WO2015057264A1 - Injection of simulated sources in a system of networked sensors - Google Patents

Injection of simulated sources in a system of networked sensors Download PDF

Info

Publication number
WO2015057264A1
WO2015057264A1 PCT/US2014/037210 US2014037210W WO2015057264A1 WO 2015057264 A1 WO2015057264 A1 WO 2015057264A1 US 2014037210 W US2014037210 W US 2014037210W WO 2015057264 A1 WO2015057264 A1 WO 2015057264A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
predetermined
simulated
source
central processor
Prior art date
Application number
PCT/US2014/037210
Other languages
French (fr)
Inventor
Daniel A. COOPER
James B. COSTALES
Krzysztof E. KAMIENIECKI
Stephen E. Korbly
Robert J. Ledoux
Jeffrey K. Thompson
Original Assignee
Passport Systems, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Passport Systems, Inc. filed Critical Passport Systems, Inc.
Priority to JP2016549007A priority Critical patent/JP2016535379A/en
Priority to EP14854212.9A priority patent/EP3058504B1/en
Priority to US14/358,613 priority patent/US10579747B2/en
Publication of WO2015057264A1 publication Critical patent/WO2015057264A1/en
Priority to US16/713,566 priority patent/US20200117840A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/20Design optimisation, verification or simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/04Inference or reasoning models
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/12Checking intermittently signalling or alarm systems
    • G08B29/14Checking intermittently signalling or alarm systems checking the detection circuits
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B9/00Simulators for teaching or training purposes
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H50/00ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
    • G16H50/80ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for detecting, monitoring or modelling epidemics or pandemics, e.g. flu
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/12Alarms for ensuring the safety of persons responsive to undesired emission of substances, e.g. pollution alarms

Definitions

  • Simulated sources solve many such problems.
  • a simulated source injected into a detection system can be made indistinguishable from a real source, from the point of view of sensor nodes and trainees, providing realistic training and systems testing.
  • a simulated source has no associated radioactive or other hazards since there is no actual source involved. And the only practical limit on the diversity of simulated training scenarios is the imagination of the programmer responsible for the simulation. Unusual or unexpected situations are just as easy to simulate as run-of-the-mill hazards and do not require stockpiling of exotic materials.
  • Simulated sources can be used both to train users and also to test the system.
  • FIGS. 1-3 schematically show a sensor network in which a simulated source or sources are used for training or testing.
  • the presence of a source can be detected using a network of sensors.
  • a group of people e.g., security personnel, first responders, etc., may patrol an area, each carrying or wearing a detector that is connected to a network, in some cases wirelessly.
  • Sensors may also be fixed in place, for example at a security checkpoint or other significant location.
  • Sensors may also be mounted on vehicles, for example, vehicles for used in public transportation, vehicles used by the general public, or vehicles used by first responders or other security or patrol personnel, such as cars, trucks, boats or aircraft.
  • the detector may be a radiation detector, a chemical detector, or any other suitable detector for the source in question.
  • each networked sensor collects data that may be transmitted to a central processor or other nodes in the network, and the sensor may in turn receive such signals, with the result that data from the network as a whole is collectively processed to determine if, when, and where a source is present.
  • the presence of a source can be simulated.
  • the properties of the simulated source such as location, velocity, and activity level, are predetermined. Those properties are then combined with the known properties of each sensor node, such as location, velocity and sensitivity, to calculate an estimate what each sensor's response would be if the simulated source were real.
  • Other simulated source properties may be included as well, for example, orientation and directional emission characteristics, or a spectral characteristic such as emission according to the spectrum of a particular radioisotope.
  • the estimated response can be treated, for training or testing purposes, as if it were the actual response of the detector to a real source. This can be accomplished in one, or a combination, of three ways.
  • the simulated source properties could be transmitted to each sensor node 11-16 where each node would individually estimate its hypothetical response, resulting in simulated data. That simulated data would then be treated by the sensor node in the same way that actual data would in an actual deployment of the system, by transmitting the data across the network for collective analysis.
  • the collective analysis could be carried out by a central processor 17, or in some other way over the network. This method requires each sensor node to maintain the necessary information about its own state to be able to estimate its response to an arbitrary source.
  • Such information might include location, velocity, sensitivity, and could also include a description of its physical surroundings, either empirical or simulated, for example a map of background radiation, or the locations of significant geographica l features like buildings or bodies of water.
  • the node can also sense and report on other aspects of its local environment, such as ambient temperature, humidity, and/or barometric pressure, the lack or presence of precipitation, amount and/or type of precipitation, and wind speed a nd/or direction.
  • a central processor 27 would store information a bout the simulated source, and collect information a bout the state of each sensor 21-26, such as sensor location, sensor velocity and sensor sensitivity. The central processor 27 would then calculate for each sensor 21-26 an estimate of the sensor's response to the simulated source. The central processor 27 could likewise store additional information, either empirical or simulated, on background radiation or significant geography that could be used to construct a physical model which in turn could be included in the estimate of each sensor's response to the simulated source. The simulated data could then be sent back to each sensor node for high level processing, e.g., in systems where each node is separately responsible for triggering alarms, or reporting data to its user.
  • the second alternative may allow for the use of more complex information and physical models, since a central processor can have more computing power than a porta ble sensor node.
  • a third alternative shown schematically in FIG. 3, all calculation and processing would be carried out by a central processor 37, including high-level calculations.
  • Individual nodes 31-36 would simply receive from the central processor any data to be displayed or alarm indications to be communicated to the user.
  • the nodes need not be fully functioning sensor nodes, and could instead be training nodes capa ble only of receiving instructions regarding what to display through a user interface, i.e., "dum b" nodes.
  • the sensor nodes could contribute actual measurements of background to the central processor and function as more than "du mb" training nodes.
  • the individual nodes can either continually measure and record background radiation and contribute that data to the simulation, or simply rely on a simulated background.
  • the simulated source properties can be based on a purely virtual source whose properties are based on no real world data, or the simulated source location as a function of time can be based on the location of a "prey" node.
  • the prey node can report its position back to the central processor as a function of time.
  • the central processor could then use the prey node's location as a predetermined location of the simulated source at each time.
  • the prey node could be carried by tra ining personnel who could add to the training scenario, for example, by moving to evade trainees carrying sensor nodes.
  • an advantage of the systems and methods described herein is that the simulated signal is injected into a live network, in many cases including live data being collected and analyzed in real-time.
  • the simu lated source could be the only data, simulated or real, in the system. Or the simu lated source could be injected into the system along with injected, simulated background measurements, for example, in order to test the detection power of a system as a function of signal to noise ratio. Or the simulated source could be injected over actual data being acquired in real time.
  • Sim-over-live a realistic training and/or testing environment
  • a system can avoid computationally expensive simulation of background radiation, while simultaneously making the simulation realistic.
  • Such an injected source ca n be included with or without alerting users that a simulation is going on. That has the advantage of making the test more realistic.
  • Another benefit is avoiding downtime; during such a test, the system could continue to operate normally at the same time, continuing to potentially detect real sources during the simulation.
  • any simulation can be carried out with a plurality of simulated sources, or a single simulated source.
  • injection of sources can be usefu l both for testing the operation of a system of nodes, e.g., systems integration of the various parts of the network, and also for empirically testing the sensitivity of the system as a whole.
  • a simulated source can be injected into a working system in order to see whether, in a real-life situation, a given type of source would be detected by the system. This can provide insight into how many sensors are required for a particular threat scenario or to test new CONOPs in operationally realistic scenarios.
  • the central processor can, at each time step, store the locations and simulated responses of each node. This allows for after-the-fact analysis of the response of the system and its users, e.g., a playback of the simulation.
  • a method can simulate the response of a system to at least one simulated source, the at least one simulated source having at least a predetermined simulated source location and a predetermined simulated source activity level at a predetermined time.
  • the system can include a plurality of nodes; a central processor programmed to determine whether a source is detected by applying a predetermined algorithm to data associated with the plurality of nodes, the central processor having stored within it the predetermined simulated source location and the predetermined simulated source activity level; a network linking each node and the central processor such that signals can be transmitted between each node and the central processor; and an output device.
  • the method can include: (1) transmitting through the network from each node to the central processor a measured or inferred location for that node at the predetermined time; (2) calculating, based on at least (a) the measured or inferred location of each node at the predetermined time, (b) the predetermined simulated source location at the predetermined time, and (c) the predetermined simulated source activity level at the predetermined time, simulated response data for each node associated with the predetermined time; (3) in the central processor, applying the predetermined algorithm to the simulated response data for all the nodes, thereby determining whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time; and (4) signaling with the output device whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time.
  • step (2) can be carried out in the central processor; and in step (2), calculating simulated response data for each node can be further based on simulated background data for each node.
  • the simulated background data for each node can be generated by the central processor based on (a) the measured or inferred location of each node and (b) a predetermined background model stored in the central processor.
  • each of, or some of, the plurality of nodes can include a sensor.
  • step (1) can further include transmitting through the network from each node to the central processor background data measured with that node's sensor; step (2) can be carried out in the central processor; and in step (2), calculating simulated response data for each node can be further based upon the transmitted background data measured with that sensor.
  • each of the plurality of nodes can further includes a node processor; in step (2), calculating simulated response data for each node can be carried out in that node's processor; and in step (2), calculating simulated response data for each node can be further based upon background data measured with that node's sensor.
  • a sensor on a node can be, for example, a radiation detector or a chemical detector.
  • the at least one simulated source can have at least predetermined simulated source locations and a predetermined simulated source activity levels at each of a plurality of predetermined times.
  • Such methods can further include repeating steps (l)-(4) at each of the plurality of predetermined times.
  • the at least one simulated source further can have a predetermined simulated source trajectory including the predetermined simulated source location and a predetermined simulated source velocity at each predetermined time; step (1) can further include transmitting across the network from each node to the central processor a measured or inferred velocity for each node at the predetermined time; and in step (2), calculating simulated response data for each node can further be based on the predetermined simulated source trajectory and velocity of that node at the predetermined time.
  • the trajectory can be simple, such as for a stationary source, or more complex, such as a simulated trajectory of a pedestrian, or a vehicle.
  • Each node may be identical or substantially identical. Or the system may include nodes with a variety of different characteristics.
  • One or more nodes may be located on a person.
  • One or more nodes may be stationary, for example, a permanently installed node in a public place such as a signpost or lamppost.
  • the output device may be located on one or more of the nodes, and/or on the central processor.
  • Each node may include its own output device. If so, step (4) can further include signaling with (a) the output device included in the node closest to the predetermined simulated source location and/or (b) any other output devices included in nodes within a predetermined distance from the predetermined simulated source location.
  • the at least one simulated source further has a
  • step (2) calculating simulated response data for each node can be further based on the
  • step (1) can also include transmitting through the network from each node to the central processor a measured or inferred orientation for that node at the predetermined time.
  • step (2) calculating simulated response data for each node can be further based on the measured or inferred orientation for that node at the predetermined time.
  • step (1) can also include transmitting through the network from each node to the central processor at least one measured or inferred environmental condition.
  • calculating simulated response data for each node can be further based on the transmitted at least one measured or inferred environmental condition for that node.
  • environmental conditions can include for example, (a) rate, amount or type of precipitation, (b) wind speed and/or wind direction, (c) ambient temperature, e.g., air or water temperature, (d) humidity, and (e) barometric pressure.
  • Some such methods can also include (5) storing at the predetermined time, the simulated response data for each node associated with the predetermined time and data representative of whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time.
  • Such methods may also include repeating step (5) at each of the plurality of predetermined times.
  • storing can include storing data in either (a) the central processor, or (b) one or more nodes, or both (a) and (b).
  • the at least one simulated source can be a plurality of simulated sources.
  • the predetermined simulated source location can be a location in a two or three dimensional coordinate system.
  • one of the plurality of nodes is a designated prey node.
  • the predetermined simulated source location at the predetermined time can be based on the measured or inferred location of the prey node at the predetermined time.
  • a method of simulating the response of a system to a simulated source can include providing a system including (a) a plurality of sensors and (b) a central processor having an output device; formulating, in the central processor, a simulated source; estimating the response of each of the plurality of sensors to the simulated source; and outputting from the output device a signal indicative of whether the system would be able to detect a real source having the properties of the simulated source.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Public Health (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • Artificial Intelligence (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Biomedical Technology (AREA)
  • Databases & Information Systems (AREA)
  • Pathology (AREA)
  • Epidemiology (AREA)
  • Primary Health Care (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Educational Administration (AREA)
  • Educational Technology (AREA)
  • Computational Linguistics (AREA)
  • Computer Hardware Design (AREA)
  • Geometry (AREA)
  • Testing Or Calibration Of Command Recording Devices (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Simulated sources can be injected into a networked system for use in training and/or testing.

Description

INJECTION OF SIMULATED SOURCES IN A SYSTEM OF NETWORKED SENSORS
[0001] CROSS-REFERENCE TO RELATED APPLICATIONS
[0002] This application claims benefit of and priority to U.S. Provisional serial number 61/891636, entitled "INJECTION OF SIMULATED SOURCES IN A SYSTEM OF NETWORKED SENSORS," filed October 16, 2013 by Daniel A. Cooper, James B. Costales, Krzysztof Kamieniecki, Robert J. Ledoux, and Jeffrey K. Thompson, which is hereby incorporated herein by reference in its entirety.
[0003] BACKGROUND
[0004] Law enforcement and other agencies use a variety of sensors to detect hazardous materials such as radioactive/nuclear materials, chemicals, biohazards and explosives. Training and testing personnel and equipment with actual hazardous material presents problems. For example, radioactive sources that are dangerous enough to realistically portray a potential terrorist or environmental hazard will also be potentially hazardous to trainees, and may present a safety risk to the public. It may also be difficult, for reasons of cost, security, regulations, etc., to maintain an actual inventory of all potentially threatening sources merely for training purposes.
[0005] Simulated sources solve many such problems. A simulated source injected into a detection system can be made indistinguishable from a real source, from the point of view of sensor nodes and trainees, providing realistic training and systems testing. A simulated source has no associated radioactive or other hazards since there is no actual source involved. And the only practical limit on the diversity of simulated training scenarios is the imagination of the programmer responsible for the simulation. Unusual or unexpected situations are just as easy to simulate as run-of-the-mill hazards and do not require stockpiling of exotic materials.
[0006] Simulated sources can be used both to train users and also to test the system.
[0007] SUMMARY
[0008] Simulated sources can be injected into a networked system for use in training and/or testing. [0009] BRIEF DESCRIPTION OF THE DRAWINGS
[0010] FIGS. 1-3 schematically show a sensor network in which a simulated source or sources are used for training or testing.
[0011] DETAILED DESCRIPTION
[0012] The presence of a source can be detected using a network of sensors. A group of people, e.g., security personnel, first responders, etc., may patrol an area, each carrying or wearing a detector that is connected to a network, in some cases wirelessly. Sensors may also be fixed in place, for example at a security checkpoint or other significant location. Sensors may also be mounted on vehicles, for example, vehicles for used in public transportation, vehicles used by the general public, or vehicles used by first responders or other security or patrol personnel, such as cars, trucks, boats or aircraft. The detector may be a radiation detector, a chemical detector, or any other suitable detector for the source in question. In normal operation each networked sensor collects data that may be transmitted to a central processor or other nodes in the network, and the sensor may in turn receive such signals, with the result that data from the network as a whole is collectively processed to determine if, when, and where a source is present.
[0013] In a simulation mode which could be used for testing or training, the presence of a source can be simulated. The properties of the simulated source such as location, velocity, and activity level, are predetermined. Those properties are then combined with the known properties of each sensor node, such as location, velocity and sensitivity, to calculate an estimate what each sensor's response would be if the simulated source were real. Other simulated source properties may be included as well, for example, orientation and directional emission characteristics, or a spectral characteristic such as emission according to the spectrum of a particular radioisotope. The estimated response can be treated, for training or testing purposes, as if it were the actual response of the detector to a real source. This can be accomplished in one, or a combination, of three ways.
[0014] In a first alternative, shown schematically in FIG. 1, the simulated source properties could be transmitted to each sensor node 11-16 where each node would individually estimate its hypothetical response, resulting in simulated data. That simulated data would then be treated by the sensor node in the same way that actual data would in an actual deployment of the system, by transmitting the data across the network for collective analysis. The collective analysis could be carried out by a central processor 17, or in some other way over the network. This method requires each sensor node to maintain the necessary information about its own state to be able to estimate its response to an arbitrary source. Such information might include location, velocity, sensitivity, and could also include a description of its physical surroundings, either empirical or simulated, for example a map of background radiation, or the locations of significant geographica l features like buildings or bodies of water. In some em bodiments the node can also sense and report on other aspects of its local environment, such as ambient temperature, humidity, and/or barometric pressure, the lack or presence of precipitation, amount and/or type of precipitation, and wind speed a nd/or direction.
[0015] In a second alternative, shown schematically in FIG. 2, a central processor 27 would store information a bout the simulated source, and collect information a bout the state of each sensor 21-26, such as sensor location, sensor velocity and sensor sensitivity. The central processor 27 would then calculate for each sensor 21-26 an estimate of the sensor's response to the simulated source. The central processor 27 could likewise store additional information, either empirical or simulated, on background radiation or significant geography that could be used to construct a physical model which in turn could be included in the estimate of each sensor's response to the simulated source. The simulated data could then be sent back to each sensor node for high level processing, e.g., in systems where each node is separately responsible for triggering alarms, or reporting data to its user. Although the additional information used by the central processor could be the same sort of information used by each individual node in the first alternative, the second alternative may allow for the use of more complex information and physical models, since a central processor can have more computing power than a porta ble sensor node.
[0016] In a third alternative, shown schematically in FIG. 3, all calculation and processing would be carried out by a central processor 37, including high-level calculations. Individual nodes 31-36 would simply receive from the central processor any data to be displayed or alarm indications to be communicated to the user. In this case, the nodes need not be fully functioning sensor nodes, and could instead be training nodes capa ble only of receiving instructions regarding what to display through a user interface, i.e., "dum b" nodes. Or in this alternative the sensor nodes could contribute actual measurements of background to the central processor and function as more than "du mb" training nodes. Indeed, in all three alternatives, the individual nodes can either continually measure and record background radiation and contribute that data to the simulation, or simply rely on a simulated background.
[0017] In each of the three alternatives, the simulated source properties can be based on a purely virtual source whose properties are based on no real world data, or the simulated source location as a function of time can be based on the location of a "prey" node. Just like the other nodes, the prey node can report its position back to the central processor as a function of time. The central processor could then use the prey node's location as a predetermined location of the simulated source at each time. The prey node could be carried by tra ining personnel who could add to the training scenario, for example, by moving to evade trainees carrying sensor nodes.
[0018] In all cases, an advantage of the systems and methods described herein is that the simulated signal is injected into a live network, in many cases including live data being collected and analyzed in real-time. The simu lated source could be the only data, simulated or real, in the system. Or the simu lated source could be injected into the system along with injected, simulated background measurements, for example, in order to test the detection power of a system as a function of signal to noise ratio. Or the simulated source could be injected over actual data being acquired in real time. This last alternative allows for a realistic training and/or testing environment, referred to as "sim-over-live." By injecting a simulated source over real background data, a system can avoid computationally expensive simulation of background radiation, while simultaneously making the simulation realistic. Such an injected source ca n be included with or without alerting users that a simulation is going on. That has the advantage of making the test more realistic. Another benefit is avoiding downtime; during such a test, the system could continue to operate normally at the same time, continuing to potentially detect real sources during the simulation.
[0019] In all embodiments described herein, any simulation can be carried out with a plurality of simulated sources, or a single simulated source.
[0020] In addition to training users, injection of sources can be usefu l both for testing the operation of a system of nodes, e.g., systems integration of the various parts of the network, and also for empirically testing the sensitivity of the system as a whole. A simulated source can be injected into a working system in order to see whether, in a real-life situation, a given type of source would be detected by the system. This can provide insight into how many sensors are required for a particular threat scenario or to test new CONOPs in operationally realistic scenarios.
[0021] In all em bodiments there are at least two basic functions of the processing, (1) normal processing of data that would be used in normal operation to detect a source or sources, and (2) managing testing/training data and other signals and their movement through and use in the network. These two functions can be performed in a single processor 17, 27, 37 or split over separated elements of the system. A central processor can have many additional functions as well, including situational awareness of a testing/training exercise, and evaluation and feedback on the exercise.
[0022] In any of these embodiments, the central processor can, at each time step, store the locations and simulated responses of each node. This allows for after-the-fact analysis of the response of the system and its users, e.g., a playback of the simulation.
[0023] Examples of certain embodiments
[0024] A method can simulate the response of a system to at least one simulated source, the at least one simulated source having at least a predetermined simulated source location and a predetermined simulated source activity level at a predetermined time. The system can include a plurality of nodes; a central processor programmed to determine whether a source is detected by applying a predetermined algorithm to data associated with the plurality of nodes, the central processor having stored within it the predetermined simulated source location and the predetermined simulated source activity level; a network linking each node and the central processor such that signals can be transmitted between each node and the central processor; and an output device.
[0025] The method can include: (1) transmitting through the network from each node to the central processor a measured or inferred location for that node at the predetermined time; (2) calculating, based on at least (a) the measured or inferred location of each node at the predetermined time, (b) the predetermined simulated source location at the predetermined time, and (c) the predetermined simulated source activity level at the predetermined time, simulated response data for each node associated with the predetermined time; (3) in the central processor, applying the predetermined algorithm to the simulated response data for all the nodes, thereby determining whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time; and (4) signaling with the output device whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time.
[0026] In some such methods step (2) can be carried out in the central processor; and in step (2), calculating simulated response data for each node can be further based on simulated background data for each node. The simulated background data for each node can be generated by the central processor based on (a) the measured or inferred location of each node and (b) a predetermined background model stored in the central processor. [0027] In some such methods each of, or some of, the plurality of nodes can include a sensor. In such methods, step (1) can further include transmitting through the network from each node to the central processor background data measured with that node's sensor; step (2) can be carried out in the central processor; and in step (2), calculating simulated response data for each node can be further based upon the transmitted background data measured with that sensor. In such methods, each of the plurality of nodes can further includes a node processor; in step (2), calculating simulated response data for each node can be carried out in that node's processor; and in step (2), calculating simulated response data for each node can be further based upon background data measured with that node's sensor. A sensor on a node can be, for example, a radiation detector or a chemical detector.
[0028] In some such methods the at least one simulated source can have at least predetermined simulated source locations and a predetermined simulated source activity levels at each of a plurality of predetermined times. Such methods can further include repeating steps (l)-(4) at each of the plurality of predetermined times.
[0029] In some such methods the at least one simulated source further can have a predetermined simulated source trajectory including the predetermined simulated source location and a predetermined simulated source velocity at each predetermined time; step (1) can further include transmitting across the network from each node to the central processor a measured or inferred velocity for each node at the predetermined time; and in step (2), calculating simulated response data for each node can further be based on the predetermined simulated source trajectory and velocity of that node at the predetermined time. The trajectory can be simple, such as for a stationary source, or more complex, such as a simulated trajectory of a pedestrian, or a vehicle.
[0030] Each node may be identical or substantially identical. Or the system may include nodes with a variety of different characteristics. One or more nodes may be located on a person. One or more nodes may be stationary, for example, a permanently installed node in a public place such as a signpost or lamppost. The output device may be located on one or more of the nodes, and/or on the central processor. Each node may include its own output device. If so, step (4) can further include signaling with (a) the output device included in the node closest to the predetermined simulated source location and/or (b) any other output devices included in nodes within a predetermined distance from the predetermined simulated source location.
[0031] In some such methods the at least one simulated source further has a
predetermined simulated source spectral characteristic. In such methods, in step (2), calculating simulated response data for each node can be further based on the
predetermined simulated source spectral characteristic.
[0032] In some such methods, step (1) can also include transmitting through the network from each node to the central processor a measured or inferred orientation for that node at the predetermined time. In such methods, in step (2), calculating simulated response data for each node can be further based on the measured or inferred orientation for that node at the predetermined time.
[0033] In some such methods, step (1) can also include transmitting through the network from each node to the central processor at least one measured or inferred environmental condition. In such methods, in step (2), calculating simulated response data for each node can be further based on the transmitted at least one measured or inferred environmental condition for that node. Such environmental conditions can include for example, (a) rate, amount or type of precipitation, (b) wind speed and/or wind direction, (c) ambient temperature, e.g., air or water temperature, (d) humidity, and (e) barometric pressure.
[0034] Some such methods can also include (5) storing at the predetermined time, the simulated response data for each node associated with the predetermined time and data representative of whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time. Such methods may also include repeating step (5) at each of the plurality of predetermined times. In such methods storing can include storing data in either (a) the central processor, or (b) one or more nodes, or both (a) and (b).
[0035] In some such methods the at least one simulated source can be a plurality of simulated sources.
[0036] In some such methods the predetermined simulated source location can be a location in a two or three dimensional coordinate system.
[0037] In some such methods, one of the plurality of nodes is a designated prey node. In such methods, the predetermined simulated source location at the predetermined time can be based on the measured or inferred location of the prey node at the predetermined time.
[0038] In some embodiments, a method of simulating the response of a system to a simulated source can include providing a system including (a) a plurality of sensors and (b) a central processor having an output device; formulating, in the central processor, a simulated source; estimating the response of each of the plurality of sensors to the simulated source; and outputting from the output device a signal indicative of whether the system would be able to detect a real source having the properties of the simulated source. [0039] While the systems and methods disclosed herein have been particularly shown and described with references to exemplary embodiments thereof, they are not so limited and it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the disclosure. It should be realized this invention is also capable of a wide variety of further and other embodiments within the scope of the invention. Those skilled in the art will recognize or be able to ascertain using no more than routine experimentation, many equivalents to the exemplary embodiments described specifically herein. Such equivalents are intended to be encompassed in the scope of the present disclosure.

Claims

We claim:
1. A method of simulating the response of a system to at least one simulated source, the at least one simulated source having at least a predetermined simulated source location and a predetermined simulated source activity level at a predetermined time, the system comprising:
a plurality of nodes;
a central processor programmed to determine whether a source is detected by applying a predetermined algorithm to data associated with the plurality of nodes, the central processor having stored within it the predetermined simulated source location and the predetermined simulated source activity level;
a network linking each node and the central processor such that signals can be transmitted between each node and the central processor; and
an output device;
the method comprising:
(1) transmitting through the network from each node to the central processor a measured or inferred location for that node at the predetermined time;
(2) calculating, based on at least (a) the measured or inferred location of each node at the predetermined time, (b) the predetermined simulated source location at the predetermined time, and (c) the predetermined simulated source activity level at the predetermined time, simulated response data for each node associated with the predetermined time;
(3) in the central processor, applying the predetermined algorithm to the simulated response data for all the nodes, thereby determining whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time; and
(4) signaling with the output device whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time.
2. The method of claim 1 wherein:
step (2) is carried out in the central processor; and
in step (2), calculating simulated response data for each node is further based on simulated background data for each node.
3. The method of claim 2 wherein the simulated background data for each node is generated by the central processor based on (a) the measured or inferred location of each node and (b) a predetermined background model stored in the central processor.
4. The method of claim 1 wherein each of the plurality of nodes includes a sensor.
5. The method of claim 4 wherein:
step (1) further comprises transmitting through the network from each node to the central processor background data measured with that node's sensor; step (2) is carried out in the central processor; and
in step (2), calculating simulated response data for each node is further based upon the transmitted background data measured with that sensor.
6. The method of claim 4 wherein:
each of the plurality of nodes further includes a node processor;
in step (2), calculating simulated response data for each node is carried out in that node's processor; and
in step (2), calculating simulated response data for each node is further based upon background data measured with that node's sensor.
7. The method of any of claims 4-6 wherein:
each sensor has at least a predetermined sensitivity; and
in step (2), calculating simulated response data for each node is further based on the predetermined sensitivity of that sensor.
8. The method of any of claims 4-7 wherein the sensors are either radiation detectors or chemical detectors.
9. The method of any of claims 1-8 wherein the at least one simulated source has at least predetermined simulated source locations and a predetermined simulated source activity levels at each of a plurality of predetermined times, the method further comprising repeating steps (l)-(4) at each of the plurality of predetermined times.
10. The method of any of claims 1-9 wherein:
the at least one simulated source further has a predetermined simulated source trajectory including the predetermined simulated source location and a predetermined simulated source velocity at each predetermined time; step (1) further comprises transmitting across the network from each node to the central processor a measured or inferred velocity for each node at the predetermined time; and in step (2), calculating simulated response data for each node is further based on the predetermined simulated source trajectory and velocity of that node at the predetermined time.
11. The method of any of claims 1-10 wherein the nodes are substantially identical.
12. The method of any of claims 1-11 wherein at least one node is located on a person and at least one node is stationary.
13. The method of any of claims 1-12 wherein the output device is located on a node.
14. The method of claim 13 wherein each node includes an output device and step (4)
further comprises signaling with (a) the output device included in the node closest to the predetermined simulated source location and (b) any other output devices included in nodes within a predetermined distance from the predetermined simulated source location.
15. The method of any of claims 1-12 wherein the output device is located on the central processor.
16. The method of any of claims 1-15 wherein:
the at least one simulated source further has a predetermined simulated source spectral characteristic;
in step (2), calculating simulated response data for each node is further based on the predetermined simulated source spectral characteristic.
17. The method of claim 16 wherein the predetermined simulated source spectral
characteristic is an emission spectrum.
18. The method of claim 17 wherein the emission spectrum is that of predetermined
isotope.
19. The method of any of claims 1-18 wherein:
the at least one simulated source further has a predetermined directional emission characteristic; and
in step (2), calculating simulated response data for each node is further based on the predetermined directional emission characteristic.
20. The method of any of claims 1-19 wherein:
step (1) further comprises transmitting through the network from each node to the central processor a measured or inferred orientation for that node at the predetermined time; and
in step (2), calculating simulated response data for each node is further based on the measured or inferred orientation for that node at the predetermined time.
21. The method of any of claims 1-20 further comprising:
(5) storing the simulated response data for each node associated with the
predetermined time and data representative of whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the
predetermined time.
22. The method of claim 9 further comprising:
(5) storing at the predetermined time, the simulated response data for each node associated with the predetermined time and data representative of whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time; and
repeating step (5) at each of the plurality of predetermined times.
23. The method of either of claims 21 or 22 wherein the storing comprises storing data in either (a) the central processor, or (b) one or more nodes, or both (a) and (b).
24. The method of any of claims 1-23 wherein the at least one simulated source is a plurality of simulated sources.
25. The method of any of claims 1-24 wherein the predetermined simulated source location is a location in a three dimensional coordinate system.
26. The method of any of claims 1-25 wherein:
one of the plurality of nodes is a designated prey node; and
the predetermined simulated source location at the predetermined time is based on the measured or inferred location of the prey node at the predetermined time.
27. The method of any of claims 1-26 wherein at least one node is mounted on a vehicle.
28. The method of any of claims 1-27 wherein:
step (1) further comprises transmitting through the network from each node to the central processor at least one measured or inferred environmental condition; and
in step (2), calculating simulated response data for each node is further based on the transmitted at least one measured or inferred environmental condition for that node.
29. The method of claim 28 wherein the at least one environmental condition is at least one of (a) rate, amount or type of precipitation, (b) wind speed and/or wind direction, (c) ambient temperature, (d) humidity, and (e) barometric pressure.
30. A method of simulating the response of a system to a simulated source, the method comprising:
providing a system including (a) a plurality of sensors and (b) a central processor having an output device;
formulating, in the central processor, a simulated source;
estimating the response of each of the plurality of sensors to the simulated source; and
outputting from the output device a signal indicative of whether the system would be able to detect a real source having the properties of the simulated source.
PCT/US2014/037210 2013-10-16 2014-05-07 Injection of simulated sources in a system of networked sensors WO2015057264A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP2016549007A JP2016535379A (en) 2013-10-16 2014-05-07 Injection of simulated sources into a networked sensor system
EP14854212.9A EP3058504B1 (en) 2013-10-16 2014-05-07 Injection of simulated sources in a system of networked sensors
US14/358,613 US10579747B2 (en) 2013-10-16 2014-05-07 Injection of simulated sources in a system of networked sensors
US16/713,566 US20200117840A1 (en) 2013-10-16 2019-12-13 Injection of simulated sources in a system of networked sensors

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201361891636P 2013-10-16 2013-10-16
US61/891,636 2013-10-16

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US14/358,613 A-371-Of-International US10579747B2 (en) 2013-10-16 2014-05-07 Injection of simulated sources in a system of networked sensors
US16/713,566 Continuation US20200117840A1 (en) 2013-10-16 2019-12-13 Injection of simulated sources in a system of networked sensors

Publications (1)

Publication Number Publication Date
WO2015057264A1 true WO2015057264A1 (en) 2015-04-23

Family

ID=52828530

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2014/037210 WO2015057264A1 (en) 2013-10-16 2014-05-07 Injection of simulated sources in a system of networked sensors

Country Status (4)

Country Link
US (2) US10579747B2 (en)
EP (1) EP3058504B1 (en)
JP (1) JP2016535379A (en)
WO (1) WO2015057264A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113259932A (en) * 2021-05-19 2021-08-13 贵州大学 Source node position privacy protection strategy in WSNs

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10650700B2 (en) 2015-01-08 2020-05-12 Lawrence Livermore National Security, Llc Incident exercise in a virtual environment
KR101713253B1 (en) * 2017-01-13 2017-03-09 (주)라드서치 Method for Training Radiation Emergency Field Exploration Based on Postulated Accident

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040002843A1 (en) * 2002-05-13 2004-01-01 Consolidated Global Fun Unlimited, Llc Method and system for interacting with simulated phenomena
US20070090942A1 (en) * 2000-10-02 2007-04-26 Berry Kenneth M Methods for responding to biological, chemical or nuclear attacks

Family Cites Families (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS60185185A (en) * 1984-03-02 1985-09-20 Sumitomo Electric Ind Ltd Radiation detection method and apparatus thereof
US4973913A (en) * 1990-02-08 1990-11-27 Mitsubishi Denki Kabushiki Kaisha Radiation measuring apparatus
US5142559A (en) * 1990-05-11 1992-08-25 The Research Foundation Of State University Of New York Radiation detection system including radiation alignment means and isocentrically rotatable detectors
US5304065A (en) * 1992-11-13 1994-04-19 Consultec Scientific, Inc. Instrument simulator system
GB9519098D0 (en) * 1995-09-19 1995-11-22 Pike Steven D Contamination training simulator
US6393375B1 (en) * 1999-01-15 2002-05-21 En'urga Inc. System and method for determining combustion temperature using infrared emissions
US5979565A (en) * 1999-03-03 1999-11-09 Wicks; Edward A. Emergency ventilation system for biological/chemical contamination
US6293861B1 (en) * 1999-09-03 2001-09-25 Kenneth M. Berry Automatic response building defense system and method
US7194395B2 (en) * 2000-02-23 2007-03-20 The United States Of America As Represented By The Secretary Of The Army System and method for hazardous incident decision support and training
WO2002040092A2 (en) * 2000-11-14 2002-05-23 Apple Marc G Directional energy emitting implant
US6531701B2 (en) * 2001-03-14 2003-03-11 Trw Inc. Remote trace gas detection and analysis
US6946300B2 (en) * 2002-02-01 2005-09-20 Control Screening, Llc Multi-modal detection of explosives, narcotics, and other chemical substances
US20040015336A1 (en) * 2002-07-19 2004-01-22 Kulesz James J. Automatic detection and assessment of chemical, biological, radiological and nuclear threats
US6984524B2 (en) * 2002-09-12 2006-01-10 Control Screening, Llc Chemiluminescent detection of explosives, narcotics, and other chemical substances
US6946644B2 (en) * 2002-12-19 2005-09-20 Honeywell International Inc. Sensor for multi-band radiation detection within a field of view
CA2552358A1 (en) * 2002-12-31 2004-07-15 Telaura Inc. System and method for real-time detection and remote monitoring of pathogens
US7391557B1 (en) * 2003-03-28 2008-06-24 Applied Photonics Worldwide, Inc. Mobile terawatt femtosecond laser system (MTFLS) for long range spectral sensing and identification of bioaerosols and chemical agents in the atmosphere
US6914447B2 (en) * 2003-04-23 2005-07-05 Texas Instruments Incorporated High activity, spatially distributed radiation source for accurately simulating semiconductor device radiation environments
US7770224B2 (en) * 2004-10-18 2010-08-03 Lockheed Martin Corporation CBRN attack detection system and method I
US7507089B2 (en) * 2005-07-15 2009-03-24 Raytheon Company Methods and apparatus to provide training against improvised explosive devices
US7412356B1 (en) * 2007-01-30 2008-08-12 Lawrence Livermore National Security, Llc Detection and quantification system for monitoring instruments
US20120132814A1 (en) * 2007-02-26 2012-05-31 Irving Weinberg Radiation detection device, system and related methods
US9728100B2 (en) * 2008-02-01 2017-08-08 Lion Group, Inc. Hazard suppression training simulator and method of training
US9165475B2 (en) * 2008-02-20 2015-10-20 Hazsim, Llc Hazardous material detector simulator and training system
US20090263770A1 (en) * 2008-02-20 2009-10-22 Ambrose Philip L System and method for simulating hazardous environments for portable detection meters used by first responders
US9529974B2 (en) * 2008-02-25 2016-12-27 Georgetown University System and method for detecting, collecting, analyzing, and communicating event-related information
US8794973B2 (en) * 2008-04-17 2014-08-05 Radiation Safety And Control Services, Inc. Contamination detection simulation systems and methods
US9280913B2 (en) * 2009-07-10 2016-03-08 Lincoln Global, Inc. Systems and methods providing enhanced education and training in a virtual reality environment
US8827714B2 (en) * 2009-06-22 2014-09-09 Lawrence Livermore National Secuity, LLC. Web-based emergency response exercise management systems and methods thereof
GB201119456D0 (en) * 2011-11-11 2011-12-21 Cobham Cts Ltd Hazardous device detection training system
WO2013156866A2 (en) * 2012-04-15 2013-10-24 Nederlandse Organisatie Voor Toegepast-Natuurwetenschappelijk Onderzoek Tno Fluorescent nano-sensors for oil and gas reservoir characterization
DE102012221862A1 (en) * 2012-11-29 2014-06-05 Leibniz-Institut Für Atmosphärenphysik E.V. An Der Universität Rostock Method and device for determining and calculating a scattered radiation spectrum and method for compressing data
US9836993B2 (en) * 2012-12-17 2017-12-05 Lawrence Livermore National Security, Llc Realistic training scenario simulations and simulation techniques

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070090942A1 (en) * 2000-10-02 2007-04-26 Berry Kenneth M Methods for responding to biological, chemical or nuclear attacks
US20040002843A1 (en) * 2002-05-13 2004-01-01 Consolidated Global Fun Unlimited, Llc Method and system for interacting with simulated phenomena

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113259932A (en) * 2021-05-19 2021-08-13 贵州大学 Source node position privacy protection strategy in WSNs

Also Published As

Publication number Publication date
EP3058504B1 (en) 2020-07-15
EP3058504A1 (en) 2016-08-24
US10579747B2 (en) 2020-03-03
JP2016535379A (en) 2016-11-10
US20200117840A1 (en) 2020-04-16
EP3058504A4 (en) 2017-05-03
US20150186566A1 (en) 2015-07-02

Similar Documents

Publication Publication Date Title
Cova et al. Warning triggers in environmental hazards: Who should be warned to do what and when?
US20200117840A1 (en) Injection of simulated sources in a system of networked sensors
US9836993B2 (en) Realistic training scenario simulations and simulation techniques
KR101885350B1 (en) System for integrated managment of air pollution
US11378485B2 (en) Structural monitoring system
CN105357063A (en) Cyberspace security situation real-time detection method
Sättele et al. Quantifying the effectiveness of early warning systems for natural hazards
US7770224B2 (en) CBRN attack detection system and method I
Oldrini et al. Validation and sensitivity study of the PMSS modelling system for puff releases in the Joint Urban 2003 field experiment
US20200066140A1 (en) System and method for indicating building fire danger ratings
Yee Bayesian probabilistic approach for inverse source determination from limited and noisy chemical or biological sensor concentration measurements
Ambros et al. Proactive assessment of road curve safety using floating car data: An exploratory study
Miranda et al. A wireless sensor network for collision detection on guardrails
US7496483B2 (en) CBRN attack detection system and method II
KR101938550B1 (en) Disaster preventer trainning system, portable terminal for trainning disaster preventer and method for operating disaster preventer trainning system
Balamurugan et al. An IoT based Natural Disaster Monitoring for Railway Accident Warning Alert System
Yassin et al. Lora based real-time flood detection and monitoring system: A brunei darussalam based study
Zhang et al. The impact of position errors on crowd simulation
Brauner et al. Determination of the effectiveness of security measures for low probability but high consequence events: A comparison of multi-agent-simulation & process modelling by experts.
Bieringer et al. Fusion of chemical, biological, and meteorological observations for agent source term estimation and hazard refinement
Vera et al. Design and testing of a network of sensors on land surfaces to prevent landslides
Enoch et al. Survey of Sensors and Techniques in Microwave Imaging for Through-Wall Imaging for Detecting Trapped Humans under Rubble
CN104794869B (en) A kind of analog for testing core biochemistry warning system
Iervolino et al. The crywolf issue in earthquake early warning applications for the Campania region
Alhaddad Deep Learning Methods for Impact Load Identification and Displacement Estimation in Structures

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 14358613

Country of ref document: US

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14854212

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2016549007

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2014854212

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2014854212

Country of ref document: EP