7 May 2010 Unattended monitoring of suspicious behavior for route surveillance
Author Affiliations +
Abstract
A priori information on suspicious behaviour is extremely valuable for countering threats involving improvised explosive devices (IEDs). Suspicious activities along routes during expeditionary operations can be monitored by unattended networks using simple sensing nodes that can gather data for continuous monitoring of daily vehicle activity. Dedicated software yields the necessary intelligence on these activities by filtering suspicious behaviour from anomalous behaviour (including false alarms). Research has started to equip a commercially available sensor network with data analysis software. It aims at demonstrating the detection of suspicious behaviour along roads, within a required time span. Three phases are distinguished. First phase is the analysis of traffic flux in a simple scenario with three networks lying at three junctions. The second phase investigates the ability to track and classify one object in this scenario, while the third phase aims to track and classify two or more objects. Findings are presented for phase one, flux measurements.A priori information on suspicious behaviour is extremely valuable for countering threats involving improvised explosive devices (IEDs). Suspicious activities along routes during expeditionary operations can be monitored by unattended networks using simple sensing nodes that can gather data for continuous monitoring of daily vehicle activity. Dedicated software yields the necessary intelligence on these activities by filtering suspicious behaviour from anomalous behaviour (including false alarms). Research has started to equip a commercially available sensor network with data analysis software. It aims at demonstrating the detection of suspicious behaviour along roads, within a required time span. Three phases are distinguished. First phase is the analysis of traffic flux in a simple scenario with three networks lying at three junctions. The second phase investigates the ability to track and classify one object in this scenario, while the third phase aims to track and classify two or more objects. Findings are presented for phase one, flux measurements.
© (2010) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Robin Schoemaker, Robin Schoemaker, Rody Sandbrink, Rody Sandbrink, Graeme van Voorthuijsen, Graeme van Voorthuijsen, } "Unattended monitoring of suspicious behavior for route surveillance", Proc. SPIE 7693, Unattended Ground, Sea, and Air Sensor Technologies and Applications XII, 76930S (7 May 2010); doi: 10.1117/12.850134; https://doi.org/10.1117/12.850134
PROCEEDINGS
10 PAGES


SHARE
Back to Top