Remote detection and measurement of objects
09746552 · 2017-08-29
Assignee
Inventors
- Nicholas Bowring (Herefordshire, GB)
- David Andrews (Herefordshire, GB)
- Nacer Ddine Rezgui (Herefordshire, GB)
- Stuart Harmer (Herefordshire, GB)
Cpc classification
G01S7/411
PHYSICS
G01S13/887
PHYSICS
International classification
G01S13/88
PHYSICS
G01S7/41
PHYSICS
Abstract
Provided are methods of using electromagnetic waves for detecting metal and/or dielectric objects. Methods include directing microwave and/or mm wave radiation in a predetermined direction using a transmission apparatus, including a transmission element; receiving radiation from an entity resulting from the transmitted radiation using a detection apparatus; and generating one or more detection signals in the frequency domain using the detection apparatus. Methods may include operating a controller, wherein operating the controller includes causing the transmitted radiation to be swept over a predetermined range of frequencies, performing a transform operation on the detection signal(s) to generate one or more transformed signals in the time domain, and determining, from one or more features of the transformed signal, one or more dimensions of a metallic or dielectric object upon which the transmitted radiation is incident. A system and method for remote detection and/or identification of a metallic threat object using late time response (LTR) signals is also disclosed.
Claims
1. An apparatus comprising: a transmitter configured to transmit at least one of microwave and millimeter wave radiation varied over a range of frequencies; a detector configured to receive radiation resulting from the transmitted radiation to enable production of a frequency-dependent detection signal; and a controller configured to detect an object upon which the transmitted radiation is incident based at least on an oscillatory term in the detection signal indicative of a dimension of the object.
2. An apparatus according to claim 1, wherein the controller is configured to determine the oscillatory term by at least performing spectral analysis of the detection signal.
3. An apparatus according to claim 2, where the controller is configured to determine the oscillatory term by determining a position of a feature in a transformed signal obtained by at least performing a Fourier-type transform of the detection signal.
4. An apparatus according to claim 3, wherein the controller is configured to reduce an amount of data to be processed by at least disregarding a part of the transformed signal corresponding to dimensions outside a range of interest.
5. An apparatus according to claim 1, further comprising a range finder and wherein the controller is configured to use a range of the object as a normalization factor when detecting the object.
6. An apparatus according to claim 1, wherein the controller is configured to detect the object based on a plurality of oscillatory terms in the detection signal indicative of a plurality of dimensions of the object, respectively.
7. An apparatus according to claim 1, wherein the controller is configured to determine that the object is of a predetermined type based on data indicative of a set of dimensions associated with the predetermined type of object.
8. An apparatus according to claim 1, wherein the controller is configured to detect the object using a neural network, wherein data indicative of at least the dimension of the object is provided to the neural network.
9. An apparatus according to claim 1, wherein: the transmitter is configured to repeatedly transmit the radiation; and the controller is configured to detect the object using a plurality of frequency-dependent detection signals.
10. An apparatus according to claim 1, wherein: the detector comprises a first detector configured to detect radiation with a first polarization state and a second detector configured to detect radiation with a second, different polarization state; and the controller is configured to detect the object using at least a first detection signal associated with the first polarization state and a second detection signal associated with the second polarization state.
11. An apparatus according to claim 1, wherein the detector is configured to use direct detection without phase detection to produce the frequency-dependent detection signal.
12. An apparatus according to claim 1, wherein the controller is configured to detect the object based at least on an oscillatory term in the detection signal indicative of a dimension of the object with a resolution of 5-10 mm or higher.
13. A method comprising: transmitting at least one of microwave and millimeter wave radiation varied over a range of frequencies; receiving radiation resulting from the transmitted radiation to enable production of a frequency-dependent detection signal; and detecting an object upon which the transmitted radiation is incident based at least on determining an oscillatory term in the detection signal indicative of a dimension of the object.
14. A method according to claim 13, further comprising detecting the object based at least on an oscillatory term in the detection signal indicative of a dimension of the object with a resolution of 5-10 mm or higher.
15. A method according to claim 13, further comprising using direct detection without phase detection to produce the frequency-dependent detection signal.
16. A method according to claim 13, wherein determining the oscillatory term comprises performing spectral analysis of the detection signal.
17. A method according to claim 16, wherein determining the oscillatory term further comprises determining a position of a feature in a transformed signal obtained by at least performing a Fourier-type transform of the detection signal.
18. A method according to claim 17, further comprising reducing an amount of data to be processed by at least disregarding a part of the transformed signal corresponding to dimensions outside a range of interest.
19. A method according to claim 13, further comprising finding a range of the object and using the range as a normalization factor when detecting the object.
20. A method according to claim 13, further comprising detecting the object based on a plurality of oscillatory terms in the detection signal indicative of a plurality of dimensions of the object, respectively.
21. A method according to claim 13, further comprising determining that the object is of a predetermined type based on data indicative of a set of dimensions associated with the predetermined type of object.
22. A method according to claim 13, further comprising detecting the object using a neural network, wherein data indicative of at least the dimension of the object is provided to the neural network.
23. A method according to claim 13, further comprising: repeatedly transmitting the radiation; and detecting the object using a plurality of frequency-dependent detection signals.
24. A method according to claim 13, further comprising: detecting radiation with a first polarization state; detecting radiation with a second, different polarization state; and detecting the object using at least a first detection signal associated with the first polarization state and a second detection signal associated with the second polarization state.
Description
BRIEF DESCRIPTION OF THE FIGURES
(1) Embodiments of the invention will bow be described in detail, by way of example, with reference to the accompanying drawings, in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
(20)
(21)
(22)
(23)
DETAILED DESCRIPTION OF THE EMBODIMENTS
(24) Embodiments of the present invention now will be described more fully hereinafter with reference to the accompanying drawings, in which embodiments of the Invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to tike elements throughout.
(25) If will be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of the present invention. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items.
(26) It will be understood that when an element such as a layer, region or substrate is referred to as being “on” or extending “onto” another element, it can be directly on or extend directly onto the other element or intervening elements may also be present. In contrast, when an element is referred to as being “directly on” or extending “directly onto” another element, there axe no intervening elements present. It will also be understood that when an element is referred to as being “connected” or “coupled” to another element, it can be directly connected or coupled to the other element or intervening elements may be present. In contrast, when an element is referred to as being “directly connected” or “directly coupled” to another element, there are no intervening elements present.
(27) Relative terms such as “below” or “above” or “upper” or “lower” or “horizontal” or “vertical” may be used herein to describe a relationship of one element, layer or region to another element, layer or region as illustrated in the figures. It will be understood that these terms are intended to encompass different orientations of the device in addition to the orientation depicted in the figures.
(28) The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise, it will be further understood that the terms “comprises” “comprising,” “includes” and/or “including” when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
(29) Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs, it will be further understood that terms used herein should be interpreted as having a meaning that is consistent with their meaning in the context of this specification and the relevant art and wilt not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
(30) As used herein, “threat object” is taken to mean a metallic or dielectric object, whether specifically designed or intended for offensive use or not, that have potential to be used in an offensive or violent manner.
(31) The present invention is described below with reference to flowchart illustrations and/or block diagrams of methods, systems and computer program products according to embodiments of the invention. It will be understood that some blocks of the flowchart illustrations and/or block diagrams, and combinations of some blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be stored or implemented in a microcontroller, microprocessor, digital signal processor (DSP), field programmable gate array (FPGA), a state machine, programmable logic controller (PLC) or other processing circuit, general purpose computer, special purpose computer, or other programmable data processing apparatus such as to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
(32) These computer program instructions may also be stored in a computer readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture including instruction means which implement the function/act specified in the flowchart and/or block diagram block or blocks.
(33) The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions/acts specified in the flowchart and/or block diagram block, or blocks. It is to be understood that the functions/acts noted in the blocks may occur out of the order noted in the operational illustrations. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved. Although some of the diagrams include arrows on communication paths to show a primary direction of communication, it is to be understood that communication may occur in the opposite direction to the depicted arrows.
(34) Embodiments of the invention may be used for remotely detecting the presence and/or size of metal and/or dielectric objects concealed underneath clothing. Embodiments herein may be used for remotely detecting metal and/or dielectric objects. A dielectric in this context is a non-conducting (i.e. insulating) substance such as ceramic that has a low enough permittivity to allow microwaves to pass through. A ceramic knife or gun, or a block of plastic explosive, are examples of this type of material.
(35) Some embodiments of detection systems are disclosed herein.
(36)
(37) The main procedure carried out by controller 104 in implementing a scan is set out in Appendix A at the end of this section of the Specification. The procedure “Perform transformation on received radiation signals to produce time domain or optical depth domain trace” in Appendix A, for each of the four techniques, is discussed later with reference to Appendix B.
(38) In use and operation, the system may use electromagnetic radiation in the microwave or millimeter (mm) wave band, where the wavelength is comparable or shorter than the size of the object 116 to be detected. The object 116 may be on and/or in the body of a person, within containers and/or items of luggage, and/or concealed in and/or on some other entity (not shown). The suspect entity (e.g., a person; not shown) has radiation directed by transmitter 106 onto it, so that the (threat) object 116 is entirely illuminated by a continuous wave of this radiation (i.e., the radiation is not pulsed, bet kept continuously on). The radiation intensity is well within safe operating limits, but may be in any case determined by the sensitivity of the detector 110. As an example, in the range 14-40 GHz, 0 dBm of power is used with a typical beam area 118 of 0.125 m.sup.2 which equates to a 20 cm diameter beam. However, in some embodiments, the hardware may be designed so as generate a beam area 118 of greater or lesser size.
(39) The frequency and consequently the wavelength of the radiation, is swept through a reasonable range and may be referred to as swept CW and/or continuous wave radiation. Limits may be set by the devices used, but a 20 GHz or more sweep starting at 14, 50 or 75 GHz is typical. The data may be collected in a series of small steps and/or as a real-time continuous sweep. Typically 256 or more data points may be acquired. In some embodiments, data may be taken between 14 to 40 GHz, providing a sweep range of 26 GHz.
(40) The illumination and detection may be undertaken remotely from the object 116 in question, for example, at a distance of a meter or more, although there is no lower or tipper limit on this distance. The upper limit on detection distance may be set by the millimeter or microwave focussing optics, although, with this technique, a small beam at the diffraction limit is not necessary, in some embodiments, ranges for this device may include a few tens of centimeters (cm) to many tens of meters (m). In some embodiments, a device may be operated at a range of approximately 1 m to 10 n depending on the frequency chosen (some microwave frequencies are attenuated by the atmosphere, and atmospheric windows such as that found around 94 GHz are generally chosen to minimise these effects). In some embodiments, the source of electromagnetic radiation 102 and the detector 110 may be mounted next to each other and they may be focussed onto some distant object 116 or entity (not shown).
(41) A variety of techniques is disclosed herein and may include distinct system and/or method recitations. For example, swept reflectometry and barrel tone detection, may provide that the return radiation is detected and its amplitude stored as a function of frequency. In this regard, embodiments of a system as illustrated in
(42) Other techniques, including cross-polarization and LTR recurrences may use the phase of the returned radiation that may be acquired at each frequency point. When the phase of the returned signal is used—in order to replicate a Time Domain response via the use of a Fourier Transform—the synthesiser and detection system in
(43)
(44) The frequencies of the first and second microwave sources 102 and 103 may be swept under control of the signal from the Ramp Generator 202 to remain approximately 100 MHz apart. The Microwave mixers 204, 206 generate signals corresponding to the difference frequency between the two inputs (˜100 MHz). After amplification by two RF amplifiers 208, 210, a RF Mixer 212 produces two outputs corresponding to the “in phase” (I) and “in quadrature” (Q) components of the detected signal. The signals may be amplified by amplifiers 112, 112′, and the data acquisition may be controlled by a controller 104 (PC). The entire system apart mom the horns 106, 108 may be referred to as a Vector Network Analyser (VNA).
(45) The return signal is collected by a born and applied to port 2 of the VNA, which measures parameter S21. If cross-polarisation measurements are used, a second receiver horn oriented (not shown) at 90° may be added to the VNA on, for example, port 3. The transmitted signal may be generated front port 1 and may be, for example, 1 mW. The real and imaginary parts may be recorded and can be corrected for the electrical behaviour of the horns. The signals are zero padded out to 4096 points and are processed by a Fast Fourier Transform routine to yield the effective time response. In this manner, the process allows the replication of the application of a pulse of radiation to the target (entity) and the subsequent acquisition of the time resolved response.
(46)
(47) In some embodiments, hardware corresponding to the systems herein may form and/or be part of a portable device (i.e. small enough to be carried by one person, or transported in an automobile, so as to be operable therein).
(48) Theoretical Basis.
(49) To detect the range of signals described herein, several measurement techniques are available. For a transmitted signal E.sub.0e.sup.−jωt the return signal E.sub.R from a target (entity) distance L away may be written as follows:
E.sub.R=rE.sub.0e.sup.−jωte.sup.2jωL/c (1)
where ω=2πf, f is the frequency, r the scattering coefficient and c the velocity of light.
(50) A detector 110, which may respond to the microwave power, will only measure |E.sub.R|.sup.2, which for a single scattering center, does not explicitly depend on frequency. However, for two scattering segments at different ranges L.sub.1 and L.sub.2, the power is proportional to:
(51)
(52) This contains terms in cos(2ω(L.sub.1−L.sub.2)|c) (i.e., oscillatory terms) that are dependent on the difference in range L.sub.1−L.sub.2. By performing a Fourier transform on the detected power measured as a function of transmitted frequency, peaks corresponding to the difference in range of various parts of the target are observed and these give an indication of the size of the object 116. However, for a complicated object 116, many pairs of distances would be involved and the analysis of the signal would be complex.
(53) For a different group of detectors (i.e. Vector Network Analysers as illustrated in
r.sub.1e.sup.2jωL.sup.
in terms of its real and imaginary parts, in this case Fourier Transforming leads to a series of signal peaks at the range of each element of the target and arranged in the order of their distance. Thus, a much clearer indication of the dimensions of the object 116 may be obtained, though only in one dimension. Any Late Time Responses (i.e. those that cannot be attributed to direct scattering) can be measured in this way, although their strength may be many times less than directly reflected signals.
(54) Further information about the target (entity) may be obtained using a second detector to collect return signals emitted at a different angle from the target. This effectively probes the target along a second direction and can in principle enable more dimensions of the object 116 to be ascertained.
(55) A Fourier Transform (FT) or some other snore advanced power spectrum analysis technique such as a Burg Transform may be applied. The Burg and related methods of power spectrum analysis may be better than the FT for this application as the individual peaks that relate directly to the dimensions of the object are more clearly identifiable, and as it is possible to choose the number of peaks to be displayed in the output (and hence reject weaker peaks). They may also allow two closely spaced peaks to be resolved.
(56)
(57) The position L of peaks within the FFT or Burg spectrum directly relate to the size of the object rising the following formula:
(58)
Where c is the speed of light. Δf the periodicity in the frequency domain. This axis represents optical depth for the purposes of tins disclosure.
(59) The minimum spatial resolution d is related to the sweep range or bandwidth BW:
(60)
(61) As an example, if the source frequency were to be swept between 14 and 40 GHz, this constitutes a sweep range of 26 GHz, which translates to a resolution of 5.7 mm. A larger sweep range would lead to an improved resolution, which may result in, for example, a maximum optical depth or distance of 740 mm for 256 data points. In some embodiments, the number of data points may include more that 256 including, for example, 512, 1024 or any multiple thereof, among others. For Vector Network Analysers operating in Time Domain mode, in which the complex data is converted to the lime domain, this calculation may be included in the software.
(62) The four techniques mentioned above, each of which may be used in embodiments of the invention, will now be discussed in more detail.
(63) Technique 1: Swept Reflectometry.
(64) As briefly described above, swept reflectometry is the principle by which the distances between corners, edges and cavities on the threat object (weapon) 116 independently of the distances to the source (TX horn 106;
(65) If the object 116 (e.g. a weapon strapped to the body as the latter rotates) is moved around in the beam and its angle and distance with respect to the source and detector is changed, those dimensions between edges and corners that actually belong to the object can be differentiated from those that do not. In this manner, the background clutter may be removed.
(66) Some embodiments of a procedure carried out by controller 104 (
(67) The software according to Technique 1 may differentiate the peaks that relate to the dimensions of the object 116 from those that do not by acquisition of the signal over a period of time and by storing these acquired signals independently, with the object moving within the beam. The signals that indirectly relate to the dimensions of the object remain and occur within certain bands denoted by the distances between the various corners of the object. Other signals that change (e.g., the air gaps between clothing and the skin) may be more chaotic and may be integrated out over a period of time.
(68) If the strength of the signal is normalized relative to distance, the returns from a subject concealing a handgun will be larger in amplitude than those without.
(69)
(70) Very large dimensions, such as, for example, metal doors, window frames and/or a multitude of other metal objects will not be observed as they are not entirely encompassed by the beam, as the microwave beam can be focused onto relevant pans of the person (entity) or object 116 in question.
(71) The reflected return radiation is seen to contain patterns or frequencies that can be indirectly related to the dimensions of the metal object according to the technique identified in the section “Theoretical basis” above, including the presence and/or length of gun barrels. In this manner, embodiments herein may be used to discriminate between, say, handguns and keys, knives and keys, etc. In effect, the technique measures the distances between the various edges of the object at the orientation of the source and detector, and cavity lengths if present.
(72) The dimensions of guns and knives are different from most other objects carried about the person, so the appropriate dimensions may be stored on a database.
(73) The technique (Technique 1) is also capable of measuring, particularly, the depth of a dielectric (i.e., of a material that does not conduct electricity), although the physics behind this may be significantly different. A dielectric object might typically be a lump of plastic explosives concealed on a suicide bomber.
(74)
(75) Technique 2: Barrel Tone Detection by Direct Detection of Aspect-Independent Chirped Signals.
(76) Threat objects that contain cavities and can be excited by an incoming microwave signal, can exhibit strong frequency dependence in the scattered signal. These signals may differ from those derived from dm outside of the object by:
(77) 1. Showing a threshold frequency for stimulation (cut-off),
(78) 2. Being less dependent on alignment of the cavity with respect to the microwave direction.
(79) For example, consider a 10 cm long cylindrical metal barrel closed at one end, which has 19 mm outside diameter and 9 mm inside diameter. The H11 mode has the lowest threshold frequency f.sub.0 for propagation for the inside bore at 19.5 GHz. For a cavity length L, the response for f greater than f.sub.0 is proportional to the chirped sine wave signal:
|E.sub.R|.sup.2∞ cos(2π√{square root over ((f.sup.2−f.sub.0.sup.2))}(2L/c)+φ) (3)
where f is the microwave frequency and c is the velocity of light, with a minimal return at lower frequencies below this threshold.
(80) A procedure according to some embodiments that may be carried out by controller 104 (
(81)
(82) It should be noted that the signal is clearly seen at a range of impact angles θ ranging from 0 to over 45° and the oscillation frequency is only a function of the cavity length L. This may be contrasted with the case of edge or corner detection where the oscillation frequency is proportional to L cos θ. The analysis provides a means of determining both the length and diameter of the cavity bore.
(83)
(84) Technique 3: Identification of the Target by Cross-Polarized Detectors.
(85) By measuring the return signal as a function of frequency scanned over a wide range, the dimensions may be recovered through Fourier Transform techniques. This duplicates the effect of responses of targets to a very short excitation pulse without the need of high speed switches and ultra-fast detectors and digitization processes. The range resolution obtainable is of the order of 0.5-1.0 cm, as described by the principles above, at the sweep ranges available here (14-40 GHz, but this property is not restricted to this frequency range), and thus appropriate for characterizing objects such as hand guns.
(86) Another useful aid to threat object identification is to measure the polarization of the return signal. Waveguide horns (see
(87) Embodiments of a procedure carried out by controller 104 (
(88) The responses of a range of objects using a system as illustrated in
(89)
(90) In accordance with Technique 3, the very wide sweep range leads to detailed information about the dimensions of the object 116 and the fine structural distances between the source/detector 106/108 and corners/edges on the target/object 116. It can be seen in
(91) Technique 4: Target Determination by Aspen Independent Effects (Late Time Responses).
(92) The Late Time Response (LTR) and the closely associated Singularity Expansion method (SEM) arose from the observation that the time-resolved radar signature from conducting objects contains information after the radar pulse has passed the target.
(93) The pulse sets up currents on the surface of the object 116 in the form of resonant modes, which subsequently re-radiate. An alternative interpretation is to consider the radar pulse stimulating travelling waves on the surface of the target, which move across and around the object 116 until they return back to their initial distribution. This recurrence can re-radiate back into the return beam, which appears an extra, time-delayed signal.
(94) An important feature of the LTR is that the time taken for the travelling wave to circulate around the object does not depend on the orientation of the entity/object 116, and hence is aspect-independent, although its strength may depend on the efficiency of coupling into the modes. For objects 116 with symmetry the time-delay is approximately half the perimeter with respect to centre of the object 116. For more complicated objects, the LTR signal is more complex, but the structure can be interpreted in terms of the dimensions of the object 116. These include dimensions cross range as well as the usual along range values.
(95)
(96) The return signal is collected by a second horn close to the transmitting horn and is measured and applied, for example, to port 2 of a VNA 1204. The S21 parameter is recorded over a range typical range 14-40 GHz. The signals were corrected for the performance of the microwave horns 106, 108.
(97) If the plate 1202 of width L is rotated by angle θ about its long direction, then scattering from its leading and trailing edge leads to a doublet response with separation L sin θ.
(98) A procedure according to some embodiments may be carried out by controller 104 (
(99)
(100)
(101)
(102) The training data may be formed of sets of data taken using the above-described techniques, in random order. The output 1506 from the neural network may be a single output that gives a confidence level (1=gun, 0=no object being concealed). However, it will be appreciated that other configurations or learning algorithms may be used. For example, multiple outputs from the neural network 1500 may be employed, with sub-classifications (e.g., gun, mobile phone, keys, etc).
(103) The millimeter wave reflected signals from the guns show a number of features which enable them to be distinguished from innocently carried objects such as keys and mobile phones. These include cavity mode oscillations from the barrel with characteristic frequency of onset that allows the caliber and length to be determined. The interference of signals from different parts of the target leads to a frequency-dependent response, which can be used to deduce the size of the object. The response at different polarizations may give an indication of the complexity of the object from multiple reflections. The late time response gives an aspect-independent signal dependent on target dimensions. Taken together these features provide a means of detecting handguns, for example, under practical conditions at stand-off distances. The application of signal processing techniques enable relevant parameters to be extracted for use in automatic detection systems.
(104) Embodiments of the system forming extensions and variants of Technique 4: Target Determination by aspect independent effects (Late Time Responses), will now be discussed in more detail.
(105)
(106) The TX horn 106′ is coupled to detection electronics 1604 via (coax) cables 1606, and RX horn 108′ is coupled to detection electronics 1604 via (coax) cables 1608. The detection electronics 1604 may comprise the circuitry of
(107) In certain embodiments, the apparatus includes a linear polarising element 1610, mounted for rotation about axis B. In this way, the entity or target 116 is illuminated by electromagnetic field with rotating polarisation. The spinning linear polarising element 1610 is used in conjunction with a dual polarised horn antenna to produce broadband microwaves with polarisation which rotates (either elliptically or circularly, depending on the relative amplitudes of the dual microwave feed) at a frequency equal to that of the frequency of rotation of the linear polarising element 1610. This allows optimum coupling between the exciting wave and the target 116, since coupling is strongly dependent upon polarisation for a given target aspect. The receiver RX horn 108′ is also a dual polarised antenna and data from both channels are used in processing, as discussed further hereinafter.
(108)
(109) Theoretical Background.
(110) When an object is illuminated by Electromagnetic (EM) waves the scattered waves in the time domain can be approximately represented by
R(t)=I(t){circle around (x)}h(t)
(111) where R is the scattered signal, I is the incident signal, h is the “impulse response” of the target, and {circle around (x)} represents the mathematical convolution operation.
(112) If the incident signal is a sharp pulse approximating the delta function then the scattered (detected) signal approaches
R(t)=δ(t){circle around (x)}h(t)=h(t)
(113) So the scattered signal approximates the impulse response of the object.
(114) This is useful because the impulse response “carries” unique and aspect independent information about the electromagnetic response of the target.
(115)
(116) Rewriting the late time response in exponential form we obtain
(117)
(118) where the argument of the exponential terms are the complex natural resonances of the target—these are aspect independent.
(119) According to some embodiments of the invention, the Late Time Response (LTR) of the target 116 is recorded and Generalised Pencil Of Functions (GPOF) method is used to determine the complex natural resonances (poles)—
−α.sub.m+i2πv.sub.m
(120) These resonances or poles are used to identify the presence of a particular (threat) object by comparing the poles of with those of measured objects and looking for a correlation.
(121) Requirements Amplitude and phase detection—not just power detection (e.g. use VNA) Ultra wide band (UWB) frequency to give sufficient time resolution to be able determine the frequency and decay tunes from the LTR.
(122)
(123) Where the microwave frequency is scanned from a lowest frequency to v.sub.L through to a highest frequency v.sub.H In currently preferred embodiments of the system, this is 1/(17.5 GHz), i.e. 0.06 ns.
(124) Brief outline of technique: Detect scattered signals in both cross polarised and co-polarised orientation. Subtract stable background and transform to time domain (DIFFT) Time gate to isolate LTR and noise sample from signal DFFT LTR and noise sample data and subtract DIFFT to reconstruct “erase adjusted” LTR Use Generalised Pencil Of Function or other method to obtain complex natural resonances and apply statistical analysis of multiple acquisitions
(125) LTR Detecton—Detailed Methodology
(126) Referring to
(127) This is further illustrated in
(128)
(129) As seen in
(130) In step 1902, the Late Time Response of a metallic object 1602 (
(131) The excitement of LTRs is achieved by illuminating the target 116 by a microwave source with frequency which is scanned from a lowest frequency v.sub.L through to a highest frequency v.sub.H to simulate illumination with a broadband (frequency content) and hence short time length, electromagnetic pulse. v.sub.L is typically (but is not restricted to) 0.5 GHz whereas v.sub.H is typically 18 GHz. The wavelength of the lowest frequency must exceed the size of the object 1602 in order to stimulate the fundamental mode (see further below).
(132) The microwave output has variable (user determined) polarisation state which is obtained via—
(133) (1a) Rotating a linear polarising filter 1610 immediately in front of the dual polarised microwave born 106′ used for target illumination (
(134) (1b) Introducing a time delay between the two input ports of the dual polarised microwave horn 106′ used for target illumination in such a way as to give a time delay
(135) ¼v between the orthogonal polarised components, where v is the frequency of microwave output;
(136) (2) Using a spiral free wave antenna (not shown) to give an elliptically polarised microwave output.
(137) The polarised microwave source with frequency v is scanned from a lowest frequency v.sub.L through to a highest frequency v.sub.H. The frequency bounds of the system are selected so that, the fundamental (lowest possible resonant frequency) and several higher order resonances of all threat objects 116 to be identified are encompassed within this range so that their excitation is possible. The natural resonant frequencies of objects 116 are related to the object's largest linear dimension in as much as the fundamental frequency is ˜c/2l, where l is the object's largest linear dimension and c is the velocity of light in free space. The upper bound is determined only by the apparatus used and should be as high as is practicably achievable since it is the bandwidth of the system that determines the resolution of time data obtained.
(138) The microwave receiving antennae 106′, 108′ (
(139) Returning to
(140) The target response data is then subjected (step s1906) to Inverse Fast Fourier Transform (IFFT) to give the time domain, scattered signal, with a time resolution Δt given by
(141)
(142) The time domain signal so obtained is then time gated or “windowed” (step s1908) to divide the time signal into four distinct sections (see
(143)
(144) This separation of the time response into sections is achieved by either of two techniques—Method A and Method B, as discussed further below.
(145) Method A is illustrated in more detail in
(146) First, at step s1930, a sliding time window is used to analyse (by FFT) spectral content of discrete windowed portions of time domain target response. The sliding windows have three user selected options—the segment size (time), the time shift applied to the window to “slide” it and whether the window is a step function or Gaussian in form. Typically both the window width and the time shin are <1 ns and exact values are empirically determined.
(147) Next, at step s1932, both amplitude and frequency content of the spectral data (time domain target response) are analysed for each small time segment (window). This data is the used to determine where the Early Time Response starts and ends and where the Late Time Response starts and descends into noise (ends).
(148) As seen in step s1934, for each window, thresholds (T.sub.A, T.sub.v) are applied to both amplitude (A) change and frequency (v) change compared to previous window. The ETR has large amplitude at high frequency whereas the LTR has large amplitude at lower frequency. The time periods before the ETR and after the LTR have low amplitude at all frequencies. The threshold for amplitude change and the threshold for frequency change are determined empirically by the user beforehand.
(149) Thus at step s1936, the position where Early Time Response starts is derived from (ampl. chge>T.sub.A and v chge>T.sub.v).
(150) Next, at step s1938, the position where Early Time Response ends/Late Time Response starts is derived from (ampl. chge<T.sub.A and v chge>T.sub.v).
(151) Finally, at step s1940, the position where Late Time Response descends into noise (ends) is derived from (ampl. chge>T.sub.A and v chge<T.sub.v).
(152) Method B is illustrated in more detail in
(153) First (step s1942, the absolute maximum value in time domain target response is located. The absolute maximum value is used to determine the position of the ETR (s1944)
(154) This Method, used two time delays (1 and 2)—these may for example be retrieved from a database (s1946). Time delay 1 (t.sub.1) is chosen so that ETR from a typical human body is removed. This is done by applying the formula
t.sub.1=2D/c,
(155) where D is the width of a typical human body. Time delay 2 (t.sub.2) is chosen so that a typical LTR response would have been attenuated into the noise level after this time, and is for example ˜5 ns.
(156) Next, the time domain target response is sampled (step s1948), starting from time delay 1 after time position of absolute maximum value and continuing for a time length equal to time delay 2. Finally, the sampled data is used and/or store as the LTR.
(157) Once dm time gating (step s1908) has been performed, a pole extraction technique is applied to the derived LTR.
(158) Referring briefly to
(159) The LTR data S[n] is expected to be of the form
(160)
Where there exist M natural resonances Z.sub.m between the frequencies v.sub.L and v.sub.H and there is assumed to be inherent noise in the system N
(161) The natural resonances or poles Z.sub.m=−α.sub.m+i2πv.sub.m are aspect independent and are to be extracted in step s1910 as precisely as is possible in order to confirm the presence or absence of a particular threat object 1602 whose natural resonances are known (either by measurement or numerical simulation) a-priori. The complex amplitudes C.sub.m are highly aspect dependent and are not utilised explicitly in the determination of the presence or absence of a threat object.
(162) Depending on the embodiment, the poles are extracted using either the Generalised Pencil Of Functions method (Matrix Pencil method) or a Genetic Algorithm is implemented for this purpose. The complex poles and their associated complex amplitudes (residues) are thus extracted. The Generalised Pencil Of Functions method is well known to persons skilled in the art, and will not be discussed in detail here, see “Generalized Pencil-of-Function Method for Extracting Poles of an EM System from Its Transient Response” Yingbo Hua and Tapa K. Sarkar, IEEE Transactions on Antennas and Propagation, Vol. 37, No. 2, February 1989.
(163)
(164) In an alternative embodiment, pole extraction (step s1910 in
(165) A genetic algorithm and/or differential evolutionary algorithm is a well established method of obtaining the parameters necessary to find fee closest fit between the observed (experimental) Late Time Response (previously described as a sum of exponentially decaying sinusoidal functions or natural resonances) and the mathematical function that describes them, (given earlier) [In-Sik Choi et. al. “Natural Frequency Extraction Using Late-Time Evolutionary Programming-Based CLEAN”, IEEE Transactions on Antennas and Propagation, Vol. 51, No. 12, December 2003]. In [In-Sik Choi et. al.] the decaying natural resonances functions are fitted one at a time to the late time response and then subtracted front the original data. This makes the differential evolution algorithm task somewhat easier as it limits the number of parameters to four, amplitude, phase and the real and imaginary parts of each pole −α.sub.m+i2πv.sub.m per iteration, ha a preferred embodiment, the maximum number of waveforms is fitted simultaneously, which is a more difficult task computationally as there are more permutations of possible solutions to explore. In a algorithm according to a preferred embodiment the crossover/mutation operator from differential evolution referred to in [Price and Storn 1997] is used, followed by a tournament selection [Price and Storn 1997] to find the fittest chromosomes, although this does not preclude other least squares minimisation methods. It has been found that this approach is able to successfully fit the 20 parameters necessary to describe 5 damped sinusoidal functions typically used when analysing responses from concealed guns and other weapons.
(166) In order to determine the presence of a weapon, two of the four parameters for each damped sinusoid (frequency and decay) are stored. Typically a handgun will require at least two damped sinusoids to classify it. If multiple data sets are acquired then a cluster of frequencies and damping factors can be used to identify the weapon (see
(167) Returning to
(168) Steps 1902 to 11912 are repeated, as shown by loop s1914 a set number of times—decided by user set parameter. The number of loops is determined by the likely time a person being interrogated would spends within the active area (e.g. see corridor of
(169) Next, following pole filtering (step s1912), the poles are stored S1916).
(170) Then, at step s1918, the pole data is compared with library (1920) of measured poles for targets of interest, stored in a database.
(171) The comparison is carried out by finding the closest matching library poles to those measured and then computing a root mean square error where the damping space and frequency space are weighted by experimentally determined values. This weighting is necessary as the pole position in damping space is more spread than in frequency space. The RMSE value is then compared to empirically determined threshold values to give a threat level based on the closeness of pole match.
(172) Finally, it a threat level decision (0-1) is obtained and a possible threat object/class determined (s1922).
(173) Embodiments of the invention include the following novel aspects and consequent advantages. 1. Ultra Wide Band (UWB) to give large frequency coverage and thus excite maximal number of resonances and to give high time resolution (short tune span) in LTR sufficient that rapidly oscillating and quickly decaying resonances can be captured, 2. Robust auto separation of the early and late time domains—giving the LTR for pole extraction, partly facilitated by the use of Ultra Wide Band excitation to make the boundary more obvious. 3. Anechoic portal design to give low noise response data. 4. Multiple pairs of transmitter/receiver antennae for all round target interrogation. 5. Continuous or stepped, scanned polarisation state through mechanical or phase generated elliptical polarised output to optimise possibilities of coupling into aspect independent modes. (i) A type of Genetic Algorithm known as an Evolutionary program for processing multiple sweeps of LTR data and simultaneously extracting the complex natural resonance poles for target identification, forming clusters of poles. The use of Evolutionary programming does not preclude the use of more conventional techniques such as Pencil of Function methods. (ii) Cross polarised transmission and receiving antennae to give enhance discrimination between body ETR and LTR. (iii) The pre-excitation time domain data can be used as a measure of dm effectiveness of the background subtraction, since if there are no scattering surfaces present between transmitter and target this data should be of very small amplitude relative to the other portions. The Fast Fourier Transform of the pre-excitation time portion can be used to improve the LTR data, by subtraction in the frequency domain and subsequent time domain reconstruction. (iv) Undesirable effects of non-uniform transmitting and receiving antenna response cat) be mitigated by division of the frequency domain target response by the absolute value of the measured horn response in the frequency domain. (v) Multiple transmitter/receiver pairs to give all round target coverage.
APPENDICES
Appendix A
(174) Procedure for Collection and Automatic Analysis of Threat Object Sensor
(175) Receive activation signal (e.g. operator activates scan button or subject triggers scan]
(176) For a predetermined number of sweeps do
(177) While full frequency range not scanned do Illuminate subject with radiation Step over frequency range Receive reflected radiation signals Perform transformation on received radiation signals to produce time domain or optical depth domain trace
(178) Store in a sweep channel
(179) End While
(180) Increment sweep channel
(181) End do
(182) Normalise time domain trace according to range
(183) Use Complex Fourier Transform (VNA mode) or Direct Fourier Transform (reflectometry mode) to convert to x-dimension to determine position of trace peaks. From x-positions, use conversion factor
(184)
to determine corrected x-axis (optical depth).
Perform transformation on received radiation signals by all the steps below:
Appendix B.1
(185) [pseudocode for transformation for Swept reflectrometry]
(186) If (Technique1 (Swept reflectometry)) then
(187) Use Direct Fourier Transformed signals (fft of |E.sub.R|.sup.2)
(188) For each sweep channel do
(189) Set Lower and Upper bands L1 L2 for useful optical depths (e.g. 10 mm to 150 mm depending on weapon size and orientation). Set Threshold for useful signal level above previously collected values for body alone. From L1 to L2 do Store Signal above Threshold separately in vectors in array1 Integrate Signals above threshold
(190) End do
(191) End do
(192) For each sweep channel do
(193) Correlate adjacent vectors and produce output1
(194) Sum with previous output1's Sum integrated signals above threshold
End do
Output1 is sum of ail correlations between vectors in array1
Output2 is sum of integrated signals above threshold for each sweep channel
Output3 will be different for gun when optical depths change as subject moves in beam than for block of explosive stimulant which is of a similar thickness from different aspects.
Output1 and Output2 are taken to Neural Network input (see
Appendix B.2
(195) Else If (Technique2 (Barrel tone detection)) then
(196) [pseudocode for transformation for Barrel tone detection]
(197) Use Direct Untransformed signals |E.sub.R|.sup.2
(198) For each sweep channel do
(199) For set of weapon calibers do For set of barrel lengths do Calculate onset (f0) for caliber Calculate chirped response for Length L Correlate ideal response cos(2π(f.sup.2−f.sub.0.sup.2).sup.1/2(2L/c)+φ) with data. Store Correlation value End do
(200) End do
(201) Find best (lowest) correlation value and store in Output3
(202) End do
(203) Keep f0 and L and display
(204) Output3 goes to Neural network (see
Appendix B.3
(205) Else if (Technique3 (Cross-polarisation detection)) then
(206) [pseudocode for transformation for Cross-polarisation detection]
(207) Use Complex Fourier Transform signals (E.sub.R) which give range information, from normal and cross polarized detectors
(208) Select Distance1 which is first significant reflection above a threshold (or which is given by an independent range finding sensor)
(209) For each sweep channel do
(210) Apply a distance window of a given number of millimeters determined by database of responses horn weapons. Select trailing edge of response (distance2) by adjusting distance window to when response falls below threshold Integrate response from non-pol detector within window Integrate response from cross-pol detector within window Sum to previous integrations Correlate response from non-pol detector with cross-pot Store and sum correlation
End do
Outputs 4 and 5 are sum of correlations and sum of integrations
Outputs are taken to Neural Network inputs (see
Appendix B.4
(211) Else If (Technique4 (Late time response detection and resonant frequency detection)) then
(212) [pseudocode for transformation for Late time response]
(213) Use Complex Fourier Transform signals (E.sub.R) which give range information, from normal and cross polarized detectors
(214) For each sweep channel do
(215) Select Distance2 which is the output of Technique3 Apply a distance window of a given number of millimeters determined by database of late time responses from weapons. Find the smoothed responses of the late time responses (see
End do
Normalise outputs from the vector and form Output 6
Use Complex Fourier transformed signals (E.sub.R), from normal and cross polarized detectors
For each sweep channel do For the entire sweep data
(216) If response level above a normalised threshold then Apply series of non-linear filters (e.g. MUSIC filter) with filter characteristics taken from a data base to look for a particular resonance Store the magnitude of the resonance Apply a peak detection algorithm (E.G. zero crossing) Store peak locations
(217) End If
(218) End do
(219) For each sweep channel do
(220) Compare peak locations with known natural resonances for object Sum the differences between peak locations and natural resonances from data base. Output7 is sum of differences—to Neural Network.
Keep the peak locations for display, which can indicate weapon type.
End do
End If//End of transformation techniques phase
Appendix C
(221) Task for Differential Evolutionary Program
(222) To minimise the sum of squares error (SSE) between the observed and calculated late time response (LTR), LTR generated from equation
(223)
given in text. For this algorithm POLE indicates frequency, phase shift, decay rate and amplitude. To choose the optimum number of poles by monitoring decrease in SSE after each increase in the number of poles To obtain the optimum LTR data by a SIMULTANEOUS fit of multiple poles unlike the technique of Choi .sup.1et al who find optimum parameters for a SINGLE pole and then extract this from the original data set ITERATIVELY until the desired number of poles is obtained. No criteria are givers for the termination of the iteration.
Algorithm
LOOP L from MINPOLES to MAXPOLES.sup.S
(224) LOOP K from 1 to MAXIMUM NUMBER OP GENERATIONS Create initial random population of solutions LOOP M from 1 to SIZE OF RANDOM POPULATION Calculate observed LTR with L poles according to M.sup.th population data Perform SSE error calculation Store Mth SSE error END of loop M Store minimum SSE error and associated gene Mutate gene pool according to Ref. [2] END OF LOOP K
END OF LOOP L .sup.5Note: MINPOLES typically 2 and MAXPOLES typically 5 NEGLECT POLES WITH VERY SMALL AMPLITUDE NEGLECT POLES WHEN SSE STILL IMPROVING ACCORDING TO A USER DEFINED TOLERANCE STORE OPTIMUM FREQUENCY AND DECAY RATE Don't store AMPLITUDE AND PHASE—not used for eventual weapons classification.
REFERENCES
(225) [1] Natural Frequency Extraction Using Late-Time Evolutionary Programming-Based CLEAN, In-Sik Choi, Joon-Ho Lee, Hyo-Tae Kim, and Edward J. Rothwell IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 51, NO. 12, DECEMBER 2003 [2] Price and Storn 1997 [Journal of Global Optimisation 11, 351-359]