US20200117840A1 - Injection of simulated sources in a system of networked sensors - Google Patents
Injection of simulated sources in a system of networked sensors Download PDFInfo
- Publication number
- US20200117840A1 US20200117840A1 US16/713,566 US201916713566A US2020117840A1 US 20200117840 A1 US20200117840 A1 US 20200117840A1 US 201916713566 A US201916713566 A US 201916713566A US 2020117840 A1 US2020117840 A1 US 2020117840A1
- Authority
- US
- United States
- Prior art keywords
- node
- simulated
- source
- nodes
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F30/00—Computer-aided design [CAD]
- G06F30/20—Design optimisation, verification or simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/04—Inference or reasoning models
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/12—Checking intermittently signalling or alarm systems
- G08B29/14—Checking intermittently signalling or alarm systems checking the detection circuits
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09B—EDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
- G09B9/00—Simulators for teaching or training purposes
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H50/00—ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
- G16H50/80—ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for detecting, monitoring or modelling epidemics or pandemics, e.g. flu
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/12—Alarms for ensuring the safety of persons responsive to undesired emission of substances, e.g. pollution alarms
Definitions
- Law enforcement and other agencies use a variety of sensors to detect hazardous materials such as radioactive/nuclear materials, chemicals, biohazards and explosives. Training and testing personnel and equipment with actual hazardous material presents problems. For example, radioactive sources that are dangerous enough to realistically portray a potential terrorist or environmental hazard will also be potentially hazardous to trainees, and may present a safety risk to the public. It may also be difficult, for reasons of cost, security, regulations, etc., to maintain an actual inventory of all potentially threatening sources merely for training purposes.
- Simulated sources solve many such problems.
- a simulated source injected into a detection system can be made indistinguishable from a real source, from the point of view of sensor nodes and trainees, providing realistic training and systems testing.
- a simulated source has no associated radioactive or other hazards since there is no actual source involved. And the only practical limit on the diversity of simulated training scenarios is the imagination of the programmer responsible for the simulation. Unusual or unexpected situations are just as easy to simulate as run-of-the-mill hazards and do not require stockpiling of exotic materials.
- Simulated sources can be used both to train users and also to test the system.
- Simulated sources can be injected into a networked system for use in training and/or testing.
- FIGS. 1-3 schematically show a sensor network in which a simulated source or sources are used for training or testing.
- the presence of a source can be detected using a network of sensors.
- a group of people e.g., security personnel, first responders, etc., may patrol an area, each carrying or wearing a detector that is connected to a network, in some cases wirelessly.
- Sensors may also be fixed in place, for example at a security checkpoint or other significant location.
- Sensors may also be mounted on vehicles, for example, vehicles for used in public transportation, vehicles used by the general public, or vehicles used by first responders or other security or patrol personnel, such as cars, trucks, boats or aircraft.
- the detector may be a radiation detector, a chemical detector, or any other suitable detector for the source in question.
- each networked sensor collects data that may be transmitted to a central processor or other nodes in the network, and the sensor may in turn receive such signals, with the result that data from the network as a whole is collectively processed to determine if, when, and where a source is present.
- the presence of a source can be simulated.
- the properties of the simulated source such as location, velocity, and activity level, are predetermined. Those properties are then combined with the known properties of each sensor node, such as location, velocity and sensitivity, to calculate an estimate what each sensor's response would be if the simulated source were real.
- Other simulated source properties may be included as well, for example, orientation and directional emission characteristics, or a spectral characteristic such as emission according to the spectrum of a particular radioisotope.
- the estimated response can be treated, for training or testing purposes, as if it were the actual response of the detector to a real source. This can be accomplished in one, or a combination, of three ways.
- the simulated source properties could be transmitted to each sensor node 11 - 16 where each node would individually estimate its hypothetical response, resulting in simulated data. That simulated data would then be treated by the sensor node in the same way that actual data would in an actual deployment of the system, by transmitting the data across the network for collective analysis.
- the collective analysis could be carried out by a central processor 17 , or in some other way over the network. This method requires each sensor node to maintain the necessary information about its own state to be able to estimate its response to an arbitrary source.
- Such information might include location, velocity, sensitivity, and could also include a description of its physical surroundings, either empirical or simulated, for example a map of background radiation, or the locations of significant geographical features like buildings or bodies of water.
- the node can also sense and report on other aspects of its local environment, such as ambient temperature, humidity, and/or barometric pressure, the lack or presence of precipitation, amount and/or type of precipitation, and wind speed and/or direction.
- a central processor 27 would store information about the simulated source, and collect information about the state of each sensor 21 - 26 , such as sensor location, sensor velocity and sensor sensitivity. The central processor 27 would then calculate for each sensor 21 - 26 an estimate of the sensor's response to the simulated source. The central processor 27 could likewise store additional information, either empirical or simulated, on background radiation or significant geography that could be used to construct a physical model which in turn could be included in the estimate of each sensor's response to the simulated source. The simulated data could then be sent back to each sensor node for high level processing, e.g., in systems where each node is separately responsible for triggering alarms, or reporting data to its user. Although the additional information used by the central processor could be the same sort of information used by each individual node in the first alternative, the second alternative may allow for the use of more complex information and physical models, since a central processor can have more computing power than a portable sensor node.
- a central processor 37 including high-level calculations.
- Individual nodes 31 - 36 would simply receive from the central processor any data to be displayed or alarm indications to be communicated to the user.
- the nodes need not be fully functioning sensor nodes, and could instead be training nodes capable only of receiving instructions regarding what to display through a user interface, i.e., “dumb” nodes.
- the sensor nodes could contribute actual measurements of background to the central processor and function as more than “dumb” training nodes.
- the individual nodes can either continually measure and record background radiation and contribute that data to the simulation, or simply rely on a simulated background.
- the simulated source properties can be based on a purely virtual source whose properties are based on no real world data, or the simulated source location as a function of time can be based on the location of a “prey” node.
- the prey node can report its position back to the central processor as a function of time.
- the central processor could then use the prey node's location as a predetermined location of the simulated source at each time.
- the prey node could be carried by training personnel who could add to the training scenario, for example, by moving to evade trainees carrying sensor nodes.
- an advantage of the systems and methods described herein is that the simulated signal is injected into a live network, in many cases including live data being collected and analyzed in real-time.
- the simulated source could be the only data, simulated or real, in the system.
- the simulated source could be injected into the system along with injected, simulated background measurements, for example, in order to test the detection power of a system as a function of signal to noise ratio.
- the simulated source could be injected over actual data being acquired in real time. This last alternative allows for a realistic training and/or testing environment, referred to as “sim-over-live.”
- Sim-over-live By injecting a simulated source over real background data, a system can avoid computationally expensive simulation of background radiation, while simultaneously making the simulation realistic.
- Such an injected source can be included with or without alerting users that a simulation is going on. That has the advantage of making the test more realistic. Another benefit is avoiding downtime; during such a test, the system could continue to operate normally at the same time, continuing to potentially detect real sources during the simulation.
- any simulation can be carried out with a plurality of simulated sources, or a single simulated source.
- injection of sources can be useful both for testing the operation of a system of nodes, e.g., systems integration of the various parts of the network, and also for empirically testing the sensitivity of the system as a whole.
- a simulated source can be injected into a working system in order to see whether, in a real-life situation, a given type of source would be detected by the system. This can provide insight into how many sensors are required for a particular threat scenario or to test new CONOPs in operationally realistic scenarios.
- processing there are at least two basic functions of the processing, (1) normal processing of data that would be used in normal operation to detect a source or sources, and (2) managing testing/training data and other signals and their movement through and use in the network.
- These two functions can be performed in a single processor 17 , 27 , 37 or split over separated elements of the system.
- a central processor can have many additional functions as well, including situational awareness of a testing/training exercise, and evaluation and feedback on the exercise.
- the central processor can, at each time step, store the locations and simulated responses of each node. This allows for after-the-fact analysis of the response of the system and its users, e.g., a playback of the simulation.
- a method can simulate the response of a system to at least one simulated source, the at least one simulated source having at least a predetermined simulated source location and a predetermined simulated source activity level at a predetermined time.
- the system can include a plurality of nodes; a central processor programmed to determine whether a source is detected by applying a predetermined algorithm to data associated with the plurality of nodes, the central processor having stored within it the predetermined simulated source location and the predetermined simulated source activity level; a network linking each node and the central processor such that signals can be transmitted between each node and the central processor; and an output device.
- the method can include: (1) transmitting through the network from each node to the central processor a measured or inferred location for that node at the predetermined time; (2) calculating, based on at least (a) the measured or inferred location of each node at the predetermined time, (b) the predetermined simulated source location at the predetermined time, and (c) the predetermined simulated source activity level at the predetermined time, simulated response data for each node associated with the predetermined time; (3) in the central processor, applying the predetermined algorithm to the simulated response data for all the nodes, thereby determining whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time; and (4) signaling with the output device whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time.
- step (2) can be carried out in the central processor; and in step (2), calculating simulated response data for each node can be further based on simulated background data for each node.
- the simulated background data for each node can be generated by the central processor based on (a) the measured or inferred location of each node and (b) a predetermined background model stored in the central processor.
- each of, or some of, the plurality of nodes can include a sensor.
- step (1) can further include transmitting through the network from each node to the central processor background data measured with that node's sensor; step (2) can be carried out in the central processor; and in step (2), calculating simulated response data for each node can be further based upon the transmitted background data measured with that sensor.
- each of the plurality of nodes can further includes a node processor; in step (2), calculating simulated response data for each node can be carried out in that node's processor; and in step (2), calculating simulated response data for each node can be further based upon background data measured with that node's sensor.
- a sensor on a node can be, for example, a radiation detector or a chemical detector.
- the at least one simulated source can have at least predetermined simulated source locations and a predetermined simulated source activity levels at each of a plurality of predetermined times.
- Such methods can further include repeating steps (1)-(4) at each of the plurality of predetermined times.
- the at least one simulated source further can have a predetermined simulated source trajectory including the predetermined simulated source location and a predetermined simulated source velocity at each predetermined time; step (1) can further include transmitting across the network from each node to the central processor a measured or inferred velocity for each node at the predetermined time; and in step (2), calculating simulated response data for each node can further be based on the predetermined simulated source trajectory and velocity of that node at the predetermined time.
- the trajectory can be simple, such as for a stationary source, or more complex, such as a simulated trajectory of a pedestrian, or a vehicle.
- Each node may be identical or substantially identical. Or the system may include nodes with a variety of different characteristics.
- One or more nodes may be located on a person.
- One or more nodes may be stationary, for example, a permanently installed node in a public place such as a signpost or lamppost.
- the output device may be located on one or more of the nodes, and/or on the central processor.
- Each node may include its own output device. If so, step (4) can further include signaling with (a) the output device included in the node closest to the predetermined simulated source location and/or (b) any other output devices included in nodes within a predetermined distance from the predetermined simulated source location.
- the at least one simulated source further has a predetermined simulated source spectral characteristic.
- calculating simulated response data for each node can be further based on the predetermined simulated source spectral characteristic.
- step (1) can also include transmitting through the network from each node to the central processor a measured or inferred orientation for that node at the predetermined time.
- step (2) calculating simulated response data for each node can be further based on the measured or inferred orientation for that node at the predetermined time.
- step (1) can also include transmitting through the network from each node to the central processor at least one measured or inferred environmental condition.
- calculating simulated response data for each node can be further based on the transmitted at least one measured or inferred environmental condition for that node.
- environmental conditions can include for example, (a) rate, amount or type of precipitation, (b) wind speed and/or wind direction, (c) ambient temperature, e.g., air or water temperature, (d) humidity, and (e) barometric pressure.
- Some such methods can also include (5) storing at the predetermined time, the simulated response data for each node associated with the predetermined time and data representative of whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time.
- Such methods may also include repeating step (5) at each of the plurality of predetermined times.
- storing can include storing data in either (a) the central processor, or (b) one or more nodes, or both (a) and (b).
- the at least one simulated source can be a plurality of simulated sources.
- the predetermined simulated source location can be a location in a two or three dimensional coordinate system.
- one of the plurality of nodes is a designated prey node.
- the predetermined simulated source location at the predetermined time can be based on the measured or inferred location of the prey node at the predetermined time.
- a method of simulating the response of a system to a simulated source can include providing a system including (a) a plurality of sensors and (b) a central processor having an output device; formulating, in the central processor, a simulated source; estimating the response of each of the plurality of sensors to the simulated source; and outputting from the output device a signal indicative of whether the system would be able to detect a real source having the properties of the simulated source.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Health & Medical Sciences (AREA)
- Public Health (AREA)
- Data Mining & Analysis (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Evolutionary Computation (AREA)
- General Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Mathematical Physics (AREA)
- Epidemiology (AREA)
- Computer Networks & Wireless Communication (AREA)
- Educational Technology (AREA)
- Computer Security & Cryptography (AREA)
- Primary Health Care (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Pathology (AREA)
- Databases & Information Systems (AREA)
- Biomedical Technology (AREA)
- Educational Administration (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Computational Linguistics (AREA)
- Geometry (AREA)
- Computer Hardware Design (AREA)
- Testing Or Calibration Of Command Recording Devices (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Simulated sources can be injected into a networked system for use in training and/or testing.
Description
- This application is a continuation of U.S. patent application Ser. No. 14/358,613, entitled “INJECTION OF SIMULATED SOURCES IN A SYSTEM OF NETWORKED SENSORS,” filed May 15, 2014, which is the U.S. national stage of international application Ser. No. PCT/US2014/037210, entitled “INJECTION OF SIMULATED SOURCES IN A SYSTEM OF NETWORKED SENSORS,” filed May 7, 2014, which claims benefit of and priority to U.S. Provisional Ser. No. 61/891,636, entitled “INJECTION OF SIMULATED SOURCES IN A SYSTEM OF NETWORKED SENSORS,” filed Oct. 16, 2013 by Daniel A. Cooper, James B. Costales, Krzysztof Kamieniecki, Robert J. Ledoux, and Jeffrey K. Thompson, all of which are hereby incorporated herein by reference in their entirety.
- Law enforcement and other agencies use a variety of sensors to detect hazardous materials such as radioactive/nuclear materials, chemicals, biohazards and explosives. Training and testing personnel and equipment with actual hazardous material presents problems. For example, radioactive sources that are dangerous enough to realistically portray a potential terrorist or environmental hazard will also be potentially hazardous to trainees, and may present a safety risk to the public. It may also be difficult, for reasons of cost, security, regulations, etc., to maintain an actual inventory of all potentially threatening sources merely for training purposes.
- Simulated sources solve many such problems. A simulated source injected into a detection system can be made indistinguishable from a real source, from the point of view of sensor nodes and trainees, providing realistic training and systems testing. A simulated source has no associated radioactive or other hazards since there is no actual source involved. And the only practical limit on the diversity of simulated training scenarios is the imagination of the programmer responsible for the simulation. Unusual or unexpected situations are just as easy to simulate as run-of-the-mill hazards and do not require stockpiling of exotic materials.
- Simulated sources can be used both to train users and also to test the system.
- Simulated sources can be injected into a networked system for use in training and/or testing.
-
FIGS. 1-3 schematically show a sensor network in which a simulated source or sources are used for training or testing. - The presence of a source can be detected using a network of sensors. A group of people, e.g., security personnel, first responders, etc., may patrol an area, each carrying or wearing a detector that is connected to a network, in some cases wirelessly. Sensors may also be fixed in place, for example at a security checkpoint or other significant location. Sensors may also be mounted on vehicles, for example, vehicles for used in public transportation, vehicles used by the general public, or vehicles used by first responders or other security or patrol personnel, such as cars, trucks, boats or aircraft. The detector may be a radiation detector, a chemical detector, or any other suitable detector for the source in question. In normal operation each networked sensor collects data that may be transmitted to a central processor or other nodes in the network, and the sensor may in turn receive such signals, with the result that data from the network as a whole is collectively processed to determine if, when, and where a source is present.
- In a simulation mode which could be used for testing or training, the presence of a source can be simulated. The properties of the simulated source such as location, velocity, and activity level, are predetermined. Those properties are then combined with the known properties of each sensor node, such as location, velocity and sensitivity, to calculate an estimate what each sensor's response would be if the simulated source were real. Other simulated source properties may be included as well, for example, orientation and directional emission characteristics, or a spectral characteristic such as emission according to the spectrum of a particular radioisotope. The estimated response can be treated, for training or testing purposes, as if it were the actual response of the detector to a real source. This can be accomplished in one, or a combination, of three ways.
- In a first alternative, shown schematically in
FIG. 1 , the simulated source properties could be transmitted to each sensor node 11-16 where each node would individually estimate its hypothetical response, resulting in simulated data. That simulated data would then be treated by the sensor node in the same way that actual data would in an actual deployment of the system, by transmitting the data across the network for collective analysis. The collective analysis could be carried out by acentral processor 17, or in some other way over the network. This method requires each sensor node to maintain the necessary information about its own state to be able to estimate its response to an arbitrary source. Such information might include location, velocity, sensitivity, and could also include a description of its physical surroundings, either empirical or simulated, for example a map of background radiation, or the locations of significant geographical features like buildings or bodies of water. In some embodiments the node can also sense and report on other aspects of its local environment, such as ambient temperature, humidity, and/or barometric pressure, the lack or presence of precipitation, amount and/or type of precipitation, and wind speed and/or direction. - In a second alternative, shown schematically in
FIG. 2 , acentral processor 27 would store information about the simulated source, and collect information about the state of each sensor 21-26, such as sensor location, sensor velocity and sensor sensitivity. Thecentral processor 27 would then calculate for each sensor 21-26 an estimate of the sensor's response to the simulated source. Thecentral processor 27 could likewise store additional information, either empirical or simulated, on background radiation or significant geography that could be used to construct a physical model which in turn could be included in the estimate of each sensor's response to the simulated source. The simulated data could then be sent back to each sensor node for high level processing, e.g., in systems where each node is separately responsible for triggering alarms, or reporting data to its user. Although the additional information used by the central processor could be the same sort of information used by each individual node in the first alternative, the second alternative may allow for the use of more complex information and physical models, since a central processor can have more computing power than a portable sensor node. - In a third alternative, shown schematically in
FIG. 3 , all calculation and processing would be carried out by acentral processor 37, including high-level calculations. Individual nodes 31-36 would simply receive from the central processor any data to be displayed or alarm indications to be communicated to the user. In this case, the nodes need not be fully functioning sensor nodes, and could instead be training nodes capable only of receiving instructions regarding what to display through a user interface, i.e., “dumb” nodes. Or in this alternative the sensor nodes could contribute actual measurements of background to the central processor and function as more than “dumb” training nodes. Indeed, in all three alternatives, the individual nodes can either continually measure and record background radiation and contribute that data to the simulation, or simply rely on a simulated background. - In each of the three alternatives, the simulated source properties can be based on a purely virtual source whose properties are based on no real world data, or the simulated source location as a function of time can be based on the location of a “prey” node. Just like the other nodes, the prey node can report its position back to the central processor as a function of time. The central processor could then use the prey node's location as a predetermined location of the simulated source at each time. The prey node could be carried by training personnel who could add to the training scenario, for example, by moving to evade trainees carrying sensor nodes.
- In all cases, an advantage of the systems and methods described herein is that the simulated signal is injected into a live network, in many cases including live data being collected and analyzed in real-time. The simulated source could be the only data, simulated or real, in the system. Or the simulated source could be injected into the system along with injected, simulated background measurements, for example, in order to test the detection power of a system as a function of signal to noise ratio. Or the simulated source could be injected over actual data being acquired in real time. This last alternative allows for a realistic training and/or testing environment, referred to as “sim-over-live.” By injecting a simulated source over real background data, a system can avoid computationally expensive simulation of background radiation, while simultaneously making the simulation realistic. Such an injected source can be included with or without alerting users that a simulation is going on. That has the advantage of making the test more realistic. Another benefit is avoiding downtime; during such a test, the system could continue to operate normally at the same time, continuing to potentially detect real sources during the simulation.
- In all embodiments described herein, any simulation can be carried out with a plurality of simulated sources, or a single simulated source.
- In addition to training users, injection of sources can be useful both for testing the operation of a system of nodes, e.g., systems integration of the various parts of the network, and also for empirically testing the sensitivity of the system as a whole. A simulated source can be injected into a working system in order to see whether, in a real-life situation, a given type of source would be detected by the system. This can provide insight into how many sensors are required for a particular threat scenario or to test new CONOPs in operationally realistic scenarios.
- In all embodiments there are at least two basic functions of the processing, (1) normal processing of data that would be used in normal operation to detect a source or sources, and (2) managing testing/training data and other signals and their movement through and use in the network. These two functions can be performed in a
single processor - In any of these embodiments, the central processor can, at each time step, store the locations and simulated responses of each node. This allows for after-the-fact analysis of the response of the system and its users, e.g., a playback of the simulation.
- A method can simulate the response of a system to at least one simulated source, the at least one simulated source having at least a predetermined simulated source location and a predetermined simulated source activity level at a predetermined time. The system can include a plurality of nodes; a central processor programmed to determine whether a source is detected by applying a predetermined algorithm to data associated with the plurality of nodes, the central processor having stored within it the predetermined simulated source location and the predetermined simulated source activity level; a network linking each node and the central processor such that signals can be transmitted between each node and the central processor; and an output device.
- The method can include: (1) transmitting through the network from each node to the central processor a measured or inferred location for that node at the predetermined time; (2) calculating, based on at least (a) the measured or inferred location of each node at the predetermined time, (b) the predetermined simulated source location at the predetermined time, and (c) the predetermined simulated source activity level at the predetermined time, simulated response data for each node associated with the predetermined time; (3) in the central processor, applying the predetermined algorithm to the simulated response data for all the nodes, thereby determining whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time; and (4) signaling with the output device whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time.
- In some such methods step (2) can be carried out in the central processor; and in step (2), calculating simulated response data for each node can be further based on simulated background data for each node. The simulated background data for each node can be generated by the central processor based on (a) the measured or inferred location of each node and (b) a predetermined background model stored in the central processor.
- In some such methods each of, or some of, the plurality of nodes can include a sensor. In such methods, step (1) can further include transmitting through the network from each node to the central processor background data measured with that node's sensor; step (2) can be carried out in the central processor; and in step (2), calculating simulated response data for each node can be further based upon the transmitted background data measured with that sensor. In such methods, each of the plurality of nodes can further includes a node processor; in step (2), calculating simulated response data for each node can be carried out in that node's processor; and in step (2), calculating simulated response data for each node can be further based upon background data measured with that node's sensor. A sensor on a node can be, for example, a radiation detector or a chemical detector.
- In some such methods the at least one simulated source can have at least predetermined simulated source locations and a predetermined simulated source activity levels at each of a plurality of predetermined times. Such methods can further include repeating steps (1)-(4) at each of the plurality of predetermined times.
- In some such methods the at least one simulated source further can have a predetermined simulated source trajectory including the predetermined simulated source location and a predetermined simulated source velocity at each predetermined time; step (1) can further include transmitting across the network from each node to the central processor a measured or inferred velocity for each node at the predetermined time; and in step (2), calculating simulated response data for each node can further be based on the predetermined simulated source trajectory and velocity of that node at the predetermined time. The trajectory can be simple, such as for a stationary source, or more complex, such as a simulated trajectory of a pedestrian, or a vehicle.
- Each node may be identical or substantially identical. Or the system may include nodes with a variety of different characteristics. One or more nodes may be located on a person. One or more nodes may be stationary, for example, a permanently installed node in a public place such as a signpost or lamppost. The output device may be located on one or more of the nodes, and/or on the central processor. Each node may include its own output device. If so, step (4) can further include signaling with (a) the output device included in the node closest to the predetermined simulated source location and/or (b) any other output devices included in nodes within a predetermined distance from the predetermined simulated source location.
- In some such methods the at least one simulated source further has a predetermined simulated source spectral characteristic. In such methods, in step (2), calculating simulated response data for each node can be further based on the predetermined simulated source spectral characteristic.
- In some such methods, step (1) can also include transmitting through the network from each node to the central processor a measured or inferred orientation for that node at the predetermined time. In such methods, in step (2), calculating simulated response data for each node can be further based on the measured or inferred orientation for that node at the predetermined time.
- In some such methods, step (1) can also include transmitting through the network from each node to the central processor at least one measured or inferred environmental condition. In such methods, in step (2), calculating simulated response data for each node can be further based on the transmitted at least one measured or inferred environmental condition for that node. Such environmental conditions can include for example, (a) rate, amount or type of precipitation, (b) wind speed and/or wind direction, (c) ambient temperature, e.g., air or water temperature, (d) humidity, and (e) barometric pressure.
- Some such methods can also include (5) storing at the predetermined time, the simulated response data for each node associated with the predetermined time and data representative of whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time. Such methods may also include repeating step (5) at each of the plurality of predetermined times. In such methods storing can include storing data in either (a) the central processor, or (b) one or more nodes, or both (a) and (b).
- In some such methods the at least one simulated source can be a plurality of simulated sources.
- In some such methods the predetermined simulated source location can be a location in a two or three dimensional coordinate system.
- In some such methods, one of the plurality of nodes is a designated prey node. In such methods, the predetermined simulated source location at the predetermined time can be based on the measured or inferred location of the prey node at the predetermined time.
- In some embodiments, a method of simulating the response of a system to a simulated source can include providing a system including (a) a plurality of sensors and (b) a central processor having an output device; formulating, in the central processor, a simulated source; estimating the response of each of the plurality of sensors to the simulated source; and outputting from the output device a signal indicative of whether the system would be able to detect a real source having the properties of the simulated source.
- While the systems and methods disclosed herein have been particularly shown and described with references to exemplary embodiments thereof, they are not so limited and it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the disclosure. It should be realized this invention is also capable of a wide variety of further and other embodiments within the scope of the invention. Those skilled in the art will recognize or be able to ascertain using no more than routine experimentation, many equivalents to the exemplary embodiments described specifically herein. Such equivalents are intended to be encompassed in the scope of the present disclosure.
Claims (20)
1. A computer-implemented method of determining a response of a detection system, which is capable of detecting a real source, to a simulated source, the detection system comprising a set of nodes connected in a network and located in a given area, each node including at least one sensor capable of sensing the real source, the method comprising the steps of:
(a) operating the set of nodes to at least measure real background data using the at least one sensor of each node in the given area;
(b) receiving at a processor in the network from a plurality of said nodes over the network measured or inferred location data for each node and the real background data measured by each node at a predetermined time in the given area;
(c) receiving at the processor an injection of simulated source data including data on a location of the simulated source and an activity level of the simulated source at the predetermined time;
(d) calculating, by the processor, estimated simulated response data for each node at the predetermined time based at least on the measured or inferred location data received from each node and the real background data measured by the node at the predetermined time received at step (b) and the simulated source data received at step (c);
(e) determining, by the processor, based on the estimated simulated response data for all the nodes whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time; and
(f) signaling with an output device whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time.
2. The method of claim 1 , further comprising transmitting the estimated simulated response data calculated in step (d) for each node to that node over the network for further processing by the node.
3. The method of claim 2 , wherein the further processing by the nodes comprises triggering an alarm or reporting data to a user of the node.
4. The method of claim 1 , wherein the processor comprises a centralized computer processor connected by the network to each of said nodes.
5. The method of claim 1 , wherein step (a) further comprises operating the nodes to simultaneously detect a real source.
6. The method of claim 1 , wherein determining a response of a detection system to the simulated source is performed without alerting users operating the nodes.
7. The method of claim 1 , wherein the background data comprises background radiation data.
8. The method of claim 1 , wherein the sensors are either radiation detectors or chemical detectors.
9. The method of claim 1 , wherein steps (a) to (f) are repeatedly performed a plurality of times.
10. The method of claim 1 , wherein at least one of said nodes is stationary and at least one of said nodes is mobile.
11. The method of claim 1 , wherein the simulated source has a predetermined simulated source spectral characteristic comprising an emission spectrum of predetermined isotope, and wherein step (d) comprises calculating the estimated simulated response data for each node based in part on the predetermined simulated source spectral characteristic.
12. The method of claim 1 , wherein the simulated source has a predetermined directional emission characteristic, and wherein step (d) comprises calculating the estimated simulated response data for each node based in part on the predetermined directional emission characteristic.
13. The method of claim 1 , wherein step (b) further comprises receiving from a plurality of said nodes over the network measured or inferred orientation data for each node at the predetermined time, and step (d) comprises calculating estimated simulated response data for each node based in part on the measured or inferred orientation for that node at the predetermined time.
14. The method of claim 1 , further comprising designating one of the plurality of nodes as a designated prey node, and wherein the simulated source location at the predetermined time comprises the measured or inferred location of the prey node at the predetermined time.
15. The method of claim 1 , wherein step (b) further comprises receiving at the processor from the plurality of said nodes at least one measured or inferred environmental condition; and wherein step (d) comprises calculating the estimated simulated response data for each node at the predetermined time based in part on the measured or inferred environmental condition for that node.
16. The method of claim 15 , wherein the at least one environmental condition is at least one of (a) rate, amount, or type of precipitation, (b) wind speed and/or wind direction, (c) ambient temperature, (d) humidity, and (e) barometric pressure.
17. A detection system capable of detecting a real source, comprising:
a plurality of nodes located in a given area, each node including at least one sensor capable of at least measuring real background data and sensing the real source in the given area;
a processor connected to each of the plurality of nodes over a communications network, said processor configured to:
(a) receive from a plurality of said nodes over the network measured or inferred location data for each node and the real background data measured by each node at a predetermined time in the given area;
(b) receive an injection of simulated source data including data on a location of the simulated source and an activity level of the simulated source at the predetermined time;
(c) calculate estimated simulated response data for each node at the predetermined time based at least on the measured or inferred location data received from each node and the real background data measured by the node at the predetermined time and the simulated source data;
(d) determine based on the estimated simulated response data for all the nodes whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time; and
(e) signal with an output device whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time.
18. The system of claim 17 , wherein the processor comprises a centralized computer processor connected by the network to each of said nodes.
19. The system of claim 17 , wherein at least one of said nodes is stationary and at least one of said nodes is mobile.
20. The system of claim 17 , wherein one of the plurality of nodes is a designated prey node, and wherein the simulated source location at the predetermined time comprises the measured or inferred location of the prey node at the predetermined time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/713,566 US20200117840A1 (en) | 2013-10-16 | 2019-12-13 | Injection of simulated sources in a system of networked sensors |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361891636P | 2013-10-16 | 2013-10-16 | |
US14/358,613 US10579747B2 (en) | 2013-10-16 | 2014-05-07 | Injection of simulated sources in a system of networked sensors |
PCT/US2014/037210 WO2015057264A1 (en) | 2013-10-16 | 2014-05-07 | Injection of simulated sources in a system of networked sensors |
US16/713,566 US20200117840A1 (en) | 2013-10-16 | 2019-12-13 | Injection of simulated sources in a system of networked sensors |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2014/037210 Continuation WO2015057264A1 (en) | 2013-10-16 | 2014-05-07 | Injection of simulated sources in a system of networked sensors |
US14/358,613 Continuation US10579747B2 (en) | 2013-10-16 | 2014-05-07 | Injection of simulated sources in a system of networked sensors |
Publications (1)
Publication Number | Publication Date |
---|---|
US20200117840A1 true US20200117840A1 (en) | 2020-04-16 |
Family
ID=52828530
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/358,613 Expired - Fee Related US10579747B2 (en) | 2013-10-16 | 2014-05-07 | Injection of simulated sources in a system of networked sensors |
US16/713,566 Abandoned US20200117840A1 (en) | 2013-10-16 | 2019-12-13 | Injection of simulated sources in a system of networked sensors |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/358,613 Expired - Fee Related US10579747B2 (en) | 2013-10-16 | 2014-05-07 | Injection of simulated sources in a system of networked sensors |
Country Status (4)
Country | Link |
---|---|
US (2) | US10579747B2 (en) |
EP (1) | EP3058504B1 (en) |
JP (1) | JP2016535379A (en) |
WO (1) | WO2015057264A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10650700B2 (en) | 2015-01-08 | 2020-05-12 | Lawrence Livermore National Security, Llc | Incident exercise in a virtual environment |
KR101713253B1 (en) * | 2017-01-13 | 2017-03-09 | (주)라드서치 | Method for Training Radiation Emergency Field Exploration Based on Postulated Accident |
CN113259932B (en) * | 2021-05-19 | 2023-05-05 | 贵州大学 | Source node position privacy protection strategy in WSNs |
Family Cites Families (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS60185185A (en) * | 1984-03-02 | 1985-09-20 | Sumitomo Electric Ind Ltd | Radiation detection method and apparatus thereof |
US4973913A (en) * | 1990-02-08 | 1990-11-27 | Mitsubishi Denki Kabushiki Kaisha | Radiation measuring apparatus |
US5142559A (en) * | 1990-05-11 | 1992-08-25 | The Research Foundation Of State University Of New York | Radiation detection system including radiation alignment means and isocentrically rotatable detectors |
US5304065A (en) * | 1992-11-13 | 1994-04-19 | Consultec Scientific, Inc. | Instrument simulator system |
GB9519098D0 (en) * | 1995-09-19 | 1995-11-22 | Pike Steven D | Contamination training simulator |
US6393375B1 (en) * | 1999-01-15 | 2002-05-21 | En'urga Inc. | System and method for determining combustion temperature using infrared emissions |
US5979565A (en) * | 1999-03-03 | 1999-11-09 | Wicks; Edward A. | Emergency ventilation system for biological/chemical contamination |
US6293861B1 (en) * | 1999-09-03 | 2001-09-25 | Kenneth M. Berry | Automatic response building defense system and method |
US7194395B2 (en) * | 2000-02-23 | 2007-03-20 | The United States Of America As Represented By The Secretary Of The Army | System and method for hazardous incident decision support and training |
US20070090942A1 (en) * | 2000-10-02 | 2007-04-26 | Berry Kenneth M | Methods for responding to biological, chemical or nuclear attacks |
EP1339351A2 (en) * | 2000-11-14 | 2003-09-03 | APPLE, Marc G. . | Directional energy emitting implant |
US6531701B2 (en) * | 2001-03-14 | 2003-03-11 | Trw Inc. | Remote trace gas detection and analysis |
US6946300B2 (en) * | 2002-02-01 | 2005-09-20 | Control Screening, Llc | Multi-modal detection of explosives, narcotics, and other chemical substances |
WO2003095050A2 (en) * | 2002-05-13 | 2003-11-20 | Consolidated Global Fun Unlimited, Llc | Method and system for interacting with simulated phenomena |
US20040015336A1 (en) * | 2002-07-19 | 2004-01-22 | Kulesz James J. | Automatic detection and assessment of chemical, biological, radiological and nuclear threats |
US6984524B2 (en) * | 2002-09-12 | 2006-01-10 | Control Screening, Llc | Chemiluminescent detection of explosives, narcotics, and other chemical substances |
US6946644B2 (en) * | 2002-12-19 | 2005-09-20 | Honeywell International Inc. | Sensor for multi-band radiation detection within a field of view |
CA2552358A1 (en) * | 2002-12-31 | 2004-07-15 | Telaura Inc. | System and method for real-time detection and remote monitoring of pathogens |
US7391557B1 (en) * | 2003-03-28 | 2008-06-24 | Applied Photonics Worldwide, Inc. | Mobile terawatt femtosecond laser system (MTFLS) for long range spectral sensing and identification of bioaerosols and chemical agents in the atmosphere |
US6914447B2 (en) * | 2003-04-23 | 2005-07-05 | Texas Instruments Incorporated | High activity, spatially distributed radiation source for accurately simulating semiconductor device radiation environments |
US7770224B2 (en) * | 2004-10-18 | 2010-08-03 | Lockheed Martin Corporation | CBRN attack detection system and method I |
US7507089B2 (en) * | 2005-07-15 | 2009-03-24 | Raytheon Company | Methods and apparatus to provide training against improvised explosive devices |
US7412356B1 (en) * | 2007-01-30 | 2008-08-12 | Lawrence Livermore National Security, Llc | Detection and quantification system for monitoring instruments |
US20120132814A1 (en) * | 2007-02-26 | 2012-05-31 | Irving Weinberg | Radiation detection device, system and related methods |
US9728100B2 (en) * | 2008-02-01 | 2017-08-08 | Lion Group, Inc. | Hazard suppression training simulator and method of training |
US9165475B2 (en) * | 2008-02-20 | 2015-10-20 | Hazsim, Llc | Hazardous material detector simulator and training system |
US20090263770A1 (en) * | 2008-02-20 | 2009-10-22 | Ambrose Philip L | System and method for simulating hazardous environments for portable detection meters used by first responders |
US9529974B2 (en) * | 2008-02-25 | 2016-12-27 | Georgetown University | System and method for detecting, collecting, analyzing, and communicating event-related information |
US8794973B2 (en) * | 2008-04-17 | 2014-08-05 | Radiation Safety And Control Services, Inc. | Contamination detection simulation systems and methods |
US9280913B2 (en) * | 2009-07-10 | 2016-03-08 | Lincoln Global, Inc. | Systems and methods providing enhanced education and training in a virtual reality environment |
US8827714B2 (en) * | 2009-06-22 | 2014-09-09 | Lawrence Livermore National Secuity, LLC. | Web-based emergency response exercise management systems and methods thereof |
GB201119456D0 (en) * | 2011-11-11 | 2011-12-21 | Cobham Cts Ltd | Hazardous device detection training system |
EP2839323A2 (en) * | 2012-04-15 | 2015-02-25 | Nederlandse Organisatie voor toegepast-natuurwetenschappelijk Onderzoek TNO | Fluorescent nano-sensors for oil and gas reservoir characterization |
DE102012221862A1 (en) * | 2012-11-29 | 2014-06-05 | Leibniz-Institut Für Atmosphärenphysik E.V. An Der Universität Rostock | Method and device for determining and calculating a scattered radiation spectrum and method for compressing data |
US9836993B2 (en) * | 2012-12-17 | 2017-12-05 | Lawrence Livermore National Security, Llc | Realistic training scenario simulations and simulation techniques |
-
2014
- 2014-05-07 WO PCT/US2014/037210 patent/WO2015057264A1/en active Application Filing
- 2014-05-07 JP JP2016549007A patent/JP2016535379A/en active Pending
- 2014-05-07 EP EP14854212.9A patent/EP3058504B1/en active Active
- 2014-05-07 US US14/358,613 patent/US10579747B2/en not_active Expired - Fee Related
-
2019
- 2019-12-13 US US16/713,566 patent/US20200117840A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
JP2016535379A (en) | 2016-11-10 |
EP3058504A4 (en) | 2017-05-03 |
US10579747B2 (en) | 2020-03-03 |
EP3058504A1 (en) | 2016-08-24 |
US20150186566A1 (en) | 2015-07-02 |
WO2015057264A1 (en) | 2015-04-23 |
EP3058504B1 (en) | 2020-07-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cova et al. | Warning triggers in environmental hazards: Who should be warned to do what and when? | |
US9836993B2 (en) | Realistic training scenario simulations and simulation techniques | |
US11378485B2 (en) | Structural monitoring system | |
CN114118677A (en) | Tailing pond risk monitoring and early warning system based on Internet of things | |
US20200117840A1 (en) | Injection of simulated sources in a system of networked sensors | |
CN106485868B (en) | Monitoring method, the monitoring server of system and fire behavior of fire behavior | |
KR101885350B1 (en) | System for integrated managment of air pollution | |
JP5743930B2 (en) | Atmospheric diffuse substance source search device, atmospheric diffuse substance source search system, and atmospheric diffuse substance source search method | |
Cho et al. | Emergency response: Effect of human detection resolution on risks during indoor mass shooting events | |
CN113125635A (en) | Atmospheric pollution early warning method and device and readable storage medium | |
Yee | Bayesian probabilistic approach for inverse source determination from limited and noisy chemical or biological sensor concentration measurements | |
US20200066140A1 (en) | System and method for indicating building fire danger ratings | |
Ambros et al. | Proactive assessment of road curve safety using floating car data: An exploratory study | |
Menon et al. | Exploring iot-enabled multi-hazard warning system for disaster-prone areas | |
KR101938550B1 (en) | Disaster preventer trainning system, portable terminal for trainning disaster preventer and method for operating disaster preventer trainning system | |
Balamurugan et al. | An IoT based Natural Disaster Monitoring for Railway Accident Warning Alert System | |
KR20220013768A (en) | Chemical disaster integrated management system and method | |
Bieringer et al. | A method for targeting air samplers for facility monitoring in an urban environment | |
Balaskas et al. | Earthquake early warning and rapid response system based on smart seismic and monitoring sensors embedded in a communication platform and coupled with BIM models | |
Chaloupecká et al. | Sensitivity of puff characteristics to maximum-concentration-based definition of departure time | |
Sharma et al. | An ensemble learning–based experimental framework for smart landslide detection, monitoring, prediction, and warning in IoT-cloud environment | |
Koushik et al. | Early Detection and Warning System for Earthquakes Using Internet of Things | |
Brauner et al. | Determination of the effectiveness of security measures for low probability but high consequence events: A comparison of multi-agent-simulation & process modelling by experts. | |
Alhaddad | Deep Learning Methods for Impact Load Identification and Displacement Estimation in Structures | |
CN115735095A (en) | Protecting persons and objects from unsafe structures |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: PASSPORT SYSTEMS, INC., MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:COOPER, DANIEL A.;COSTALES, JAMES B.;KAMIENIECKI, KRZYSZTOF E.;AND OTHERS;SIGNING DATES FROM 20140506 TO 20140507;REEL/FRAME:051329/0361 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |