WO2011020148A1 - Procédés, systèmes et appareils pour détecter des menaces de sécurité - Google Patents

Procédés, systèmes et appareils pour détecter des menaces de sécurité Download PDF

Info

Publication number
WO2011020148A1
WO2011020148A1 PCT/AU2010/001060 AU2010001060W WO2011020148A1 WO 2011020148 A1 WO2011020148 A1 WO 2011020148A1 AU 2010001060 W AU2010001060 W AU 2010001060W WO 2011020148 A1 WO2011020148 A1 WO 2011020148A1
Authority
WO
WIPO (PCT)
Prior art keywords
coil
inspection
threat
coils
detection
Prior art date
Application number
PCT/AU2010/001060
Other languages
English (en)
Inventor
John Harold Flexman
John David Kenney
Peter Alaric Hayes
Original Assignee
Rapiscan Systems, Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2009903907A external-priority patent/AU2009903907A0/en
Application filed by Rapiscan Systems, Inc filed Critical Rapiscan Systems, Inc
Priority to EP10809364A priority Critical patent/EP2467321A1/fr
Publication of WO2011020148A1 publication Critical patent/WO2011020148A1/fr

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R33/00Arrangements or instruments for measuring magnetic variables
    • G01R33/20Arrangements or instruments for measuring magnetic variables involving magnetic resonance
    • G01R33/44Arrangements or instruments for measuring magnetic variables involving magnetic resonance using nuclear magnetic resonance [NMR]
    • G01R33/441Nuclear Quadrupole Resonance [NQR] Spectroscopy and Imaging
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N24/00Investigating or analyzing materials by the use of nuclear magnetic resonance, electron paramagnetic resonance or other spin effects
    • G01N24/08Investigating or analyzing materials by the use of nuclear magnetic resonance, electron paramagnetic resonance or other spin effects by using nuclear magnetic resonance
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R33/00Arrangements or instruments for measuring magnetic variables
    • G01R33/20Arrangements or instruments for measuring magnetic variables involving magnetic resonance
    • G01R33/28Details of apparatus provided for in groups G01R33/44 - G01R33/64
    • G01R33/30Sample handling arrangements, e.g. sample cells, spinning mechanisms
    • G01R33/307Sample handling arrangements, e.g. sample cells, spinning mechanisms specially adapted for moving the sample relative to the MR system, e.g. spinning mechanisms, flow cells or means for positioning the sample inside a spectrometer
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R33/00Arrangements or instruments for measuring magnetic variables
    • G01R33/20Arrangements or instruments for measuring magnetic variables involving magnetic resonance
    • G01R33/44Arrangements or instruments for measuring magnetic variables involving magnetic resonance using nuclear magnetic resonance [NMR]
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01VGEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
    • G01V3/00Electric or magnetic prospecting or detecting; Measuring magnetic field characteristics of the earth, e.g. declination, deviation
    • G01V3/08Electric or magnetic prospecting or detecting; Measuring magnetic field characteristics of the earth, e.g. declination, deviation operating with magnetic or electric fields produced or modified by objects or geological structures or by detecting devices
    • G01V3/10Electric or magnetic prospecting or detecting; Measuring magnetic field characteristics of the earth, e.g. declination, deviation operating with magnetic or electric fields produced or modified by objects or geological structures or by detecting devices using induction coils
    • G01V3/104Electric or magnetic prospecting or detecting; Measuring magnetic field characteristics of the earth, e.g. declination, deviation operating with magnetic or electric fields produced or modified by objects or geological structures or by detecting devices using induction coils using several coupled or uncoupled coils
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01VGEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
    • G01V3/00Electric or magnetic prospecting or detecting; Measuring magnetic field characteristics of the earth, e.g. declination, deviation
    • G01V3/12Electric or magnetic prospecting or detecting; Measuring magnetic field characteristics of the earth, e.g. declination, deviation operating with electromagnetic waves
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N24/00Investigating or analyzing materials by the use of nuclear magnetic resonance, electron paramagnetic resonance or other spin effects
    • G01N24/08Investigating or analyzing materials by the use of nuclear magnetic resonance, electron paramagnetic resonance or other spin effects by using nuclear magnetic resonance
    • G01N24/084Detection of potentially hazardous samples, e.g. toxic samples, explosives, drugs, firearms, weapons

Definitions

  • Embodiments relate generally to the detection of security threats within an object. Particular embodiments relate to systems and methods that can detect these threats by sensing the presence of one or more of the components of a device or substance within an object that can be indicative of a threat.
  • the components of a security threat that may be detected include non-linear junctions, batteries, timers, controllers, wires, initiators, hand held phones, explosives, radioactive materials, biological materials, chemicals, closed circuit loops, connectors and metal pieces, for example.
  • Improvised devices such as improvised explosives devices (IED), improvised biological devices (IBD), improvised nuclear devices (IND), improvised chemical devices (ICD), improvised radioactive devices (IRD), and improvised incendiary devices (HD), can be used to destroy targets or render large areas unusable.
  • IED improvised explosives devices
  • IBD improvised biological devices
  • IND improvised nuclear devices
  • ICD improvised chemical devices
  • ICD improvised radioactive devices
  • HD improvised incendiary devices
  • Some embodiments relate to an inspection system for detecting a threat within an object, said inspection system having a detection volume therein, the system comprising:
  • a conveyor belt for moving said object in a first direction through said detection volume
  • At least two inspection subsystems positioned serially along said first direction, wherein at least one of said two inspection subsystems transmits electromagnetic pulses to said object and wherein both of said at least two inspection subsystems detect electromagnetic fields generated by said object;
  • Some embodiments relate to an inspection system for detecting a threat within an object, said inspection system having a detection volume therein, the system comprising:
  • a conveyor belt for moving said object in a first direction through said detection volume
  • first inspection subsystem positioned along said first direction, wherein the first inspection subsystem is adapted to detect metals
  • a second inspection subsystem positioned along said first direction and adjacent to said first inspection subsystem, wherein the second inspection subsystem is adapted to detect non-linear junctions and operates within a transmission frequency range of 1OkHz to 16MHz;
  • a third inspection subsystem positioned along said first direction and adjacent to said first and second inspection subsystems, wherein the third inspection subsystem is adapted to detect electronic circuits;
  • each of said first, second, and third subsystems generate data indicative of electromagnetic fields and wherein a computer receives data indicative of said electromagnetic fields, generates signals based upon said data and compares said signals to a known threshold.
  • Some embodiments relate to a detection method for detecting a security threat within an object disposed inside a detection volume, comprising: receiving signals from sensors disposed around the detection volume indicative of a quality of the object, processing the signals and determining whether the signals are indicative of a possible security threat being present within the object.
  • Some embodiments relate to a system and/or apparatus for detecting a security threat within an object disposed inside a detection volume, comprising: means for receiving signals from sensors disposed around the detection volume indicative of a quality of the object, for processing the signals and for determining whether the signals are indicative of a possible security threat being present within the object.
  • Some embodiments relate to a detection system comprising: a threat detector defining a detection volume and having at least one detection technique for detecting security threats in an object passing through the detection volume.
  • the number of detection techniques may be: at least two; at least three; at least four; at least five; or at least six.
  • the threat detector may detect at least one of the components of a threat. If there are two or more detection techniques in the threat detector, at least two detection techniques may be used to indicate the presence of a threat before an alarm is generated. If there are two or more detection techniques in the threat detector, at least two detection techniques may be used to indicate the presence of a threat and the threats identified by the two or more techniques may need to be spatially correlated before an alarm is generated.
  • the detector may comprise at least one detection technique that can detect countermeasures and at least one other that can detect some other component of the threat.
  • the detector may be designed to comprise two or more detection techniques which target different or the same components of a threat.
  • the detector may be adapted to comprise electromagnetic detection techniques where the wavelength of the electromagnetic radiation is greater than the longest dimension of the object under inspection.
  • the frequency of the electromagnetic radiation may be within the range 1 Hz-IOOMHz.
  • the threat may include one or more of: an IED, IND, IBD, IRD, ICD, HD, hand-held phone or a powered circuit,
  • the threat detector may comprise an electronic circuit detector.
  • the threat detector may comprise a Non Linear Junction Detector (NLJD) for detecting electronic circuits.
  • the threat detector may comprise an Active Electronics Detector (AED) for detecting electronic circuits.
  • the threat detector may comprise a Quadrupole Resonance (QR) detector for detecting electronic circuits.
  • the threat detector may comprise a Metal Detector (MD) to detect metallic objects.
  • the threat detector may comprise a Non Linear Junction Detector (NLJD) for detecting ferrous materials.
  • the threat detector may comprise one or more explosives detectors. At least one of the explosives detectors may use Quadrupole Resonance, X-rays, Neutrons, Gamma Rays, Nuclear Magnetic Resonance, trace detection or Terahertz imaging technologies to detect explosives.
  • the threat detector may comprise a Quadrupole Resonance (QR) detector to detect magnetoacoustic ringing or piezoelectric ringing.
  • QR Quadrupole Resonance
  • the threat detector may comprise a Metal Detector (MD) to detect metallic objects and locate their position in three dimensions.
  • MD Metal Detector
  • the threat detector may comprise a Metal Detector (MD) to detect metallic objects and may have an operating frequency in the IHz to 10OkHz range, or in the IHz to 1OkHz range.
  • the threat detector may comprise a NLJD to detect electronic circuits and may have an operating frequency in the 10 kHz to 100MHz range, or in the 100 kHz to 16MHz range.
  • the threat detector may comprise an AED to detect electronic circuits and may have an operating frequency in the 1 kHz to 100MHz range, or in the 100 kHz to 16MHz range.
  • the threat detector may comprise at least two different detectors and if more than one detector produces a positive detection, then an alarm is raised, otherwise the object is passed as clear.
  • Some embodiments relate to a threat detector for detecting threats within an object in a detection volume comprising: a first probe to irradiate the detection volume with electromagnetic radiation; a second probe to receive electromagnetic radiation from the detection volume; transmitting means and receiving means to drive said first and second probes; processing means to operate the transmitting means in conjunction with the receiving means and process signals received by the receiving means to identify a threat within the detection volume; and alarm means to alert an operator to the presence of an identified threat in the detection volume.
  • the threat detector may employ one or more detection techniques.
  • the number of detection techniques may be at least two, at least three, at least four, at least five or at least six.
  • the threat detector can detect at least one of the components of a threat.
  • At least two detection techniques may need to indicate the presence of a threat before an alarm is generated. If there are two or more detection techniques in the threat detector, at least two detection techniques may need to indicate the presence of a threat and the threats identified by the two or more techniques may need to be spatially correlated before an alarm is generated. If there are two or more detection techniques in the threat detector, the detector may comprise at least one detection technique that can detect countermeasures and at least one other can detect some other component of the threat.
  • the detector may comprise two or more detection techniques which target different or the same components of a threat.
  • the detector may comprise electromagnetic detection techniques where the wavelength of the electromagnetic radiation is greater than the longest dimension of the object under inspection.
  • the frequency of the electromagnetic radiation may lie within the range 1 Hz-IOOMHz.
  • the threat may comprise an IED, IND, IBD, IRD, ICD, HD, hand held phone or a powered circuit, for example.
  • the threat detector may comprise an electronic circuit detector.
  • the threat detector may comprise a Non Linear Junction Detector (NLJD) for detecting electronic circuits.
  • the threat detector may comprise an Active Electronics Detector (AED) for detecting electronic circuits.
  • NJD Non Linear Junction Detector
  • AED Active Electronics Detector
  • the threat detector may comprise a Quadrupole Resonance (QR) detector for detecting electronic circuits.
  • the threat detector may comprise a Metal Detector (MD) to detect metallic objects.
  • the threat detector may comprise a Non Linear Junction Detector (NLJD) for detecting ferrous materials.
  • the threat detector may comprise one or more explosives detectors.
  • One of the explosives detectors may use Quadrupole Resonance, X-rays, Neutrons, Gamma Rays, Nuclear Magnetic Resonance, trace detection or Terahertz imaging technologies to detect explosives.
  • the threat detector may comprise a Quadrupole Resonance (QR) detector to detect magnetoacoustic excitation or piezoelectric excitation.
  • the threat detector may comprise a Metal Detector (MD) to detect metallic objects and locate their position in one, two or three dimensions.
  • the threat detector may comprise a Metal Detector (MD) to detect metallic objects and may have an operating frequency in the 1 to 10OkHz range.
  • the threat detector may have an operating frequency in the IHz to 1OkHz range.
  • the threat detector may comprise a NLJD to detect electronic circuits and may have an operating frequency in the 1 OkHz to 100MHz range.
  • the threat detector may comprise a NLJD to detect electronic circuits and may have an operating frequency in the 100kHz to 16MHz range.
  • the threat detector may comprise an AED to detect electronic circuits and may have an operating frequency in the IkHz to 100MHz range.
  • the threat detector may have an operating frequency in the 10OkHz to 16MHz range.
  • the threat detector may comprise at least two different detectors and be arranged so that if more than one detector produces a positive detection, then an alarm is raised, but otherwise the object is passed as clear (ie. no threat detected).
  • Some embodiments relate to a probe for detecting a threat within an object passing through a detection volume in a prescribed direction, the probe comprising: at least one coil to produce a respective at least one magnetic field, each of which is substantially oriented in one direction within the detection volume.
  • One of the coils may produce a substantially horizontal magnetic field within the detection volume, parallel to the prescribed direction to detect NLJ's.
  • One of the coils may produce a substantially vertical magnetic field within the detection volume to detect NLJ's.
  • One of the coils may produce a substantially vertical magnetic field within the detection volume to metal objects.
  • One of the coils may produce a substantially horizontal magnetic field within the detection volume, parallel to the prescribed direction to detect metal objects.
  • One of the coils may produce a substantially horizontal magnetic field within the detection volume, perpendicular to the prescribed direction to detect metal objects.
  • One of the coils may receive substantially vertical magnetic fields within the detection volume to detect active electronics.
  • One of the coils may receive substantially horizontal magnetic fields within the detection volume, parallel to the prescribed direction to detect active electronics.
  • One of the coils may receive substantially horizontal magnetic fields within the detection volume, perpendicular to the prescribed direction to detect active electronics.
  • One of the coils may produce substantially horizontal magnetic fields within the detection volume, parallel to the prescribed direction to detect QR signals;
  • Some embodiments relate to a probe for detecting a threat within an object passing through a detection volume in a prescribed direction, the probe comprising: a plurality of coils which produce magnetic fields which are substantially oriented in two or three different directions within the detection volume. The different directions may be perpendicular to each other.
  • One of the coils may produce a substantially horizontal magnetic field within the detection volume, parallel to the prescribed direction to detect NLJ's.
  • One of the coils may produce a substantially vertical magnetic field within the detection volume to detect NLJ's.
  • One of the coils may produce a substantially vertical magnetic field within the detection volume to detect metal objects.
  • One of the coils may produce a substantially horizontal magnetic field within the detection volume, parallel to the prescribed direction to detect metal objects.
  • One of the coils may produce a substantially horizontal magnetic field within the detection volume, perpendicular to the prescribed direction to detect metal objects.
  • One of the coils may receive substantially vertical magnetic fields within the detection volume to detect active electronics.
  • One of the coils may receive substantially horizontal magnetic fields within the detection volume, parallel to the prescribed direction to detect active electronics.
  • One of the coils may receive substantially horizontal magnetic fields within the detection volume, perpendicular to the prescribed direction to detect active electronics.
  • One of the coils may produce substantially horizontal magnetic fields within the detection volume, parallel to the prescribed direction to detect QR signals.
  • Some embodiments relate to a probe for NLJD apparatus for detecting a threat within an object passing through a detection volume in a prescribed direction, the probe comprising: a first coil to produce a substantially vertical magnetic field within the detection volume; and a second coil to produce a substantially horizontal magnetic field within the detection volume, parallel to the prescribed direction.
  • the first coil may comprise two single turn saddle coils connected in parallel.
  • the second coil may comprise a single turn coil.
  • Some embodiments relate to a probe for a MD apparatus for detecting a threat within an object passing through a detection volume in a prescribed direction, the probe comprising: a field sensor to receive at least one magnetic field from the threat, the field being either induced through an applied magnetic field or inherent to the threat within the detection volume.
  • a second field sensor may be provided to receive at least one magnetic field from the threat which is either induced through an applied magnetic field or inherent to the threat within the detection volume.
  • the second field sensor may be arranged to receive and sense a field substantially perpendicular to the first field sensor.
  • a third field sensor may be provided to receive at least one magnetic field from the threat which is either induced through an applied magnetic field or inherent to the threat within the detection volume.
  • the third field sensor may be arranged to receive and sense a field substantially perpendicular to the first and second field sensor.
  • Each of the field sensors may comprise air core coils.
  • the first field sensor may be aligned with the prescribed direction.
  • Some embodiments relate to a probe for an AED apparatus for detecting a threat within an object passing through a detection volume in a prescribed direction, the probe comprising: a first sensor to receive magnetic and/or electric fields from the threat within the detection volume.
  • the probe may also comprise a second sensor to receive magnetic and/or electric fields within the detection volume, substantially perpendicular to the first sensor; and optionally a third sensor to receive magnetic and/or electric fields within the detection volume, substantially perpendicular to the first and second sensors.
  • Each field sensor may comprise an air core coil.
  • the first field sensor may be aligned with the prescribed direction.
  • the first and third coils may comprise single turn saddle coils and the second coil may comprise a single turn coil.
  • Some embodiments relate to a threat detector for detecting a threat within an object passing through a detection volume in a prescribed direction that includes one or more probes comprising one or more of the following: (i) a first coil to produce a substantially vertical magnetic field within the detection volume; a second coil to produce a substantially horizontal magnetic field within the detection volume, parallel to the prescribed direction; wherein, the first coil comprises two single turn saddle coils connected in parallel and the second coil is a single turn coil;
  • first coil arranged to produce a substantially vertical magnetic field, a second coil arranged to produce a substantially horizontal magnetic field, parallel with the prescribed direction, and a third coil arranged to produce a substantially horizontal magnetic field perpendicular to the prescribed direction for detecting metal enclosed objects; wherein the first and third coils are single turn saddle coils and the second coil is a single turn coil; and
  • Some embodiments relate to systems and methods utilising one or more of the described probes. Some embodiments relate to computer-readable storage storing executable program code to cause a computer to execute any of the described methods.
  • FIG. 1 is a block diagram of an arrangement of some embodiments.
  • FIG. 2 is a flowchart of a method of some embodiments.
  • FIG. 3 shows a side view of the non linear junction subsystem inside a shield.
  • FIG. 4 shows axial magnetic field producing coils for a NLJD detection subsystem inside a shield.
  • FIG. 5 shows a vertical magnetic field producing transmit coil for the NLJD detection subsystem inside the shield.
  • FIG. 6 shows a vertical magnetic field producing receive coil for the NLJD detection subsystem inside the shield.
  • FIG. 7 is a block diagram of the NLJD detection subsystem.
  • FIG. 8a shows the typical magnitude plot for a threat detection in the NLJD detection subsystem.
  • FIG. 8b shows the typical complex and real plots for a threat detection in the NLJD detection subsystem.
  • FIG. 9 shows a transmit/receive system for an AED subsystem.
  • FIG. 10 shows a single sheet receive coil for the AE detection subsystem.
  • FIG. 11 shows a vertical magnetic field producing receive coil for the AE detection subsystem.
  • FIG. 12 shows an axial magnetic field producing receive coil for the AE detection subsystem.
  • FIG. 13 shows a horizontal magnetic field producing receive coil for the AE detection subsystem.
  • FIG. 14 shows all three AED coils inside a shield.
  • FIG. 15 is a block diagram of the AED subsystem.
  • FIG. 16 shows a single turn sheet coil for the QR detection subsystem inside a shield.
  • FIG. 17 is a block diagram of the QR subsystem.
  • FIG. 18 shows an arrangement for an electronic circuit detection subsystem alongside a metal detector subsystem.
  • FIG. 19 shows an axial magnetic field producing receive coil for the metal detector.
  • FIG. 20 shows a horizontal magnetic field producing receive coil for the metal detector.
  • FIG. 21 shows a vertical magnetic field producing receive coil for the metal detector.
  • FIG. 22 is a block diagram for the metal detector subsystem.
  • FIG. 23 shows an arrangement of a NLJD detector used as an electronic circuit subsystem and a metal detector subsystem.
  • FIG. 24 shows an arrangement of an electronic circuit detection subsystem alongside an explosives detector subsystem.
  • FIG. 25 shows an arrangement of an electronic circuit detection subsystem alongside a metal detector subsystem and an explosives detector subsystem.
  • FIG. 26 shows an arrangement of two electronic circuit detection subsystems alongside a metal detector subsystem and an explosives detector subsystem.
  • FIG. 27 is a block diagram of the NLJD detector being used as an NLJD subsystem and an AED subsystem.
  • FIG. 28 is a block diagram of the NLJD detector being used as an NLJD subsystem and an MD subsystem.
  • FIG. 29 is a block diagram of the NLJD detector being used as an NLJD subsystem and an explosives detector.
  • FIG. 30 is a block diagram of the NLJD detector being used as an NLJD subsystem, a MD subsystem and an explosives detector.
  • FIG. 31 shows a metal object approximately half way between the transmitting and receiving coils of a metal detector.
  • FIG. 32 shows the signal strengths received for the object in Figure 31.
  • FIG. 33 is a block diagram of some embodiments.
  • FIG. 34 is a flowchart of a process of some embodiments.
  • FIG. 35 is a block diagram of some embodiments.
  • Some embodiments are directed to inspection and/or detection methods and a detector that correlates two or more detection methods to detect threats in objects in a detection volume.
  • embodiments address the problem that some threats are typically made up of more than one significant component.
  • the security threat may include, for example, one or more of the following components: non-linear junctions, batteries, timers, controllers, wires, initiators, hand held phones, explosives, radioactive materials, biological materials, chemicals, closed circuit loops, connectors or metal objects.
  • an "object” is defined to mean cargo, luggage, packages, mail, container, circuit boards, manufactured item, clothing, handbag, sachet, briefcase, shoes, minerals, food, manufactured pharmaceuticals or any transportable item that needs to be screened for threats.
  • a “threat” is defined to mean some substance, device, component or quality that can pose a security threat or problem and which is associated with or contained within the object and needs to be detected before the object is cleared from the detector.
  • a threat could be, but are not limited to: an Improvised Explosive Device (IED); Improvised Biological Device (IBD); Improvised Nuclear Device (IND); Improvised Chemical Device (ICD); Improvised Radioactive Device (IRD); Improvised Incendiary Device (HD); Weapons of Mass Destruction (WMD); unwanted contaminants, such as a powered mobile phone which has fallen into the object; contraband, such as a mobile phone which a perpetrator is trying to smuggle into a prison or a courthouse or any object that can produce an electromagnetic field when subject to or not subject to an electromagnetic field.
  • a "subsystem” is defined to mean a device which can detect one or more threats through one or more detection methods.
  • the detection/inspection systems may comprise one or more subsystems. In the case where there are two or more subsystems, these may be connected or unconnected but placed in the general vicinity of each other (eg. adjacent) and operated in sequence or in parallel.
  • Some embodiments improve the detection of threats within objects by correlating the results of a number of threat detection methods.
  • the number of detection methods may be at least two, at least three, at least four, at least five or six or more. If at least two detection methods produce a positive detection of a threat then an alarm is raised. Even more preferably, if two or more detection methods produce the positive detection of a threat and at least two detection methods identify that the threat occurs at the same location within the object then an alarm is raised.
  • This method of correlation of the results of two different detection methods reduces the number of false alarms caused by spurious signals, which can occur in one detection method but not in other detection methods. For example, an extremely sensitive detector may passively listen for noise emanating from the scanned object.
  • Its internally circuitry may randomly produce noisy signals or it may receive noisy signals from external sources. However, unless one or more other detection methods in the threat detector produce a positive detection then no detection of a threat will occur. In the case where the signals need to be correlated in space then if one detection method indicates that there has been the detection of a threat at one end of the object and another detection method indicates a detection has occurred at the other end of the object, then the object is passed as being clear because they are not spatially correlated.
  • the detection methods target detecting different components of a threat. One detection method can be aimed at detecting countermeasures.
  • Figure 1 shows N subsystems 21, 22, 23 side by side connected by one conveyor belt 25. It may be possible that there is only one subsystem, in which case that subsystem can scan the object by two, three, four, five, six or more different detection methods.
  • the N subsystems 21, 22, 23 house at least one coil located inside a metal shield to screen out external interferences.
  • the subsystems are passively listening for noise and thereby do not generate a transmit signal and in other cases there is at least one coil generating a transmit field and at least one coil which acts as a receiver.
  • Each transmit coil generates an electromagnetic field substantially in one direction.
  • the object to be scanned is moved by the conveyor belt into the first subsystem's detection volume. Either during the motion of the object into the detection volume and through to the other side, or after the object has arrived at the centre of the detection volume, the coil transmits electromagnetic pulses at a frequency between 1 Hz-IOOMHz or a wavelength which is greater than the longest dimension of the object. These pulses interact with a component of the threat inside the object and cause the component of the threat to produce an electromagnetic field of its own.
  • the receiver coil (which may be the same coil as the transmitter) receives this electromagnetic field which induces a voltage on the receiver coil, which is then filtered and down converted (if required) and sampled by an Analogue to Digital Converter (ADC) inside a computer.
  • ADC Analogue to Digital Converter
  • the digital signal is then Fast Fourier Transformed and a peak in the Fourier spectrum is compared to a known threshold. If the peak lies above a threshold, then this first detection method in this first subsystem has recorded a positive detection of the component it was designed to detect.
  • This process is then repeated if the first subsystem is able to detect components of a threat by one or more different detection methods.
  • the same method is used, except that there is no transmission of a signal.
  • the processing of this signal can be as explained above or the height of the time series data is compared to a threshold. In either case if the peak frequency signal lies above a threshold or the peak height of the time series data lies above a threshold then the subsystem has recorded a detection of the component it was designed to detect.
  • Some embodiments are directed to improving the detection of threats in objects by sensing the presence of a component of a threat by one detection method and then improving the detection of the threat by selecting one, two, three, four, five, six or more detection methods which target the detection of different components of the threat and then combining those two, three, four, five, six or more detection methods into the one detector to achieve superior detection.
  • An example here may be in the detection of IED's.
  • the first detection method identifies that the IED can be detected by detecting the explosive in the IED. It is also recognised that the IED can also be detected by detecting two other components of the IED: a battery and an electronic circuit.
  • Figure 2 shows a flow diagram of the process in identifying a new detection method and combining it into the detector.
  • a detection technique is identified and added to a detector.
  • another component of the threat is identified and then a new detection technique is added to the detector.
  • this new technique will be independent of the first technique and broaden the scope of the components the detector can detect.
  • step 37 the value of the new technique is evaluated. If it improves the detection rate it is retained 36 otherwise it is discarded 38.
  • IED IED
  • IND's ICD's
  • IRD's IID's
  • WMD's unwanted contaminants, such as a powered mobile phone which has fallen into the object
  • contraband such as a mobile phone which a perpetrator is trying to smuggle into a prison or a courthouse or any object that can produce an electromagnetic field when subject to or not subject to an electromagnetic field.
  • the object which contains threat could be cargo, luggage, packages, mail, container, circuit boards, manufactured item, clothing, handbag, sachet, briefcase, shoes, minerals, food, manufactured pharmaceuticals or any item that needs to be screened for threats or anomalies.
  • Some embodiments include at least one subsystem which can detect IED's within large volume objects that are scanned whilst on a conveyor belt by sensing the presence of electronic circuits.
  • Figure 3 shows an example of embodiments in which the subsystem sensing the presence of electronic circuits is a Non Linear Junction Detector (NLJD).
  • the item to be scanned is placed on the conveyor belt 1 and is scanned by the series of transmit and receive coils 3, 5, 7, 10 and then exits the scanner. This design will be further explained below.
  • NLJ Non Linear Junction
  • the NLJ detector can also detect ferrous metals.
  • This coil design includes two separate coil types:
  • the axial balanced coil design produces magnetic field lines 4 which are parallel to the conveyor belt 1.
  • the transmit coil 3 is a single loop of copper and is resonated at a particular frequency by placing high Q capacitors between the gap at the top of the coil (not shown).
  • the optimum transmit frequency for detection of NLJ's has been found to be approximately 9MHz, but other values could also be used.
  • the receiver coil 5 also produces substantially horizontal and axial like field lines 4. This coil is unconnected to the transmit coil and is resonated at 2 times the resonant frequency of the transmit coil.
  • This coil could be described as being two single loops of copper connected together in series, such that when the transmit coil generates a magnetic field, the current induced on both receiver coils is balanced because the currents will be travelling in opposite directions.
  • Both of the transmitter and receiver coils are housed inside a 2mm thick aluminium shield 14 to screen out unwanted RF interference and prevent the resonant fields from within the coils escaping the localised area.
  • the use of a shield also prevents the subsystem from radiating unwanted noise into the environment and the transmit field from interacting with an object nearby causing unwanted noise.
  • the saddle coils produce magnetic field lines 9 which are predominantly vertical in nature.
  • the transmitter 7 consists of two copper saddle coils arranged to be back-to-back allowing an object to pass between the two saddle coils along the conveyor belt 1.
  • the receiver coil 10 ( Figure 6) consists of quadruple copper saddle coils which are connected in series. One side of this coil produces vertical magnetic field lines 11 pointing upwards and the other side produces magnetic field lines which point downwards 12. Similar to the axial design, this coil system is balanced as the current induced on the two halves of the receiver coil 10 by the transmitter 7 cancel. If an IED disturbs this balance then it can be detected. Preferably, in practice, the transmitter and receiver coils are placed inside the one shield 14.
  • Both sets of coils have a medium Quality factor, Q, to ensure sufficient power is input into the NLJ' s so they produce a response.
  • Q Quality factor
  • a typical value for the Q would be near 50. If the Q was too low it would be difficult to detect the NLJ's. Similarly, if the Q is too high, because this is a balanced system, the system becomes too sensitive to extraneous electrical effects; therefore it is optimal to have a medium Q.
  • Both sets of coils have been carefully made such that they can be placed into the one shield without contacting each other and will operate alongside each other without any detrimental effects (i.e. they are decoupled from each other).
  • This allows the same volume to be used for the axial and vertical magnetic field producing coils and the two sets of coils produce perpendicular fields to each other.
  • the use of perpendicular fields maximises the possibility of detection of NLJ's by ensuring the NLJ is irradiated with radiation from at least two different directions in case they respond poorly in one particular direction.
  • a conveyor belt 1 runs just above the bottom edge of the coils. This conveyor belt is driven by a motor 2 located well back from the coils to prevent RF interference.
  • the surrounding shield 14 has open ends which allow passage of objects through the scanner while providing shielding to external magnetic fields.
  • Figure 7 shows the block diagram for NLJ detector. To scan an object, it is placed onto the moving conveyor 18 until it breaks the optical fence 19. The PC Control 20 then initiates the RF signal generator 30 to begin generating RF pulses at the resonant frequency of the axial transmit coil 110. These pulses are then filtered 70, 90; amplified 80 and sent to the axial transmit coil 1 10.
  • the axial receiver coil 160 receives any induced RF signal at the second harmonic of the transmit frequency. This signal is then filtered 120; transformed into quadrature signals 120; demodulated 50 from MHz signals down to kHz signals and then both quadrature signals are sampled at 0.25MHz 40 to create digital signals and stored in the DSP's memory 40. The sampling occurs for 560 ⁇ s generating 140 points of data. It should be appreciated that the preferred transmit frequencies may vary depending upon the application. For a small carry-on size scanner, an exemplary transmit frequency is at or around 4.4 MHz, with a separation between the axial and vertical transmit frequencies being approximately 100kHz.
  • This process is repeated for the vertical field producing coils, with the main exception being that the transmit frequency is slightly different to the axial coils to avoid any coupling effects between the two sets of coils.
  • This process of sampling and switching between the axial and vertical field producing coils is further repeated a number of times (typically 480) until the object has passed through the coils and is well clear of the scan area. At this point the two lots of 480 datasets of 140 points of data are sent to the computer 20 for analysis. It may not be necessary to scan the object in so many repetitive steps as the object passes through the detector for this NLJD and the following active electronic detector and the metal detector.
  • Figures 8a and 8b show the final result of processing for a NLJ signal for the axial coil system. Typically in Figure 8a the magnitude occurs as two narrow peaks centered around where the IED was located. The second plot, Figure 8b, shows the complex and real components of the signal in Figure 8a. After performing this correction, the maximum FFT signal is then used to determine the final result of the NLJD processing. The most reliable result was found by taking the logical OR of the axial and the vertical coil maximum peak heights recorded for the sixty data points and comparing this result against a previously set threshold. If the ORed result exceeds the threshold, then the NLJD subsystem has recorded a positive detection, otherwise the object is passed as being clear of NLJDs.
  • Such embodiments relate to an Active Electronics Detector (AED).
  • Active electronics are those electronics which are powered (active) and may be present in an IED.
  • the detection of AE relies on detecting time varying magnetic and/or electric fields. Changing voltages and currents within a circuit will cause electromagnetic fields to be generated. In this example magnetic field detection is shown.
  • the AED is a tuned receiver which passively listens to electronic noise emanating from an object. If it detects above average RF noise this may indicate the presence of an" IED.
  • the active electronics detector consists of up to 4 separate coils in this example.
  • the format of two antenna systems is shown, each effectively independent when sensing the object in time.
  • This example displays two preferable independent system designs, which have been arranged in series to increase detection performance over each part.
  • the first system is a single turn sheet coil 200 ( Figure 10) which is tuned to a particular frequency and lies within a shield.
  • the coil 200 is resonated by placing high Q capacitors across a gap at the top of the coil (not shown).
  • An optimal frequency for detection of Active Electronics (AE) was found to be between 2-3MHz, as this reduced the influence of external interferences.
  • This particular coil was resonated at 2.3MHz.
  • the first coil receives noise in one orientation 205 at the centre of the system along the axis of the coil.
  • the coil does have high sensitivity in the directions for moving objects since the effective directional field sensitivity is not the same throughout the detection volume.
  • the antenna does have high sensitivity compared to the following coils because of high unloaded Q which
  • the other three-coil system may be adjacently located further along the conveyor belt (see Figure 9) in a separate shield and has magnetic field lines which are oriented in three different directions.
  • the purpose of having three field directions is to ensure detection of AE, some of which may only emit noise in one particular direction.
  • Figure 11 shows the first of these coils 220 which receives substantially vertical magnetic field lines 225 and is resonated at 2MHz. High Q capacitors 222 used to resonate this coil are placed in the gap shown at 221.
  • Figure 12 shows the second of these coils 230 which receives magnetic field lines 235 which are substantially horizontal and parallel with the conveyor belt. This coil is resonated at 2.1MHz.
  • High Q capacitors 232 used to resonate this coil are placed in the gap shown at 231.
  • Figure 13 shows the third of these coils 240 which receives horizontal magnetic field lines 245 which are perpendicular to conveyor belt and is resonated at 2.2MHz. High Q capacitors 242, 243 used to resonate this coil are placed in the gap shown at 241.
  • Figure 14 shows all three sets of coils 220, 230 & 240 co-located inside a 2mm thick aluminium shield 226. All coils can operate simultaneously within this shield without affecting each other.
  • Figure 15 shows the block diagram for receiving the signal from the single turn sheet coil and the other three coils.
  • An object is placed on a moving conveyor 278 passes through an optical fence. By passing through the optical fence, the system is triggered into acquiring data. It does this by receiving noise on the tuned receivers 250-253. This noise is then amplified 254-257, high pass filtered 258-261, and band pass filtered 262- 265.
  • the high pass filters 258-261 have a cut off frequency at 1.5MHz, which reduces the effects of any noise coming from the radio AM band of frequencies.
  • the data is then processed in two different paths.
  • the signals are then combined together 266, down converted 269,270, digitised in an ADC 271 and sent to the computer 275 for analysis and in the second path the data is sent to what is called a glitch detector to detect anomalies.
  • the data is sampled at lMS/s and is narrow band data.
  • the data is combined into one signal and is wide band data.
  • the glitches were detected by using an analogue circuit. This circuit counts how many times the signal's voltage exceeds a preset threshold. This glitch detector also looks at the rate of increase to determine whether the signal is a glitch, i.e. slow increases in voltage are ignored and rapid increases are counted. If it exceeds the threshold then it is counted as a glitch. This process is repeated a number of times as the object passes through the scanner. The number of glitches is recorded and is used as an indicator of an IED. For the other method, the data is processed within the computer. If the maximum of digital time data exceeds a threshold then the AED has detected an object which possibly contains an IED.
  • the computer collects the results from these two processing methods and combines them together using a logical "OR". If either of the processes produces a positive result then possibly an IED has been detected, otherwise the object is clear of IED's. If an IED has been detected then the computer either displays an alarm on the computer monitor or signals an audio or visual alarm separate from the computer.
  • a Quadrupole Resonance (QR) detector is used to detect AE and Stimulated Emissions (SE).
  • SE Stimulated Emissions
  • a QR detector is built to only detect explosives and interferences generated by other objects are generally unwanted as they increase the false alarm rate and make reliable detection difficult.
  • the QR detector is transmitting a pulse of high energy into the object it can also stimulate electronics to begin emitting RF signals which then can be received by the QR detector.
  • the AED because it is a passive unit, will not receive any signals from these devices.
  • QR systems have been built for some time now and have been shown to exhibit high detection rates and low false rates in certain circumstances.
  • the QR scanner operates by sending high power transmit pulses into a single turn sheet coil which excites and aligns the QR nuclei. After the transmit pulse has been switched off, the nuclei relax back to their starting positions and in the process radiate small RF signals which can be detected by inducing a small voltage on a high Q coil.
  • Figure 16 shows the high Q single sheet coil 600 within a shield. This coil is resonated by placing high Q capacitors along the gap at the top of the coil (not shown).
  • the shield 14 has open ends which allow objects to travel through the scanner on a conveyor belt 628, and at the same time screens out external interferences.
  • Figure 17 shows a block diagram of the QR system.
  • QR frequencies are dependent on the temperature, hence preferably at the beginning of the measurement process, the computer 620 measures the ambient temperature via the probe 644 and memorizes the transmit frequency such that it corresponds to the resonant frequency of the explosive at the measured ambient temperature.
  • an object is carried on the belt past an optical fence (not shown).
  • the breaking of the fence signals to the computer 620 that an object is present that needs to be scanned.
  • the computer 620 preferably moves the belt 641 forward until the object lies approximately in the centre of the coil 629.
  • the process of placing an object inside the resonant coil system can cause the resonant frequency of the tank circuit to change.
  • An example here would be a metallic object which would typically lower the inductance of the coil and require the capacitance to be preferably changed to bring the coil's resonant frequency back to the QR resonant frequency previously determined after measuring the temperature. This is achieved by switching in capacitor values 632 into the circuit such that the resonant frequency of the circuit moves from the lowest possible value to the highest possible value, and after each capacitor is switched into the circuit transmitting a small signal through the transmit circuit (the operation of which will be explained further shortly) and then sensing the resultant magnetic field on the tune loop 645.
  • the capacitor value at which the maximum signal was received on the tune loop is determined and then the coil is retuned back to the QR resonant frequency by calculating how much capacitance needs to added or subtracted from the circuit to realign it with the QR frequency. Once this number has been calculated this capacitance is added or subtracted out of the circuit.
  • the computer 620 then initiates the scanning sequence, which begins by generating a series of small amplitude pulses in the Pulse Generator Controller 623. These pulses consist of oscillating sinusoidal voltages near the QR resonant frequency (between 0.5-5MHz). Each pulse is sent to the RF power amplifier 624, the transmit isolator 625, and low pass filter 626. Then a switch 627 is used to switch the transmit pulses between explosives, this is done to switch in a different matching circuit 628 to ensure the power is transferred efficiently. After leaving the matching unit 628, the pulse is transferred to the resonant probe coil 629.
  • the circuit disconnects from the transmitter via the transmit isolator 625 and becomes a receiver circuit.
  • the high power pulses tip and align the nuclei. Once the high power pulse has been removed the nuclei relax back to their equilibrium position and in the process release a small varying magnetic field.
  • the same single sheet coil and resonant circuit used for transmitting the pulses receives this small varying magnetic field from any QR material present in the scan volume. This small magnetic field induces a voltage on the coil which passes through the receive isolators 633,634, Pre amplifiers 635,636 and to another switch 637 which selects which isolator and preamplifier is used for each explosive measured.
  • the signal is then band pass filtered 639 to remove out of band unwanted noise and down converted 640 from MHz signals down to kHz signals.
  • the down conversion also converts the signal into quadrature signals.
  • the Digitiser 622 samples the two quadrature signals from the receiver at approximately IMHz and stores these digital signals in memory.
  • This process is preferably repeated up to thousands of pulses to accumulate more blocks of data. After the thousands of pulses have been transmitted and the data accumulated, these blocks of data are all averaged together to form the final data which is analysed in the computer.
  • the averaging process is performed due to the fact that the QR signal is quite weak and therefore averaging is required to increase the signal to noise ratio.
  • the conveyor belt does not need to be stopped for scanning.
  • the procedure in the case where it is to be used with another similar technology such as an NLJD may interlace the two scan processes.
  • the scanning processes can be overlapped.
  • phase to the coils can be controlled to produce a particular polarisation to the RF field, such a circular polarisation.
  • the degree of signal degradation caused by a less favourable tuning point may be more acceptable than the increase in machine complexity/cost to including tuning circuitry and algorithmic procedures. It is possible to find a satisfactory tuning point in most cases where the object has low coupling to the QR coil. This is the case for a class of objects transported as organic cargo.
  • the final averaged data are then Fast Fourier Transformed and if the peak signal that lies within a small frequency window lies above a nominated threshold for either explosive material then an explosive has possibly been detected. If either the electronics detecting subunit or the explosives detector subunit returns a positive result then the object is flagged as having a potential IED. If an IED has been detected then the computer either displays an alarm on the computer monitor or signals an audio or visual alarm separate from the computer.
  • Various pulse sequences can be used in different situations, and the description of the variety of pulse sequences is beyond the scope of the present invention but discussions on these sequences can be found in U.S. Patent 7,355,400 and U.S. Patent 7,282,913, the disclosures of which are hereby incorporated by reference.
  • any two or three of the previously described detectors are placed alongside or co-located with each other and the object to be scanned is passed or placed in the subsystems to detect IED's.
  • the scan procedure for each subsystem is as previously described in this embodiment and the results of the subsystems are combined by taking a logical "OR". If any of the subsystems generate an alarm then an IED has been potentially been detected.
  • Embodiments shown in Figure 18 are substantially the same as some previously described embodiments except that as well as having at least one subsystem which can detect the presence of IED's by sensing the presence of electronic circuits, there is at least one subsystem which can detect the presence of metal objects, which may be batteries, timers, connectors, wires, controllers, initiators, hand held phones, closed circuit loops, metallically shielded NLJ's, AE's, electronics which produce SE's or explosives.
  • metal objects which may be batteries, timers, connectors, wires, controllers, initiators, hand held phones, closed circuit loops, metallically shielded NLJ's, AE's, electronics which produce SE's or explosives.
  • metal objects which may be batteries, timers, connectors, wires, controllers, initiators, hand held phones, closed circuit loops, metallically shielded NLJ's, AE's, electronics which produce SE's or explosives.
  • One of the most important points about this metal detector is
  • the object to be scanned is moved along the conveyor 730 into the subsystem which detects the presence of metallic objects 700 and then after that subsystem has finished scanning the object it is moved into the second subunit 710 which determines if the object contains any electronic circuits.
  • the order of the units can be optimised to some principle, for example, requiring the less invasive to precede a more invasive technique, to for example reduce the (if any) chance of damage to scanned articles during scanning.
  • the large volume NLJD or AE detectors described previously are two examples of subsystems which could be used to detect IED's and the following metal detector could be an example of a metal detector to detect the presence of the batteries, metal in the circuit components or shielded object.
  • the metal detector is designed to detect metal objects within the scanned object.
  • An example is a power source within an IED which can be a battery or a series of batteries.
  • the metal detector is tri-axial as the batteries and shielded NLJ's, AE's and explosives may have any shape and orientation and thus may be difficult to detect if only one set of coils is used.
  • the tri-axial system consists of the axial, vertical and horizontal magnetic field producing elements.
  • a narrow single turn coil 300 serves as the transmit coil and the receive coil 310 consists of two single loops which are connected in series either side of the transmit coil 300. This design is identical in form to the axial magnetic field producing coil for the NLJD.
  • the transmitter 300 When the transmitter 300 generates a magnetic field it induces opposing currents in the two loops which cancel.
  • the horizontal transmit/receive system ( Figure 20) consists of two large transmit coils left hand side 400 and right hand side 410 and within those coils are each located two smaller receive coils 420,430,440,450.
  • the transmit coil 400 transmits first and induces currents on receiver coils 440,450. The size of the current induced is measured and stored. If a metal object enters the magnetic field, the current induced on the receiver coils changes and thus the metal object can be detected. The same operation occurs with the right hand side transmit coil 410 and the associated receiver coils 420,430.
  • the vertical transmit/receive system ( Figure 21) is similar to the horizontal system except that the coils are located top and bottom of the scan volume. Again there a two transmit coils 500,510 with two smaller receiver coils 520,530,540,550 located within them. The operation of the transmit/receive coils is identical to those in the previous horizontal section.
  • the conveyor belt is set into motion and an object is placed onto it. This object passes through an optical fence which triggers the system to begin transmitting and receiving signals.
  • the transmit signal for all of the coil designs is generated in a DSP 561, amplified 562-564, and sent to each transmit coil 565-569, in turn.
  • the transmit signal typically contains three frequencies (1 kHz, 3 kHz and 10 kHz) to maximise the detection potential of various targets. The use of three frequencies also enables some discrimination of the type of metal detected to provide more information to the user.
  • a voltage is induced on the receiver coils 570-578. This signal is then filtered 579, amplified 580 and digitised 561 and sent to the computer 560 for processing.
  • Each dataset is created by sampling the signal at 100kHz for 41ms which creates an array of 4096 points. After one transmit coil has been excited it is switched off and then the next transmit coil is excited until all coils have been excited.
  • each of the 9 receiver coils there are 17 datasets from each of the 9 receiver coils each containing 4096 points. Every dataset is first Fast Fourier Transformed into frequency space and the complex peak heights at the three frequencies are recorded. This reduces the data to 17 datasets x 9 receivers x 3 frequency peaks. Then background complex FFT peak signals are subtracted off these signals (this background signal was collected prior to the object passing through the scan area and processed identically up to this point).
  • each set of 3 frequencies is combined to make one frequency peak by weighting the lowest frequency by the mean peak signals of the three frequencies divided by the median. If this weight ratio is greater than one then it is inverted before the weighting occurs. The purpose of doing this weighting is to reduce any variations caused by noise in the system.
  • each receiver signal for the 14 steps is compared to a corresponding threshold. If any of the peak signal strengths exceed the threshold then a positive detection has occurred which may indicate the presence of a metal substance.
  • the object is deemed to be containing a potential IED. If an IED has been detected then the computer either displays an alarm on the computer monitor or signals an audio or visual alarm separate from the computer.
  • the NLJD can detect electronic circuits.
  • an NLJ detector can also detect ferrous materials, and in particular ferrous metals, because these materials generate harmonic signals.
  • the NLJD can be used for detecting electronic circuits and ferrous metals.
  • Ferrous metals are typically used as the outer surface of alkaline batteries.
  • the object to be scanned is transported along a conveyor 730 into an NLJD detector 700. Using the method and block diagram previously discussed in the first embodiment, the object is scanned for both NLJ's and ferrous metal objects. If either the computer displays an alarm on the computer monitor or signals an audio or visual alarm separate from the computer.
  • Embodiments shown in Figure 24 are substantially the same as some previously described embodiments except that as well as having at least one subsystem which can detect the presence of IED' s by sensing the presence of electronic circuits 700, there is at least one subsystem which can detect the presence of explosives 715.
  • the large volume NLJD or AE detectors described previously are two examples of subsystems which could be used to detect IED 's and the previously described Quadrupole Resonance (QR) detector could be an example of a detector to detect the presence of explosives.
  • QR Quadrupole Resonance
  • Other techniques which could be used to detect explosives are X-rays, Neutrons, Nuclear Magnetic Resonance (NMR), gamma rays, trace detection and Terahertz imaging. If any of the subsystems produce a positive result then potentially an IED has been detected. If an IED has been detected then the computer either displays an alarm on the computer monitor or signals an audio or visual alarm separate from the computer.
  • Further embodiments are substantially the same as some previous embodiments except that as well as having at least one subsystem which can detect the presence of IED's by sensing the presence of electronic circuits, there is at least one subsystem which can detect the presence of large metal objects and there is at least one subsystem which can detect the presence of explosives.
  • the large volume NLJD or AE detectors described previously are two examples of subsystems which could be used to detect electronic circuits; the previously described MD could be used to detect metal objects and the previously described Quadrupole Resonance (QR) detector could be an example of a detector to detect the presence of explosives.
  • X-rays can detect more than one component of an IED.
  • the NLJD can detect ferrous metals which tend to be the main outer layer of batteries and the QR system can detect magnetoacoustically ringing objects; stimulated electronics, and active electronics.
  • the QR system can also detect piezoelectric materials. This can be important if the explosive cannot be detect by QR but is in powdered form and generates a piezoelectric signal.
  • Figure 25 the object is moved through all three subsystems 700,715,725 on top of a conveyor belt 730. If any of the subsystems produce a positive result then potentially an IED has been detected. If an IED has been detected then the computer either displays an alarm on the computer monitor or signals an audio or visual alarm separate from the computer. Further embodiments are substantially the same as some previous embodiments except that there are two subsystems which can detect the presence of IED 's by sensing the presence of electronic circuits. There is also at least one subsystem which can detect the presence of large metal objects and there is at least one subsystem which can detect the presence of explosives.
  • the large volume NLJD and AE detectors described previously are two examples of subsystems which could be used to detect electronic circuits; the previously described MD could be used to detect metal objects and the previously described Quadrupole Resonance (QR) detector could be an example of a detector to detect the presence of explosives.
  • Other techniques which could be used to detect explosives are X-rays, Neutrons, Nuclear Magnetic Resonance (NMR), gamma rays, trace detection and Terahertz imaging.
  • NMR Nuclear Magnetic Resonance
  • gamma rays gamma rays
  • trace detection and Terahertz imaging Terahertz imaging.
  • Figure 26 the object is moved through all four subsystems 700,701,715,725 on top of a conveyor belt 730. If any of the subsystems produce a positive result then potentially an IED has been detected. If an IED has been detected then the computer either displays an alarm on the computer monitor or signals an audio or visual alarm separate from the computer.
  • Further embodiments comprise at least one subsystem which can detect the presence of IED's by sensing the presence of electronic circuits by two separate methods.
  • the large volume NLJD described previously is capable of detecting IED's by sensing the presence of electronic circuits by detecting NLJ' s and passively listening for AE. This design reduces the complexity of the device and also reduces the footprint of the instrument. Reduction of the footprint of the threat detector can be important in spatially constrained areas, such as airports.
  • Figure 27 shows the block diagram for combined NLJ and AE detector. To scan an object it is placed onto the moving conveyor 1018 until it breaks the optical fence 1019.
  • the PC Control 1020 then initiates the RF signal generator 1030 to begin generating RF pulses at the resonant frequency of the axial transmit coil 1110. These pulses are then filtered 1070, 1090; amplified 1080 and sent to the axial transmit coil 1110. While these pulses are being sent to the axial transmit coil, the axial receiver coil 1160 receives any induced RF signal at the second harmonic of the transmit frequency. This signal is then filtered 1 120; transformed into quadrature signals 1120; demodulated 1050 from MHz signals down to kHz signals and then both quadrature signals are sampled at 0.25MHz 1040 to create digital signals and stored in the DSP's memory 1040. The sampling occurs for 560 ⁇ s generating 140 points of data. This process is repeated for the vertical field producing coils, with the main exception being that the transmit frequency is slightly different to the axial coils to avoid any coupling effects between the two sets of coils.
  • the AE data is collected. It follows the same process described above except no transmission occurs and the subsystem only listens for noise. This process of sampling and switching between the axial and vertical field producing coils and the NLJ and AE detection is further repeated a number of times (typically 480) until the object has passed through the coils and is well clear of the scan area. At this point the four lots of 480 datasets of 140 points of data are sent to the computer 1020 for analysis.
  • the NLJD data is processed as described in the first embodiment.
  • the AE data is processed slightly differently.
  • the time series AE data is processed by simply determining if any of the time series data exceeds a threshold. If it has then potentially an IED has been detected.
  • the most reliable method for combining the results of the NLJ and AE data is by taking the logical OR of the final results. If the ORed result is positive, then the combined NLJD and AE subsystem has potentially detected an IED and an alarm is signalled.
  • Still further embodiments are similar to some previous embodiments except that they comprise at least one subsystem which can detect the presence of IED 's by sensing the presence of electronic circuits and metal objects.
  • the large volume NLJD described previously is capable of detecting IED's by sensing the presence of electronic circuits by detecting NLJ's.
  • Using retuning of the coils it is also capable of detecting metal objects.
  • This design reduces the complexity of the subsystem and also reduces the footprint of the instrument. Reduction of the footprint can be important in some spatially constrained situations.
  • Figure 28 shows the block diagram for combined NLJ and MD detector. To scan an object, it is placed onto the moving conveyor 2018 until it breaks the optical fence 2019.
  • the PC Control 2020 then initiates the RF signal generator 2030 to begin generating RF pulses at the resonant frequency of the axial transmit coil 2110. These pulses are then filtered 2070, 2090; amplified 2080 and sent to the axial transmit coil 2110. While these pulses are being sent to the axial transmit coil, the axial receiver coil 2160 receives any induced RF signal at the second harmonic of the transmit frequency. This signal is then filtered 2120; transformed into quadrature signals 2120; demodulated 2050 from MHz signals down to kHz signals and then both quadrature signals are sampled at 0.25MHz 2040 to create digital signals and stored in the DSP's memory 2040. The sampling occurs for 560 ⁇ s generating 140 points of data.
  • the metal detection data is collected. However, just prior to this data being collected the receiver coils are retuned to have the same frequency as the transmit coils by the Matching/Tuning Box 2150. Once this step has been completed the process of transmitting and receiving described above is repeated for both the horizontal and vertical coils. The entire process of sampling and switching between the axial and vertical field producing coils and the NLJ and MD detection is further repeated a number of times (typically 480) until the object has passed through the coils and is well clear of the scan area. At this point the four lots of 480 datasets of 140 points of data are sent to the computer 2020 for analysis.
  • a number of times typically 480
  • the NLJD data is processed as described in the first embodiment.
  • the MD data is processed slightly differently.
  • the data is then Fourier transformed into complex frequency data and then a background signal is subtracted off the data.
  • This background data was collected and Fourier transformed while the object was not present and stored in the computer's memory. If the peak signal at the frequency which corresponds to the transmit frequency lies above a threshold for any of the 480 steps, then potentially an IED has been detected.
  • the most reliable method for combining the results of the NLJ and MD data is by taking the logical OR of the final results. If the ORed result is positive, then the combined NLJD and AE subsystem has potentially detected an IED and an alarm is signalled.
  • Further embodiments comprise at least one subsystem which can detect the presence of IED's by sensing the presence of electronic circuits and explosives.
  • the large volume NLJD described previously is capable of detecting IED's by sensing the presence of electronic circuits by detecting NLJ's. Using retuning of the coils it is also capable of detecting explosives. This design reduces the complexity of the subsystem and also reduces the footprint of the instrument. Reduction of the footprint can be important in some spatially constrained situations.
  • Figure 29 shows the block diagram for combined NLJ and explosives detector.
  • the PC Control 3020 then initiates the RF signal generator 3030 to begin generating RF pulses at the resonant frequency of the axial transmit coil 31 10. These pulses are then filtered 3070, 3090; amplified 3080 and sent to the axial transmit coil 3110. While these pulses are being sent to the axial transmit coil, the axial receiver coil 3160 receives any induced RF signal at the second harmonic of the transmit frequency.
  • This signal is then filtered 3120; transformed into quadrature signals 3120; demodulated 3050 from MHz signals down to kHz signals and then both quadrature signals are sampled at 0.25MHz 3040 to create digital signals and stored in the DSP's memory 3040.
  • the sampling occurs for 560 ⁇ s generating 140 points of data. This process is repeated for the vertical field producing coils, with the main exception being that the transmit frequency is slightly different to the axial coils to avoid any coupling effects between the two sets of coils.
  • This process of transmitting on the vertical and axial coils is repeated a number of times until the conveyor belt is stopped to perform the quadrupole resonance measurements.
  • the conveyor is preferably stopped when the object is substantially centered within the coils.
  • the axial transmit coil is the only coil used to detect quadrupole resonance signals, the other coils are preferably switched to be open circuit and thereby have no effect upon the QR measurement.
  • the axial transmit coil is preferably retuned by the Matching/Tuning Box 3100 to have the same frequency as the quadrupole resonant frequency at the temperature measured by the temperature probe 3125.
  • the Matching/Tuning box 3100 also retunes the probe using the previously described retuning procedure in the first embodiment. Once this step has been completed the QR measurements can begin.
  • the process of transmitting and receiving described above is repeated for the QR signals.
  • the QR signals are stored within the computer for subsequent analysis.
  • the NLJ measurements continue until the object is well clear of the coils.
  • the NLJ and QR data are processed as discussed in the first embodiment.
  • the conveyor belt does not need to be stopped for scanning.
  • the procedure in the case where it is to be used with another similar technology such as NLJ, may interlace the two scan processes for NLJ and QR.
  • NLJ another similar technology
  • a single sequence can be constructed to deliver both a QR result and a NLJ result.
  • the coils would be multiply tuned for high signal to noise close to the fundamental for QR and multiple harmonics for NLJ.
  • Further embodiments comprise at least one subsystem which can detect the presence of IED' s by sensing the presence of electronic circuits, metal objects and explosives.
  • the large volume NLJD described previously is capable of detecting IED's by sensing the presence of electronic circuits by detecting NLJ's. By retuning the coils it is also possible to detect metal objects and explosives. This design reduces the complexity of the device and also reduces the footprint of the instrument. Reduction of footprint can be important in some spatially constrained situations.
  • Figure 30 shows the block diagram for combined NLJ, metal and explosives detector.
  • the PC Control 3020 then initiates the RF signal generator 3030 to begin generating RF pulses at the resonant frequency of the axial transmit coil 3110. These pulses are then filtered 3070, 3090; amplified 3080 and sent to the axial transmit coil 31 10. While these pulses are being sent to the axial transmit coil, the axial receiver coil 3160 receives any induced RF signal at the second harmonic of the transmit frequency.
  • This signal is then filtered 3120; transformed into quadrature signals 3120; demodulated 3050 from MHz signals down to kHz signals and then both quadrature signals are sampled at 0.25MHz 3040 to create digital signals and stored in the DSP's memory 3040. The sampling occurs for 560 ⁇ s generating 140 points of data.
  • This process is repeated for the vertical field producing coils, with the main exception being that the transmit frequency is slightly different to the axial coils to avoid any coupling effects between the two sets of coils.
  • the metal detection data is collected.
  • the receiver coils are retuned to have the same frequency as the transmit coils by the Matching/Tuning Box 3150.
  • the process of transmitting and receiving described above is repeated for both the horizontal and vertical coils. This process of transmitting on the vertical and axial coils for both NLJD and the metal detector is repeated a number of times until the conveyor belt is stopped to perform the quadrupole resonance measurements.
  • the conveyor is stopped when the object is substantially centred within the coils.
  • the axial transmit is the only coil used to detect quadrupole resonance signals, the other coils are switched to be open circuit and thereby have no effect upon the QR measurement.
  • the axial transmit coil is retuned by the Matching/Tuning Box 3100 to have the same frequency as the quadrupole resonant frequency at the temperature measured by the temperature probe 3125.
  • the Matching/Tuning box 3100 also retimes the probe using the previously described retuning procedure in the first embodiment.
  • the process of transmitting and receiving described above is repeated for the QR signals.
  • the QR signals are stored within the computer for subsequent analysis. Once the QR measurements have been completed the NLJ and MD measurements continue until the object is well clear of the coils.
  • the NLJ, MD and QR data are processed as discussed in the first and seventh embodiments.
  • the most reliable method for combining the results of the NLJ, MD and QR data is by taking the logical OR of the final results. If the ORed result is positive, then the combined NLJD, MD and QR detector has potentially detected an IED and an alarm is signalled.
  • IED detection embodiments are substantially the same as some previously described embodiments, except that the target IED can be located in one, two or three dimensions. All previously described detectors can be configured to repetitively scan an object as it moves through the coil structures. This information can be useful for locating the object in at least one dimension, which is along the conveyor belt.
  • a metallic object 412 is located approximately half way between the left hand coils 400,420,430 and the right hand coils 410,440,450, but slightly closer to the left hand coils.
  • the transmit coils 400,410 are identical as are the receive coils 420,430,440,450, then when the first transmit coil 400 generates a field which is received in coils 440,450, then the signal received by these right hand coils will be slightly less than the signal received by the left hand receiver coils 420,430 due to the object being closer to the left hand coils. Therefore if, as previously described, the received voltage signal is transformed into a frequency signal peak via the FFT, then the distance the metal object is across the tunnel can be calculated by:
  • Figure 32 shows the signals received from the horizontal receiver coils in the example in Figure 31.
  • the left top coil 420 receives a signal of 2.1 whereas the right top coil 440 receives a signal of 1.8.
  • the tunnel width is 600mm then the metallic object lies at distance across the tunnel of 323mm.
  • the two lower coils receive much less signal and hence are not used in this calculation.
  • the vertical height can be calculated by using the above formula and instead using the Tunnel Height, Top and Bottom frequency peaks.
  • the third dimension distance (along the conveyor) can be calculated by determining in which step the peak intensity occurred at the object passed through the coils. In Figure 32, this occurs at step 8.
  • the three dimensional co-ordinates of the objects have been determined.
  • a representation of the metal object is then displayed in a three dimensional plot on the computer monitor. This helps the operator by pointing out the location of the metal object and hence potential IED.
  • the upper limit is governed by the penetrability of radio waves into certain materials. Near IGHz water and plastics begin to absorb these frequencies and make detection impossible. Hence preferably the upper limit would lie near 100MHz, to ensure maximum penetrability. Even more preferable would be to operate these systems between 10OkHz and 16MHz as previously described.
  • AE objects emit frequencies that are broad band in nature, however the strongest signals occur between 100kHz and 16MHz.
  • electronic clocks or timers typically have operating frequencies in low MHz range.
  • Both systems are susceptible to external interferences and one of the main interferences that can occur is the AM radio band. This occurs from approximately 500 kHz to 1.6MHz. Even though the system is surrounded by a shield, this AM noise can still be picked up by cables in the system. To overcome this noise a fully enclosed shield could be used or use a band stop filter or other signal processing techniques to filter out the noise generated by particular radio stations.
  • the operating frequency lies between 1 Hz and 100 kHz to ensure ultra low coupling to the object being scanned. Even more preferable would be to operate in the range 1 Hz to 10 kHz as it is possible to determine some information about the type of metal target present in this frequency range. In particular aluminium foil responds differently to solid aluminium in this range.
  • the frequencies are fixed and hence cannot be varied. For explosives and many other substances these frequencies typically lie between 500 kHz to 6MHz.
  • an object is moved into an NLJD 800 and the transmit frequency is set to lie within the optimal 10 kHz to 100MHz range.
  • the object is then moved by the conveyor 850 into an AED 810 (if present) within which the tuned receiver frequencies lie within a 1 kHz to 100MHz range.
  • the AED 810 After it has been scanned by the AED 810 it is then moved into the MD 820 (if present) where it is scanned in the 1 Hz to 100kHz range.
  • QR detector 830 if present
  • the NLJD and AED subsystems may use scanning in the 100kHz-16MHz range and the MD may use scanning in the 1 Hz to 10 kHz range.
  • the results of each detector are combined to reduce the false alarm rate of the IED detector.
  • the results from one subsystem can be used as a confirmation sensor for another. For instance, if only the AED produces a positive result but none of the other subsystems produces a positive result then the alarm generated by the AED subsystem is ignored and the object is passed through the system as being clear of IED's. If on the other hand the QR system generates an alarm and at least one other subsystem produces an alarm then the system flags the object as potentially containing an IED.
  • Figure 34 the method used in this embodiment is shown.
  • the object is passed through the various subsystems present in the IED detector 900. Data is collected from each subsystem 910 and processed within a computer and then the results 920 are gathered together. If only one subsystem generates an alarm then the object is passed as clear 940. If however there have been two or more alarms generated then the object is passed as not being clear of IED's 960.
  • the results of each detection method derived by scanning the object are used to locate the object in at least one dimension and the positional correlation between detection methods is used to enhance the detection rate or lower the false positive rate.
  • this graph showed the signal on the horizontal coils as a metal object passed through the horizontal field oriented coils of the metal detector.
  • another detection method such as an NLJD
  • the two different detection methods will have produced a correlated result. Both detection methods will have detected a potential threat and detected it at the same location, meaning that is highly likely that the object is a threat.
  • the profiles of the signals were indicating differing locations then the object may be passed as clear.
  • Preferably information derived of the position of the object and/or threat would be displayed to the user to aid to locating the threat within the object.
  • Further embodiments may be substantially the same as any of the previously described embodiments, with the exception that the object would be placed into at least one subsystem containing at least one of the described detection technologies, but not moved by a conveyor.
  • This embodiment has the advantage of a reduction in complexity of the system and in general size.
  • the object may be placed into each subsystem with at least one permanently open end.
  • the process of scanning in this case for example may be initiated by a delayed timer after an optical beam is crossed by the movement into the scan volume. Equally as effective, the user may initiate the scan process by pushing a button when the object is in the correct position.
  • the object may be placed into a system whose open ends can be partially or completely closed with doors, which includes hatches, curtains etc.
  • the electromagnetic isolating doors have the significant advantage of reducing the degree of external electrical interference that would induce spurious signal on the detectors.
  • the doors also could have the advantage of reducing any electromagnetic emissions from the detectors of the system to satisfy emissions standards.
  • the doors also could be used to help contain any blast or radiation released while the object or threat in the system.
  • the object is moved by hand, forklift or some other transportation method into the first subsystem 4000 where it is scanned only once. This is different from the situation where there was a conveyor present because many measurements were performed as the object moved through the electronics detection subsystem. After scanning has been completed, it is then moved into the second subsystem 4100 where it is scanned once and then moved into the third subsystem
  • the object maybe scanned thousands of times as due to the weak QR signal many signals need to be accumulated to achieve enough signal to noise to detect an explosive.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Remote Sensing (AREA)
  • High Energy & Nuclear Physics (AREA)
  • Engineering & Computer Science (AREA)
  • Condensed Matter Physics & Semiconductors (AREA)
  • Geology (AREA)
  • Geophysics (AREA)
  • Environmental & Geological Engineering (AREA)
  • Electromagnetism (AREA)
  • General Life Sciences & Earth Sciences (AREA)
  • Chemical & Material Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Spectroscopy & Molecular Physics (AREA)
  • Analytical Chemistry (AREA)
  • Biochemistry (AREA)
  • General Health & Medical Sciences (AREA)
  • Immunology (AREA)
  • Pathology (AREA)
  • Geophysics And Detection Of Objects (AREA)

Abstract

La présente invention porte sur un système d'inspection pour détecter une menace à l'intérieur d'un objet. Le système d'inspection comporte une courroie transporteuse pour déplacer ledit objet dans une première direction à travers un volume de détection, au moins deux sous-systèmes d'inspection positionnés le long de la première direction, au moins un sous-système d'inspection transmettant des impulsions électromagnétiques à l'objet et les deux systèmes détectant des champs électromagnétiques générés par l'objet. Un ordinateur reçoit des données indicatives des champs électromagnétiques détectés, génère un signal en fonction des données et compare les signaux à des seuils prédéterminés.
PCT/AU2010/001060 2009-08-19 2010-08-18 Procédés, systèmes et appareils pour détecter des menaces de sécurité WO2011020148A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP10809364A EP2467321A1 (fr) 2009-08-19 2010-08-18 Procédés, systèmes et appareils pour détecter des menaces de sécurité

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2009903907 2009-08-19
AU2009903907A AU2009903907A0 (en) 2009-08-19 Methods and Apparatus for Detecting Threats

Publications (1)

Publication Number Publication Date
WO2011020148A1 true WO2011020148A1 (fr) 2011-02-24

Family

ID=43606473

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2010/001060 WO2011020148A1 (fr) 2009-08-19 2010-08-18 Procédés, systèmes et appareils pour détecter des menaces de sécurité

Country Status (2)

Country Link
EP (1) EP2467321A1 (fr)
WO (1) WO2011020148A1 (fr)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2017536864A (ja) * 2014-10-17 2017-12-14 コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. 空間分解金属検出器
US10110336B2 (en) 2016-07-22 2018-10-23 The Directv Group, Inc. Determining ambient noise in a device under test electromagnetic compatibility test environment
CN109709619A (zh) * 2018-12-22 2019-05-03 许敬良 安检箱包输出报警系统
WO2020002681A1 (fr) 2018-06-28 2020-01-02 Alessandro Manneschi Système de détection portable comprenant des capteurs magnétostatiques
WO2020002679A1 (fr) * 2018-06-28 2020-01-02 Alessandro Manneschi Système de détection portable comprenant des capteurs magnétostatiques
CN112505798A (zh) * 2020-11-27 2021-03-16 河北雄安太芯电子科技有限公司 基于太赫兹的物体检测方法
RU2775200C1 (ru) * 2018-06-28 2022-06-28 Алессандро МАННЕСКИ Переносная система детектирования, содержащая магнитостатические датчики
WO2024041878A1 (fr) * 2022-08-24 2024-02-29 Institut Dr. Foerster Gmbh & Co. Kg Détecteur de métaux et procédé de détection de métaux dans des objets à transporter

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006081615A1 (fr) * 2005-02-01 2006-08-10 Qrsciences Pty Ltd Procede et appareil permettant de detecter des volumes importants blindes
WO2006082521A2 (fr) * 2005-02-01 2006-08-10 Qrsciences Pty Ltd Sequençage d'articles pour scannage et criblage d'articles ameliore pour detecter des objets et des substances
WO2006081614A1 (fr) * 2005-02-01 2006-08-10 Qrsciences Pty Ltd Ordonnancement d'articles pour le balayage et inspection filtrage d'articles ameliore pour la detection d'objets et de substances
US20070200566A1 (en) * 2006-02-28 2007-08-30 Clark Keith A High performance security inspection system with physically isolated detection sensors
WO2008019750A2 (fr) * 2006-08-17 2008-02-21 Rheinmetall Waffe Munition Gmbh Dispositif et procédé de détection de composants ou de circuits électroniques non linéaires, en particulier d'un dispositif explosif improvisé ou analogue
US7464005B1 (en) * 2007-06-29 2008-12-09 The Curators Of The University Of Missouri Electromagnetic emissions stimulation and detection system
US7512511B1 (en) * 2006-03-30 2009-03-31 The Boeing Company Improvised explosive device countermeasures

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006081615A1 (fr) * 2005-02-01 2006-08-10 Qrsciences Pty Ltd Procede et appareil permettant de detecter des volumes importants blindes
WO2006082521A2 (fr) * 2005-02-01 2006-08-10 Qrsciences Pty Ltd Sequençage d'articles pour scannage et criblage d'articles ameliore pour detecter des objets et des substances
WO2006081614A1 (fr) * 2005-02-01 2006-08-10 Qrsciences Pty Ltd Ordonnancement d'articles pour le balayage et inspection filtrage d'articles ameliore pour la detection d'objets et de substances
US20070200566A1 (en) * 2006-02-28 2007-08-30 Clark Keith A High performance security inspection system with physically isolated detection sensors
US7512511B1 (en) * 2006-03-30 2009-03-31 The Boeing Company Improvised explosive device countermeasures
WO2008019750A2 (fr) * 2006-08-17 2008-02-21 Rheinmetall Waffe Munition Gmbh Dispositif et procédé de détection de composants ou de circuits électroniques non linéaires, en particulier d'un dispositif explosif improvisé ou analogue
US7464005B1 (en) * 2007-06-29 2008-12-09 The Curators Of The University Of Missouri Electromagnetic emissions stimulation and detection system

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2017536864A (ja) * 2014-10-17 2017-12-14 コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. 空間分解金属検出器
US10425178B2 (en) 2016-07-22 2019-09-24 The Directv Group, Inc. Determining ambient noise in a device under test electromagnetic compatibility test environment
US10110336B2 (en) 2016-07-22 2018-10-23 The Directv Group, Inc. Determining ambient noise in a device under test electromagnetic compatibility test environment
FR3083329A1 (fr) * 2018-06-28 2020-01-03 Alessandro Manneschi Systeme de detection portable comprenant des capteurs magnetostatiques
WO2020002681A1 (fr) 2018-06-28 2020-01-02 Alessandro Manneschi Système de détection portable comprenant des capteurs magnétostatiques
WO2020002679A1 (fr) * 2018-06-28 2020-01-02 Alessandro Manneschi Système de détection portable comprenant des capteurs magnétostatiques
EP3814809A1 (fr) * 2018-06-28 2021-05-05 Alessandro Manneschi Système de détection portable comprenant des capteurs magnétostatiques
EP3814807A1 (fr) * 2018-06-28 2021-05-05 Alessandro Manneschi Système de détection portable comprenant des capteurs magnétostatiques
RU2775200C1 (ru) * 2018-06-28 2022-06-28 Алессандро МАННЕСКИ Переносная система детектирования, содержащая магнитостатические датчики
RU2777705C1 (ru) * 2018-06-28 2022-08-08 Алессандро МАННЕСКИ Передвижная система обнаружения, содержащая магнитостатические датчики
RU2782706C2 (ru) * 2018-06-28 2022-11-01 Алессандро МАННЕСКИ Передвижная система обнаружения, содержащая магнитостатические датчики
CN109709619A (zh) * 2018-12-22 2019-05-03 许敬良 安检箱包输出报警系统
CN112505798A (zh) * 2020-11-27 2021-03-16 河北雄安太芯电子科技有限公司 基于太赫兹的物体检测方法
CN112505798B (zh) * 2020-11-27 2022-07-01 河北雄安太芯电子科技有限公司 基于太赫兹的物体检测方法
WO2024041878A1 (fr) * 2022-08-24 2024-02-29 Institut Dr. Foerster Gmbh & Co. Kg Détecteur de métaux et procédé de détection de métaux dans des objets à transporter

Also Published As

Publication number Publication date
EP2467321A1 (fr) 2012-06-27

Similar Documents

Publication Publication Date Title
EP2467321A1 (fr) Procédés, systèmes et appareils pour détecter des menaces de sécurité
US7218105B2 (en) Nuclear quadrupole resonance measurements
JP5288462B2 (ja) 爆発物、不正薬物検査装置、アンテナコイルおよび爆発物、不正薬物検査方法
US7345478B2 (en) Method and apparatus for detection of quadrupole nuclei in motion relative to the search region
US9903948B2 (en) Radar detection of a concealed object on a body
US20120161771A1 (en) Long distance explosive detection using nuclear quadrupole resonance and one or more monopoles
US8742753B2 (en) Method and apparatus for sensing the presence of explosives, contraband and other molecules using nuclear quadrupole resonance
US8773127B2 (en) Transmission line array for explosive detection using nuclear quadrupole resonance
CN109757122A (zh) 无线电力传输系统
US8710837B2 (en) Shipping container explosives and contraband detection system using nuclear quadrupole resonance
US20120206141A1 (en) Method and apparatus for sensing the presence of explosives, contraband and other molecules using nuclear quadrupole resonance and a swept frequency continuous wave source
EP3387627B1 (fr) Système de détection pour menaces multiples
US20210382166A1 (en) Multi-signal weapon detector
US9784877B2 (en) Matter detector, sensor and locator device and methods of operation
WO2006081615A1 (fr) Procede et appareil permettant de detecter des volumes importants blindes
US10001577B2 (en) Matter detector, sensor and locator device and methods of operation
US9823377B1 (en) Multi-threat detection of moving targets
CN105116455A (zh) 金属复合非线性节点探测器
EP1527361A1 (fr) Dispositif de balayage pour mesures de resonance nucleaire quadripolaire et procedes associes
US10921271B2 (en) Mobile detector and method for detecting potentially explosive substances, explosives and drugs by nuclear quadrupole resonance (NQR)
US20110187535A1 (en) Methods, systems, and apparatus for detecting medical devices
US11906686B2 (en) Luggage detector
Itozaki et al. Development of NQR explosive detector in Japan
Svatoš et al. Summary of Non-traditional Methods for Metal Detection and Discrimination

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10809364

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2010809364

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE