Unattended monitoring of suspicious behavior for route surveillance

Robin Schoemaker, Rody Sandbrink, Graeme van Voorthuijsen, Edward M. Carapezza
2010 Unattended Ground, Sea, and Air Sensor Technologies and Applications XII  
A priori information o n suspicious behaviour is e xtremely valuable for countering threats involving improvised explosive devices (IEDs). Suspicious activities along routes during expeditionary operations can be monitored by unattended networks using simple sensing nodes that can gather data for continuous monitoring of daily vehicle activity. Dedicated software yields the necessary intelligence on these activities by filtering suspicious behaviour from anomalous behaviour (including false
more » ... ms). Research has started to equip a co mmercially available sensor network with data analysis software. I t ai ms at d emonstrating t he d etection o f suspicious behaviour al ong roads , within a requ ired t ime span. T hree phases are distinguished. First phase is the analysis of traffic flux in a simple scenario with three networks lying at three junctions. The second phase investigates the ability to track and classify one object in this scenario, while the third phase aims to track and classify two or more objects. Findings are presented for phase one, flux measurements. Keywords: I ntelligent se nsor n etworks, u nattended g round sen sor n etworks, ab normal an d su spicious b ehaviour, Counter-IED, intelligence gathering, situation awareness, route surveillance. D o w n l o a d e d f r o m S P I E D i g i t a l L i b r a r y o n 2 6 O c t 2 0 1 0 t o 1 3 4 . 2 2 1 . 1 2 8 . 2 2 1 . T e r m s o f U s e : h t t p : / / s p i e d l . o r g / t e r m s Proc. of SPIE Vol. 7693 76930S-2 D o w n l o a d e d f r o m S P I E D i g i t a l L i b r a r y o n 2 6 O c t 2 0 1 0 t o 1 3 4 . 2 2 1 . 1 2 8 . 2 2 1 . T e r m s o f U s e : h t t p : / / s p i e d l . o r g / t e r m s
doi:10.1117/12.850134 fatcat:jq6z3h4qj5e6rbhbkzwf2pgj5q