INJECTION OF SIMULATED SOURCES IN A SYSTEM OF NETWORKED SENSORS
[0001] CROSS-REFERENCE TO RELATED APPLICATIONS
[0002] This application claims benefit of and priority to U.S. Provisional serial number 61/891636, entitled "INJECTION OF SIMULATED SOURCES IN A SYSTEM OF NETWORKED SENSORS," filed October 16, 2013 by Daniel A. Cooper, James B. Costales, Krzysztof Kamieniecki, Robert J. Ledoux, and Jeffrey K. Thompson, which is hereby incorporated herein by reference in its entirety.
[0003] BACKGROUND
[0004] Law enforcement and other agencies use a variety of sensors to detect hazardous materials such as radioactive/nuclear materials, chemicals, biohazards and explosives. Training and testing personnel and equipment with actual hazardous material presents problems. For example, radioactive sources that are dangerous enough to realistically portray a potential terrorist or environmental hazard will also be potentially hazardous to trainees, and may present a safety risk to the public. It may also be difficult, for reasons of cost, security, regulations, etc., to maintain an actual inventory of all potentially threatening sources merely for training purposes.
[0005] Simulated sources solve many such problems. A simulated source injected into a detection system can be made indistinguishable from a real source, from the point of view of sensor nodes and trainees, providing realistic training and systems testing. A simulated source has no associated radioactive or other hazards since there is no actual source involved. And the only practical limit on the diversity of simulated training scenarios is the imagination of the programmer responsible for the simulation. Unusual or unexpected situations are just as easy to simulate as run-of-the-mill hazards and do not require stockpiling of exotic materials.
[0006] Simulated sources can be used both to train users and also to test the system.
[0007] SUMMARY
[0008] Simulated sources can be injected into a networked system for use in training and/or testing.
[0009] BRIEF DESCRIPTION OF THE DRAWINGS
[0010] FIGS. 1-3 schematically show a sensor network in which a simulated source or sources are used for training or testing.
[0011] DETAILED DESCRIPTION
[0012] The presence of a source can be detected using a network of sensors. A group of people, e.g., security personnel, first responders, etc., may patrol an area, each carrying or wearing a detector that is connected to a network, in some cases wirelessly. Sensors may also be fixed in place, for example at a security checkpoint or other significant location. Sensors may also be mounted on vehicles, for example, vehicles for used in public transportation, vehicles used by the general public, or vehicles used by first responders or other security or patrol personnel, such as cars, trucks, boats or aircraft. The detector may be a radiation detector, a chemical detector, or any other suitable detector for the source in question. In normal operation each networked sensor collects data that may be transmitted to a central processor or other nodes in the network, and the sensor may in turn receive such signals, with the result that data from the network as a whole is collectively processed to determine if, when, and where a source is present.
[0013] In a simulation mode which could be used for testing or training, the presence of a source can be simulated. The properties of the simulated source such as location, velocity, and activity level, are predetermined. Those properties are then combined with the known properties of each sensor node, such as location, velocity and sensitivity, to calculate an estimate what each sensor's response would be if the simulated source were real. Other simulated source properties may be included as well, for example, orientation and directional emission characteristics, or a spectral characteristic such as emission according to the spectrum of a particular radioisotope. The estimated response can be treated, for training or testing purposes, as if it were the actual response of the detector to a real source. This can be accomplished in one, or a combination, of three ways.
[0014] In a first alternative, shown schematically in FIG. 1, the simulated source properties could be transmitted to each sensor node 11-16 where each node would individually estimate its hypothetical response, resulting in simulated data. That simulated data would then be treated by the sensor node in the same way that actual data would in an actual deployment of the system, by transmitting the data across the network for collective analysis. The collective analysis could be carried out by a central processor 17, or in some other way over the network. This method requires each sensor node to maintain the necessary information about its own state to be able to estimate its response to an arbitrary
source. Such information might include location, velocity, sensitivity, and could also include a description of its physical surroundings, either empirical or simulated, for example a map of background radiation, or the locations of significant geographica l features like buildings or bodies of water. In some em bodiments the node can also sense and report on other aspects of its local environment, such as ambient temperature, humidity, and/or barometric pressure, the lack or presence of precipitation, amount and/or type of precipitation, and wind speed a nd/or direction.
[0015] In a second alternative, shown schematically in FIG. 2, a central processor 27 would store information a bout the simulated source, and collect information a bout the state of each sensor 21-26, such as sensor location, sensor velocity and sensor sensitivity. The central processor 27 would then calculate for each sensor 21-26 an estimate of the sensor's response to the simulated source. The central processor 27 could likewise store additional information, either empirical or simulated, on background radiation or significant geography that could be used to construct a physical model which in turn could be included in the estimate of each sensor's response to the simulated source. The simulated data could then be sent back to each sensor node for high level processing, e.g., in systems where each node is separately responsible for triggering alarms, or reporting data to its user. Although the additional information used by the central processor could be the same sort of information used by each individual node in the first alternative, the second alternative may allow for the use of more complex information and physical models, since a central processor can have more computing power than a porta ble sensor node.
[0016] In a third alternative, shown schematically in FIG. 3, all calculation and processing would be carried out by a central processor 37, including high-level calculations. Individual nodes 31-36 would simply receive from the central processor any data to be displayed or alarm indications to be communicated to the user. In this case, the nodes need not be fully functioning sensor nodes, and could instead be training nodes capa ble only of receiving instructions regarding what to display through a user interface, i.e., "dum b" nodes. Or in this alternative the sensor nodes could contribute actual measurements of background to the central processor and function as more than "du mb" training nodes. Indeed, in all three alternatives, the individual nodes can either continually measure and record background radiation and contribute that data to the simulation, or simply rely on a simulated background.
[0017] In each of the three alternatives, the simulated source properties can be based on a purely virtual source whose properties are based on no real world data, or the simulated
source location as a function of time can be based on the location of a "prey" node. Just like the other nodes, the prey node can report its position back to the central processor as a function of time. The central processor could then use the prey node's location as a predetermined location of the simulated source at each time. The prey node could be carried by tra ining personnel who could add to the training scenario, for example, by moving to evade trainees carrying sensor nodes.
[0018] In all cases, an advantage of the systems and methods described herein is that the simulated signal is injected into a live network, in many cases including live data being collected and analyzed in real-time. The simu lated source could be the only data, simulated or real, in the system. Or the simu lated source could be injected into the system along with injected, simulated background measurements, for example, in order to test the detection power of a system as a function of signal to noise ratio. Or the simulated source could be injected over actual data being acquired in real time. This last alternative allows for a realistic training and/or testing environment, referred to as "sim-over-live." By injecting a simulated source over real background data, a system can avoid computationally expensive simulation of background radiation, while simultaneously making the simulation realistic. Such an injected source ca n be included with or without alerting users that a simulation is going on. That has the advantage of making the test more realistic. Another benefit is avoiding downtime; during such a test, the system could continue to operate normally at the same time, continuing to potentially detect real sources during the simulation.
[0019] In all embodiments described herein, any simulation can be carried out with a plurality of simulated sources, or a single simulated source.
[0020] In addition to training users, injection of sources can be usefu l both for testing the operation of a system of nodes, e.g., systems integration of the various parts of the network, and also for empirically testing the sensitivity of the system as a whole. A simulated source can be injected into a working system in order to see whether, in a real-life situation, a given type of source would be detected by the system. This can provide insight into how many sensors are required for a particular threat scenario or to test new CONOPs in operationally realistic scenarios.
[0021] In all em bodiments there are at least two basic functions of the processing, (1) normal processing of data that would be used in normal operation to detect a source or sources, and (2) managing testing/training data and other signals and their movement through and use in the network. These two functions can be performed in a single processor 17, 27, 37 or split over separated elements of the system. A central processor can have
many additional functions as well, including situational awareness of a testing/training exercise, and evaluation and feedback on the exercise.
[0022] In any of these embodiments, the central processor can, at each time step, store the locations and simulated responses of each node. This allows for after-the-fact analysis of the response of the system and its users, e.g., a playback of the simulation.
[0023] Examples of certain embodiments
[0024] A method can simulate the response of a system to at least one simulated source, the at least one simulated source having at least a predetermined simulated source location and a predetermined simulated source activity level at a predetermined time. The system can include a plurality of nodes; a central processor programmed to determine whether a source is detected by applying a predetermined algorithm to data associated with the plurality of nodes, the central processor having stored within it the predetermined simulated source location and the predetermined simulated source activity level; a network linking each node and the central processor such that signals can be transmitted between each node and the central processor; and an output device.
[0025] The method can include: (1) transmitting through the network from each node to the central processor a measured or inferred location for that node at the predetermined time; (2) calculating, based on at least (a) the measured or inferred location of each node at the predetermined time, (b) the predetermined simulated source location at the predetermined time, and (c) the predetermined simulated source activity level at the predetermined time, simulated response data for each node associated with the predetermined time; (3) in the central processor, applying the predetermined algorithm to the simulated response data for all the nodes, thereby determining whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time; and (4) signaling with the output device whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time.
[0026] In some such methods step (2) can be carried out in the central processor; and in step (2), calculating simulated response data for each node can be further based on simulated background data for each node. The simulated background data for each node can be generated by the central processor based on (a) the measured or inferred location of each node and (b) a predetermined background model stored in the central processor.
[0027] In some such methods each of, or some of, the plurality of nodes can include a sensor. In such methods, step (1) can further include transmitting through the network from each node to the central processor background data measured with that node's sensor; step (2) can be carried out in the central processor; and in step (2), calculating simulated response data for each node can be further based upon the transmitted background data measured with that sensor. In such methods, each of the plurality of nodes can further includes a node processor; in step (2), calculating simulated response data for each node can be carried out in that node's processor; and in step (2), calculating simulated response data for each node can be further based upon background data measured with that node's sensor. A sensor on a node can be, for example, a radiation detector or a chemical detector.
[0028] In some such methods the at least one simulated source can have at least predetermined simulated source locations and a predetermined simulated source activity levels at each of a plurality of predetermined times. Such methods can further include repeating steps (l)-(4) at each of the plurality of predetermined times.
[0029] In some such methods the at least one simulated source further can have a predetermined simulated source trajectory including the predetermined simulated source location and a predetermined simulated source velocity at each predetermined time; step (1) can further include transmitting across the network from each node to the central processor a measured or inferred velocity for each node at the predetermined time; and in step (2), calculating simulated response data for each node can further be based on the predetermined simulated source trajectory and velocity of that node at the predetermined time. The trajectory can be simple, such as for a stationary source, or more complex, such as a simulated trajectory of a pedestrian, or a vehicle.
[0030] Each node may be identical or substantially identical. Or the system may include nodes with a variety of different characteristics. One or more nodes may be located on a person. One or more nodes may be stationary, for example, a permanently installed node in a public place such as a signpost or lamppost. The output device may be located on one or more of the nodes, and/or on the central processor. Each node may include its own output device. If so, step (4) can further include signaling with (a) the output device included in the node closest to the predetermined simulated source location and/or (b) any other output devices included in nodes within a predetermined distance from the predetermined simulated source location.
[0031] In some such methods the at least one simulated source further has a
predetermined simulated source spectral characteristic. In such methods, in step (2),
calculating simulated response data for each node can be further based on the
predetermined simulated source spectral characteristic.
[0032] In some such methods, step (1) can also include transmitting through the network from each node to the central processor a measured or inferred orientation for that node at the predetermined time. In such methods, in step (2), calculating simulated response data for each node can be further based on the measured or inferred orientation for that node at the predetermined time.
[0033] In some such methods, step (1) can also include transmitting through the network from each node to the central processor at least one measured or inferred environmental condition. In such methods, in step (2), calculating simulated response data for each node can be further based on the transmitted at least one measured or inferred environmental condition for that node. Such environmental conditions can include for example, (a) rate, amount or type of precipitation, (b) wind speed and/or wind direction, (c) ambient temperature, e.g., air or water temperature, (d) humidity, and (e) barometric pressure.
[0034] Some such methods can also include (5) storing at the predetermined time, the simulated response data for each node associated with the predetermined time and data representative of whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time. Such methods may also include repeating step (5) at each of the plurality of predetermined times. In such methods storing can include storing data in either (a) the central processor, or (b) one or more nodes, or both (a) and (b).
[0035] In some such methods the at least one simulated source can be a plurality of simulated sources.
[0036] In some such methods the predetermined simulated source location can be a location in a two or three dimensional coordinate system.
[0037] In some such methods, one of the plurality of nodes is a designated prey node. In such methods, the predetermined simulated source location at the predetermined time can be based on the measured or inferred location of the prey node at the predetermined time.
[0038] In some embodiments, a method of simulating the response of a system to a simulated source can include providing a system including (a) a plurality of sensors and (b) a central processor having an output device; formulating, in the central processor, a simulated source; estimating the response of each of the plurality of sensors to the simulated source; and outputting from the output device a signal indicative of whether the system would be able to detect a real source having the properties of the simulated source.
[0039] While the systems and methods disclosed herein have been particularly shown and described with references to exemplary embodiments thereof, they are not so limited and it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the disclosure. It should be realized this invention is also capable of a wide variety of further and other embodiments within the scope of the invention. Those skilled in the art will recognize or be able to ascertain using no more than routine experimentation, many equivalents to the exemplary embodiments described specifically herein. Such equivalents are intended to be encompassed in the scope of the present disclosure.