-19 The Macaleese Companies, Inc. Concealed weapons detection system
US20020067259A1 (en) * 2000-09-29 2002-06-06 Fufidio Michael Vincent Portal intrusion detection apparatus and method
US6480141B1 (en) * 2001-03-13 2002-11-12 Sandia Corporation Detection of contraband using microwave radiation
US6504479B1 (en) * 2000-09-07 2003-01-07 Comtrak Technologies Llc Integrated security system
US20040041724A1 (en) * 2002-08-28 2004-03-04 Levitan Arthur C. Methods and apparatus for detecting concealed weapons
US6731845B1 (en) * 1990-06-19 2004-05-04 Sperry Marine Inc. Panoramic visual system for non-rotating structures
US20040214598A1 (en) * 2003-04-23 2004-10-28 Parameswaran Rajamma Ajith Kumar Concealed weapons detection system
US6967612B1 (en) * 2004-10-22 2005-11-22 Gorman John D System and method for standoff detection of human carried explosives

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040075738A1 (en) 1999-05-12 2004-04-22 Sean Burke Spherical surveillance system architecture

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3707672A (en) * 1971-06-02 1972-12-26 Westinghouse Electric Corp Weapon detector utilizing the pulsed field technique to detect weapons on the basis of weapons thickness
US4031545A (en) * 1975-09-08 1977-06-21 American Science & Engineering, Inc. Radiant energy alarm system
US4035797A (en) * 1975-11-14 1977-07-12 General Motors Corporation Polarized radar system for providing target identification and discrimination
US4791427A (en) * 1985-11-22 1988-12-13 United Technologies Corporation Multimode, multispectral antenna
US4794398A (en) * 1986-10-01 1988-12-27 United Technologies Corporation Multimode, multispectral scanning and detection
US5001650A (en) * 1989-04-10 1991-03-19 Hughes Aircraft Company Method and apparatus for search and tracking
US6731845B1 (en) * 1990-06-19 2004-05-04 Sperry Marine Inc. Panoramic visual system for non-rotating structures
US5552705A (en) * 1995-06-01 1996-09-03 Keller; George V. Non-obtrusive weapon detection system and method for discriminating between a concealed weapon and other metal objects
US6359582B1 (en) * 1996-09-18 2002-03-19 The Macaleese Companies, Inc. Concealed weapons detection system
US6243036B1 (en) * 1999-05-25 2001-06-05 Macaleese Companies, Inc. Signal processing for object detection system
US6504479B1 (en) * 2000-09-07 2003-01-07 Comtrak Technologies Llc Integrated security system
US20020067259A1 (en) * 2000-09-29 2002-06-06 Fufidio Michael Vincent Portal intrusion detection apparatus and method
US6720874B2 (en) * 2000-09-29 2004-04-13 Ids Systems, Inc. Portal intrusion detection apparatus and method
US6480141B1 (en) * 2001-03-13 2002-11-12 Sandia Corporation Detection of contraband using microwave radiation
US20040041724A1 (en) * 2002-08-28 2004-03-04 Levitan Arthur C. Methods and apparatus for detecting concealed weapons
US6720905B2 (en) * 2002-08-28 2004-04-13 Personnel Protection Technologies Llc Methods and apparatus for detecting concealed weapons
US20040214598A1 (en) * 2003-04-23 2004-10-28 Parameswaran Rajamma Ajith Kumar Concealed weapons detection system
US6967612B1 (en) * 2004-10-22 2005-11-22 Gorman John D System and method for standoff detection of human carried explosives

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090195435A1 (en) * 2006-06-19 2009-08-06 Ariel-University Research And Develoment Company Ltd. Hand-held device and method for detecting concealed weapons and hidden objects
US7586433B1 (en) * 2007-03-26 2009-09-08 Mala Geoscience Ab Dual port memory trigger system for a ground penetrating radar
US8355538B2 (en) 2007-06-20 2013-01-15 Microsemi Corporation System and method for overlaying computer generated highlights in a display of millimeter wave imagery
US20090060272A1 (en) * 2007-06-20 2009-03-05 Reinpoldt Iii Willem H System and method for overlaying computer generated highlights in a display of millimeter wave imagery
US8116520B2 (en) * 2007-06-20 2012-02-14 Microsemi Corporation System and method for overlaying computer generated highlights in a display of millimeter wave imagery
US20110050480A1 (en) * 2007-11-19 2011-03-03 Michael Kroning Method and Device For The Spatially Resolved Detection and Reconstruction of Objects By Means of Microwaves
US8248293B2 (en) * 2007-11-19 2012-08-21 Fraunhofer-Gesellschaft Zur Forderung Der Angewandten Forschung E.V. Method and device for the spatially resolved detection and reconstruction of objects by means of microwaves
US20090184861A1 (en) * 2007-12-18 2009-07-23 Brijot Imaging Systems, Inc. Inclusion of assessment data in millimeter wave concealed object detection systems
US8547274B2 (en) * 2007-12-18 2013-10-01 Microsemi Corporation Inclusion of assessment data in millimeter wave concealed object detection systems
US20100295717A1 (en) * 2008-01-29 2010-11-25 Rourk Christopher J Weapon detection and elimination system
US20140022118A1 (en) * 2009-11-03 2014-01-23 Vawd Applied Science And Technology Corporation Standoff range sense through obstruction radar system
US8791852B2 (en) * 2009-11-03 2014-07-29 Vawd Applied Science And Technology Corporation Standoff range sense through obstruction radar system
US9645233B2 (en) * 2010-03-17 2017-05-09 Kenneth J Hintz Cavity length determination apparatus
US20160223660A1 (en) * 2010-03-17 2016-08-04 George Mason Intellectual Properties, Inc. Cavity Length Determination Apparatus
US8842035B2 (en) * 2010-04-08 2014-09-23 L-3 Communications Security And Detection Systems, Inc. Sensor head
WO2012063241A1 (en) * 2010-11-11 2012-05-18 Avi Buzaglo Yoresh System and method for detection of minefields
US20160223646A1 (en) * 2011-04-13 2016-08-04 Raytheon Company Enhanced detection and automatic signature extraction of radar resonance reflections in above and below-ground man-made objects
US9910134B2 (en) * 2011-04-13 2018-03-06 Raytheon Company Enhanced detection and automatic signature extraction of radar resonance reflections in above and below-ground man-made objects
US20130106643A1 (en) * 2011-10-27 2013-05-02 Raytheon Company Rf gun barrel detection system
US8890745B2 (en) * 2011-10-27 2014-11-18 Raytheon Company RF gun barrel detection system
WO2014120289A1 (en) * 2012-10-10 2014-08-07 Raytheon Company Detection of concealed object on a body using radio frequency signatures on frequencies and polarizations
US9857462B2 (en) 2012-10-10 2018-01-02 Raytheon Company Detection of concealed object on a body using radio frequency signatures on frequencies and polarizations
US9903948B2 (en) 2012-10-10 2018-02-27 Raytheon Company Radar detection of a concealed object on a body
US20140320331A1 (en) * 2013-04-25 2014-10-30 Battelle Memorial Institute Footwear Scanning Systems and Methods
US9715012B2 (en) * 2013-04-25 2017-07-25 Battelle Memorial Institute Footwear scanning systems and methods
US11303662B2 (en) * 2015-04-20 2022-04-12 Micro Focus Llc Security indicator scores
US10330610B2 (en) * 2015-09-16 2019-06-25 Massachusetts Institute Of Technology Methods and apparatus for imaging of near-field objects with microwave or terahertz radiation
US20170212059A1 (en) * 2015-09-16 2017-07-27 Massachusetts Institute Of Technology Methods and apparatus for imaging of near-field objects with microwave or terahertz radiation
US20170245361A1 (en) * 2016-01-06 2017-08-24 Nokomis, Inc. Electronic device and methods to customize electronic device electromagnetic emissions
WO2018195546A1 (en) * 2017-04-21 2018-10-25 Tlc Millimeter Wave Products, Inc. Millimeter wave advanced threat detection system network
US20190195989A1 (en) * 2017-04-21 2019-06-27 Tlc Millimeter Wave Products, Inc. Millimeter wave advanced threat detection system network
EP3612858A4 (en) * 2017-04-21 2021-05-26 TLC Millimeter Wave Products, Inc. Millimeter wave advanced threat detection system network
US20220026560A1 (en) * 2017-04-21 2022-01-27 Tlc Millimeter Wave Products, Inc. Millimeter wave advanced threat detection system network
WO2018226407A1 (en) * 2017-06-05 2018-12-13 Apstec Systems Usa Llc Methods and systems for non-cooperative automatic security screening in crowded areas
JP2020003217A (en) * 2018-06-25 2020-01-09 パナソニックIpマネジメント株式会社 Radio wave sensor and radio wave detection method
JP7182245B2 (en) 2018-06-25 2022-12-02 パナソニックIpマネジメント株式会社 Radio wave sensor and radio wave detection method
US20210190929A1 (en) * 2019-12-19 2021-06-24 Utc Fire & Security Emea Bvba Radar presence sensor device
US11789136B2 (en) * 2019-12-19 2023-10-17 Utc Fire & Security Emea Bvba Radar presence sensor device
US11520069B2 (en) 2020-04-20 2022-12-06 Battelle Memorial Institute Footwear scanning systems and methods

Also Published As

Publication number Publication date
US7492303B1 (en) 2009-02-17

Similar Documents

Publication Publication Date Title
US7492303B1 (en) Methods and apparatus for detecting threats using radar
US6967612B1 (en) System and method for standoff detection of human carried explosives
US6856272B2 (en) Methods and apparatus for detecting threats in different areas
US6720905B2 (en) Methods and apparatus for detecting concealed weapons
US7450052B2 (en) Object detection method and apparatus
US7167123B2 (en) Object detection method and apparatus
US6825456B2 (en) Signal processing for object detection system
US8368586B2 (en) Person-borne improvised explosive device detection
US6856271B1 (en) Signal processing for object detection system
EP2519834B1 (en) A system and method for detecting concealed explosives and weapons
US20080284636A1 (en) Object detection method and apparatus
US7319233B2 (en) System, device, and method for detecting and characterizing explosive devices and weapons at safe standoff distances
US8730098B1 (en) Method for radar detection of persons wearing wires
AU2009201597A1 (en) Object detection method and apparatus
IL187322A (en) Object detection method
Kapilevich et al. Non-imaging microwave and millimetre-wave sensors for concealed object detection
Felber et al. Fusion of radar and ultrasound sensors for concealed weapons detection
Alsaedi et al. Survy of Methods and Techniques for Metal Detection
Rauscher et al. Concealed weapon detection program
Fox et al. Sensing and identifying the improvised explosive device suicide bombers: people carrying wires on their body
Alsaedi Dr. Baraa M. Albaker
MXPA99002585A (en) Concealed weapons detection system

Legal Events

Date Code Title Description
AS Assignment

Owner name: PERSONNEL PROTECTION TECHNOLOGIES LLC, CONNECTICUT

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LEVITAN, ARTHUR C.;KOSOWSKY, LESTER;REEL/FRAME:018062/0242

Effective date: 20060627

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: KOSOWSKY, LESTER, CONNECTICUT

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PERSONNEL PROTECTION TECHNOLOGIES LLC;REEL/FRAME:026662/0872

Effective date: 20110718

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FEPP Fee payment procedure

Free format text: 11.5 YR SURCHARGE- LATE PMT W/IN 6 MO, SMALL ENTITY (ORIGINAL EVENT CODE: M2556); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2553); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 12