Share Email Print
cover

Proceedings Paper

Unattended monitoring of suspicious behavior for route surveillance
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

A priori information on suspicious behaviour is extremely valuable for countering threats involving improvised explosive devices (IEDs). Suspicious activities along routes during expeditionary operations can be monitored by unattended networks using simple sensing nodes that can gather data for continuous monitoring of daily vehicle activity. Dedicated software yields the necessary intelligence on these activities by filtering suspicious behaviour from anomalous behaviour (including false alarms). Research has started to equip a commercially available sensor network with data analysis software. It aims at demonstrating the detection of suspicious behaviour along roads, within a required time span. Three phases are distinguished. First phase is the analysis of traffic flux in a simple scenario with three networks lying at three junctions. The second phase investigates the ability to track and classify one object in this scenario, while the third phase aims to track and classify two or more objects. Findings are presented for phase one, flux measurements.A priori information on suspicious behaviour is extremely valuable for countering threats involving improvised explosive devices (IEDs). Suspicious activities along routes during expeditionary operations can be monitored by unattended networks using simple sensing nodes that can gather data for continuous monitoring of daily vehicle activity. Dedicated software yields the necessary intelligence on these activities by filtering suspicious behaviour from anomalous behaviour (including false alarms). Research has started to equip a commercially available sensor network with data analysis software. It aims at demonstrating the detection of suspicious behaviour along roads, within a required time span. Three phases are distinguished. First phase is the analysis of traffic flux in a simple scenario with three networks lying at three junctions. The second phase investigates the ability to track and classify one object in this scenario, while the third phase aims to track and classify two or more objects. Findings are presented for phase one, flux measurements.

Paper Details

Date Published: 7 May 2010
PDF: 10 pages
Proc. SPIE 7693, Unattended Ground, Sea, and Air Sensor Technologies and Applications XII, 76930S (7 May 2010); doi: 10.1117/12.850134
Show Author Affiliations
Robin Schoemaker, TNO Defence, Security and Safety (Netherlands)
Rody Sandbrink, TNO Defence, Security and Safety (Netherlands)
Graeme van Voorthuijsen, TNO Defence, Security and Safety (Netherlands)


Published in SPIE Proceedings Vol. 7693:
Unattended Ground, Sea, and Air Sensor Technologies and Applications XII
Edward M. Carapezza, Editor(s)

© SPIE. Terms of Use
Back to Top