Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
MILLIMETER WAVE ADVANCED THREAT DETECTION SYSTEM NETWORK
Document Type and Number:
WIPO Patent Application WO/2018/195546
Kind Code:
A1
Abstract:
A method of detecting threats. A threat detection system is provided that includes a controller, a millimeter wave radar, a signature database and a camera. The signature database or machine learning includes time and frequency domain characteristic data for a threat. A signal is emitted by the millimeter wave radar. A return signal is received when the signal bounces off an object. Time and frequency domain characteristic data of the return signal is compared to the signature database or the machine learned characteristics to determine the threat, anomaly, foreign object and material characteristics.

Inventors:
CHILDS TIMOTHY T (US)
ELLER DANIEL C (US)
MANTHA KALYANI (US)
GEDDES JOHN (US)
SAKA MANISH (US)
Application Number:
PCT/US2018/028920
Publication Date:
October 25, 2018
Filing Date:
April 23, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
TLC MILLIMETER WAVE PRODUCTS INC (US)
International Classes:
G01S13/08
Foreign References:
US20090058710A12009-03-05
US20160377712A12016-12-29
US8049659B12011-11-01
Other References:
See also references of EP 3612858A4
Attorney, Agent or Firm:
BONDI, Michael A. (US)
Download PDF:
Claims:
CLAIMS

1. A method of detecting threats comprising:

providing a threat detection system comprising a controller, a millimeter wave radar, a signature database and a camera, wherein the signature database comprises a time and frequency domain characteristic data for a threat;

emitting a signal by the millimeter wave radar;

receiving a retum signal when the signal bounces off an object; and

comparing time and frequency domain characteristic data of the retum signal to the signature database.

2. The method of claim 1, wherein the millimeter wave radar comprises a frequency- modulated continuous-wave radar.

3. The method of claim 1, and further comprising reviewing the threat to confirm the classification.

4. The method of claim 1, and further comprising notifying at least one of public safety and security when the threat is detected.

5. The method of claim 4, wherein the notifying is done using at least one of an electronic transmission, a display, an email, a text message and a telephone call.

6. The method of claim 4, and further comprising transmitting at least one of an identification of the threat, an image of the threat and a location of the threat.

7. The method of claim 1, and further comprising changing a direction in which the signal is emitted by the millimeter wave radar to scan an area for threats.

8. The method of claim 1, wherein the threat detection system scans at frequencies of between about 10 GHz and about 330 GHz.

9. The method of claim 1, wherein the threat detection system processes data associated with the return signals at greater than about 10 Gbps.

10. The method of claim 1, wherein the threat detection system conducts up to about one million scans per second.

11. The method of claim 1, and further comprising obtaining an image of the threat with a camera that is associated with the threat detection system.

12. The method of claim 11, and further comprising directing the camera at the threat to obtain the image of the threat.

13. The method of claim 11, and further comprising analyzing the image to identify the threat.

14. The method of claim 1, wherein the threat comprises at least one of flammables, combustibles, chemicals, drugs, agriculture products, soil and weapons.

15. The method of claim 1, and further comprising utilizing artificial intelligence to review the return signal.

16. The method of claim 1, wherein the threat detection is done in autonomously in realtime.

17. The method of claim 1, and further comprising training the threat detection system prior to using the threat detection system to identify the threat.

18. The method of claim 1, and further comprising automatically engaging an access control device to prevent a person from entering a structure associated with the access control device when the person possesses the threat.

19. The method of claim 1, evaluating at least one of a person and an object that is not in a confined region in a non-individualized manner to determine whether the person and the object possess the threat.

20. A threat detection system comprising:

a controller;

a millimeter wave radar that is capable of emitting a signal and receiving a return signal that bounces off an object;

a signature database that contains time and frequency domain characteristic data for at least one threat, wherein the controller compares the return signal to the time and frequency characteristic data to identify a threat; and

a camera that is directed to the threat and captures an image of the threat. A threat detection system comprising

a controller;

a millimeter wave radar that is capable of emitting a signal and receiving a retum signal that bounces off an object;

a signature database that comprises time and frequency domain characteristic data for at least one threat, wherein the controller compares the return signal to the time and frequency characteristic data to identify a threat; and

an access control device that is associated with a structure, wherein the access control device engages the threat is detected.

Description:
MILLIMETER WAVE ADVANCED THREAT

DETECTION SYSTEM NETWORK

REFERENCE TO RELATED APPLICATION

[0001] This application claims priority to Provisional Applic. No. 62/488,510, filed on April 21, 2017, the contents of which are incorporated herein by reference.

FIELD OF THE INVENTION

[0002] The invention relates generally to a threat detection system. More particularly, the invention relates to millimeter wave threat detection system.

BACKGROUND OF THE INVENTION

[0003] Terrorist attacks of innocent students in schools, citizen in public places

(airports, arenas, religious, dining and recreational areas, etc.) and community assets such as banks, police, post office, job locations and homes have caused local, national and intemational demands for more effective smart security.

[0004] There seems is growing number of disgruntled students and citizens seek terror attention and intemational terrorist groups target to reach US communities, higher level high-tech security systems for the various assets and public gathering areas of our nation and intemational. However, in addition to these conventional threats, the system also detects and communicates a variety of other threats, examples of which include food, health, crops, animals, mechanical systems, facilities, structure degradation and safety. To date there is no viable security system that can unobtrusively detect guns, explosives, or chemicals prior to arrival at a target area. SUMMARY OF THE INVENTION

[0005] The purpose of this technology is to utilize a radar system to automatically detect threats and or other items autonomously in advance, while communicating in real-time to authorized local, national or authorities the threat foreign object anomaly types, location and rate of travel towards a target or important asset.

[0006] This system does not need any human involvement to operate and, as such, is operably at all times. The invention reduces the risk of human error in the critical path of detection threat. The purpose is a remote durable system that virtually eliminates terrorist threats to innocent communities.

[0007] An embodiment of the invention is directed to a method of detecting threats.

A threat detection system is provided that includes a controller, a millimeter wave radar, a signature database and a camera. The signature database includes time and frequency domain characteristic data for a threat. A signal is emitted by the millimeter wave radar. A return signal is received when the signal bounces off an object. Time and frequency domain characteristic data of the return signal is compared to the signature database.

[0008] Another embodiment of the invention is directed to a threat detection system that includes a controller, a millimeter wave radar, a signature database and a camera. The millimeter wave radar is capable of emitting a signal and receiving a return signal that bounces off an object. The signature database contains time and frequency domain characteristic data for at least one threat. The controller compares the return signal to the time and frequency characteristic data to identify a threat. The camera is directed to the threat and captures an image of the threat.

[0009] Another embodiment of the invention is directed to a threat detection system that includes a controller, a millimeter wave radar, a signature database and an access control device. The millimeter wave radar is capable of emitting a signal and receiving a return signal that bounces off an object. The signature database contains time and frequency domain characteristic data for at least one threat. The controller compares the retum signal to the time and frequency characteristic data to identify a threat. The access control device is associated with the structure. The access control device engages when the threat is detected.

BRIEF DESCRIPTION OF THE DRAWINGS

[0010] The accompanying drawings are included to provide a further understanding of embodiments and are incorporated in and constitute a part of this specification. The drawings illustrate embodiments and together with the description serve to explain principles of embodiments. Other embodiments and many of the intended advantages of embodiments will be readily appreciated as they become better understood by reference to the following detailed description. The elements of the drawings are not necessarily to scale relative to each other. Like reference numerals designate corresponding similar parts.

[0011] Fig. 1 is a high level system configuration of an autonomous threat detection security system according to an embodiment of the invention.

[0012] Fig. 2 is a low level sample configuration of Section a in Fig. 1.

[0013] Fig. 3 is a block diagram of radar stationary object.

[0014] Fig. 4 is a top level block diagram of an altera device.

[0015] Fig. 5 is a graph of output from a digital to analog converter module.

[0016] Fig. 6 is a snapshot of Ethernet packet output.

[0017] Fig. 7 is a chart of detected packet data.

[0018] Fig. 8 are frequency and time domain graphs for several objects.

[0019] Fig. 9 are frequency and time domain graphs for several objects.

[0020] Fig. 10 is an illustration of the invention creating a representation of a detected object. [0021] Fig. 11 is a block diagram of a database for use in conjunction with an embodiment of the threat detection system.

[0022] Fig. 12 is a flow diagram of a frequency -modulated continuous wave radar system detecting a reflected signal from an object.

[0023] Fig. 13 is a graph of the frequency -modulated continuous wave radar with transmitted and reflected frequency versus time.

[0024] Fig. 14 is a graph of the frequency-modulated continuous wave radar with a

Doppler shift transmitted and reflected frequency versus time.

[0025] Fig. 15 is an illustration of the threat detection system implemented at a school.

DETAILED DESCRIPTION OF THE INVENTION

[0026] An embodiment of the invention is directed to an autonomous threat detection radar security system network with advanced threat detection, direct control to security camera, ultra-fast communication authorities that can also automatically deny entry to the suspect without the suspect knowing they were scanned. Fig. 1 gives the high level system configuration of the autonomous threat detection radar security system network according to an embodiment of the invention.

[0027] Key features include integrating four innovative technologies areas to develop and implement a millimeter wave security system network that detect and communicate the threat in advance.

[0028] Fig. 2 is the low level sample configuration with section "a" in Fig. 1, indicating the millimeter wave front end with variations of design and integration of patented millimeter wave radar and communications technology including low phase noise signal source (U. S. Patent No. 6,384,691) and/or monolithic integrated transceiver (U. S. Patent No. 8,467,739) and/or phase angle modulator (U. S. Patent No. 6,060,962) and/or monolithic integrated voltage controlled coupled feedback oscillator (U.S. Patent No. 7,068, 115), the contents of which are all incorporated herein by reference.

[0029] These devices all are tested and proven to provide high frequencies from 10 to

110 GHz (to 300+ GHz with multipliers) to transmit and receive signals for scanning and detection threats, foreign objective, material resistivity, contaminants, DNA, anomalies intruders, using various size and configuration radars and transceivers, monolithic microwave integrated circuit and modules as the radio frequency front end of the system with high resolution to detect material, liquid or gas composition, shape, location and velocity that can continually scan an area, food, facility, conceal enclosures, vehicle, vessel, pipe, ground, animal or human fluids or similar over 1 million scan per second.

[0030] Ultra-high speed signal processing such as greater than about 10 Gbps can also be used such as illustrated in Section b of Fig. 1. That technique is developed and integrated into ultra-high speed data processing that can process continual streaming of real time data inputs with no delays when integrated to millimeter wave transmit and received versus and audio to digital converter.

[0031] Signature database and matching software can also be used such as illustrated in Section c of Fig. 1. This aspect develops and integrates with the millimeter wave radar and ultra-high speed signal processing sonic algorithm programming that match threat signal to their unique signature profile in the system database. Similar to finger printing, eye recognition or internet search matching to a known profile in the database.

[0032] Ultra-high speed millimeter wave communication network can also be used such as illustrated in Section d of Fig. 1. This aspect includes using millimeter wave components and transceivers system as transceiver (U.S. Patent No. 8,467,739) and/or phase angle modulator (U. S. Patent No. 6,060,962) and/or monolithic integrated voltage controlled coupled feedback oscillator (U. S. Patent No. 7,068, 1 15).

[0033] These systems include fiber optic converter, fiber optics, satellite modems, high speed router and/or repeaters to communicate from various front scanners to the signal processing as well the resulting signal processing and data match information indicators to the phones, computers, tablets via millimeter wave frequency directly or downloaded to wireless networks or fiber network or via to satellite the system resulting voice, data, video at high speed greater up to and beyond 50 Gbps speed to authorized personnel and centers.

[0034] These four preceding technologies are integrated into a reliable durable system feeding into a millimeter wave mixed media communications network for millimeter wave detection systems system.

[0035] This proven millimeter wave capability is to be combined with advanced signal processing and threat signature recognition to be outlined in the design and implementation section. The system can continually scan throughout the school for internal and external threats. Fig. 15 illustrates the threat detection implemented in conjunction with a school. The system can lock doors of the school to deny suspect entrance when a threat is detected proximate the school. The system also includes a control camera to continual stream video to public safety of location and activities in real time.

[0036] Examples of public safety include police, security and military. An important aspect of the invention is for the scanning and detection being done without the suspect being aware of the detection. This process enhances the ability of the public safety to neutralize the threat for police to scan vehicles that they pull over before approaching the vehicle. The invention thereby enables persons to be evaluated for possessing threats in a non- individualized manner by which each person, facility and vehicle is separately scanned before entering an area. [0037] The invention has multiple modes of operation. For detection, identification, tracking, monitoring and locating, the scan rate may be greater than about 1 million scans/sec. For communication (voice, data and video) at data rates, the scan rate may be greater than about 50 Gb/sec.

[0038] The radar used in conjunction with the invention can range over a wide range of sizes from micro single chip dual radar transceiver having a size of less than 3 millimeters by 9 millimeters to larger 360 degree rotating domes radars.

[0039] Utilizing millimeter wave radars having a large variety of sizes allows coverage of nearly any distance range utilizing a range of millimeter wave frequency desired. The coverages can range from less than one meter to more than one kilometer. When the miniature millimeter wave repeaters are utilized, a detection and communication network can cover an entire city while the presence of which may be difficult to see.

[0040] Using the capabilities outlined above, the invention can provide early threat identification and communication. Once a threat is identified, the system communicates to the camera to perform a detailed re-investigation of the threat to reconfirm findings as well as search for other indicators such as trigger, a bullet magazine, a pull pin, fuse, a lighter, a wick, a scope, keypad, etc. The image of the suspect can also be used to obtain personal information on the suspect.

[0041] Once the threat has been re-verified, the system can implement lock down of the impacted area and then transfer the information to the appropriate authorities. The millimeter wave threat detection system network can be set up in a variety of configurations. For example, long range radars (larger radar-node) can be placed in a high inconspicuous position (i.e. roof, towers, etc.). Smaller or microscopic units can be above the entry doors and micro units along the path ways in the lights, etc. [0042] The system network may include overlapping coverage of all angles for a match to the threat signatures, as the public moves a normal manner unaware of the monitoring. All nodes are connected to the security network processing center with trigger to connect to local authorities (police) and/or national authorities (Department of Homeland Security and FBI). The system can also provide notification to persons associated with the area being monitored such as building management and security.

[0043] This threat identification and location information can also be accompanied with other information such as a picture of suspects, eye/facial recognition results, license plates, and other descriptors in the automatically notification to authorities. This notification is done in a relatively short period of time such as less than about one minute. In other embodiments, the notification is done in less than about 10 seconds. Such rapid notification may be done without the suspect being aware of the detection.

[0044] Fig. 2 is the low level configuration that is to interface with an ultra-high speed signal process system. Fig. 2 is configured such as for school radar that can scan up to 0.5 miles away. However, the software development with signal process and database management development must be compatible to continually intake the radar signal at greater than about 1 million scan packet per second.

[0045] The field-programmable gate array has been an integral part of the invention due to its ability to enable higher integration, higher performance and increased flexibility to implement any mathematical function.

[0046] The field-programmable gate array is introduced in the low level configuration because of the speed of data processing must be very high to handle huge sampled data stream at higher clock frequency. Many dedicated functions and IP core are available for direct implementation in a highly optimized form within the field-programmable gate array. [0047] A top level block diagram of detection of a stationary object from radar is set forth in Fig. 3. The input to the design is IF signal from the range tapper filter which is less than or equal to 100 KHz, 4V p-p. This analog signal is received by analog-to-digital converter module to convert the analog input form to digital form, and then the fast Fourier transform is applied on that obtained digital data to get the frequency information of the input data, i.e., to find out the stationary object information. The result of this process is sent out such as using an Ethernet cable. A triangular waveform is generated by digital to analog converter module of 10 milliseconds. A person of skill in the art will appreciate that it is possible to use other mechanisms to transmit the data such as wireless.

[0048] FFT: The fast Fourier transform is performed on the digital data available after the RAM memory. The fast Fourier transform output gives the frequency information of the data.

[0049] ADC: The analog-to-digital converter module is instantiated using an IP core.

The analog-to-digital converter solution consists of Hard IP blocks in the MaxlO and soft logic through an Altera modular analog-to-digital converter IP core. It translates the analog quantity into to digital data.

[0050] Ethernet MAC Core: Altera Triple speed Ethernet consists of a 10/100/1000

Mbps Ethernet MAC IP. This IP function enables Altera field-programmable gate array to interface to an external PHY device which, in turn interfaces to the Ethernet network. Max 10 field-programmable gate array board uses a RGMII interface.

[0051] DAC: Control of 16 bit digital to analog converter module (DAC8551) through SPI on Altera MAX10 Starter Kit (24 bit mode), output voltage 0.25 V @ 2.5 V reference voltage. Can be up to 5 V with another reference voltage.

[0052] PLL: It is a frequency control system that generates an output clock by synchronizing itself to an input clock. The phase lock loop module compares the phase difference between the input signal and the output signal of a voltage controlled oscillator module.

[0053] The triple speed Ethernet IP Core, which is illustrated in Fig. 4, compiles with

IEEE 802.3 standard. The analog-to-digital converter details used here is mentioned above. Table 1 includes the parameters taken in the analog-to-digital converter setting. The analog- to-digital converter computation takes approximately 50 clicks to generate every output. The analog-to-digital converter output samples are obtained for every 1 MHz click (1 μβ), which transmits 1 million samples per second.

Table 1

[0054] To control analog-to-digital converter and to take the analog-to-digital converter data, there is a component added, which has a master and a slave. It has an Avalon master to control analog-to-digital converter and it has a section which has Avalon streaming sink to receive the analog-to-digital converter data.

[0055] The Altera function IPcore may be used to convert the unsigned numbers to single precision floating point 32 bit values. The latency of this IP core is 8 clicks. The output from this module is given as an input to the DPRAM. [0056] The DPRAM (dual port RAM) may use altdpram IP core. This RAM is used because the input to the fast Fourier transform should be in a continuous form but the output of the analog-to-digital converter comes in a single clock basis (which is not continuous). The DPRAM is used so that the writing is done slowly but reading is done simultaneously and given as input to the fast Fourier transform module. The input may be in single precision floating point value.

[0057] The fast Fourier transform is set forth in Table 2.

Table 2

[0058] There are options used in the MAC Core configurations such as 10/100/1000

Ethernet Mac; RGMII Interface; and use of internal FIFO. MAC options include enable 10/100 half duplex support; statistics counter. FIFO options include width: 32 bits; depth: transmit -1024x32 bits and receive - 64x32 bits.

[0059] Control of 16 bit digital to analog converter module (DAC8551) may be through SPI on Altera MAX10 Starter Kit (24 bit mode), output voltage 0.25 V @ 2.5 V reference voltage but can be up to 5V with another reference voltage. Output of the digital to analog converter module is set forth in Fig. 5.

[0060] Calculation to generate the triangular waveform include output voltage =

(PATTERN / 65536) * Vref = (PATTERN / 65536) * 2.5V. Max output: 2.5V.

[0061] The designs may be verified by the vectors generated in the Matlab model designs individually. Simulink designs may be used for creating the analog-to-digital converter module and the fast Fourier transform module. A snap shot of the wireshark receiving Ethernet packet is set forth in Fig. 6. An example of the packet is set forth in Fig. 7. A snap shot of the Matlab Code is set forth below.

y = fft(sampled_and_quantized_sine,8); % sampled and quantized sine:

ADC value str = dec2bin(sampled_and_quantized_sine, 12) where % converts dec to bin with 12 bit width.

[0062] The frequency and time domain graphs for various stationary objects, examples of which include gun, explosive materials are set forth in Fig. 8.

[0063] Fig. 9 provides sample test results of the threat detection system being developed for school safety. The threat detection system can also be used in conjunction with other types of buildings and/or locations.

[0064] For example, the threat detection system may be used at airports to evaluate each of the persons and objects. Because of the nature of the invention, the persons do not need to remove obj ects from their bodies so that the objects can be scanned separately from the scanning of their bodies.

[0065] The threat detection system greatly decreases the time for authorities to scan for threats using current technology. The threat detection system thereby enhances the experience of the persons at the airport because the persons are subject to less inconvenience, but at the same time providing an enhanced level of security to ensure that the persons, the airport and the airplanes are safe.

[0066] These concepts can also be adapted for other structures such as government buildings, theatres and sports stadiums. The advantages are more significant for scanning persons and objects that are not in an enclosed region such as a building. For example, persons who are gathering for a large outdoor event can be evaluated for threats without the need for erecting barriers that require individual persons to be individually scanned for threats prior to accessing the outdoor event. For example, presidential inaugurations have drawn more than one million people to the National Mall in Washington, D.C. The nature of these types of events make them targets for terrorism and the size of these events make it impractical to individually scan each of the attendees for potential threats using currently available technology.

[0067] As an example of detection of drugs, agriculture, soil or other item or ingredients type nature provided is a quick 10 second sample testing that shows the distinct signature between barley (gluten) and oats seeds.

[0068] As an example of detection flammables/combustible, Fig. 9 includes 10 second scan of gasoline. For example of chemical (as can be use in an explosion), Fig. 9 includes a 10 second scan signature of Methanol.

[0069] Conventional weapons such as guns, rifles, knives of various metals can be detected in numerous ways. The invention can also do material signature, shape and key features (trigger, etc. and metallic color code. When the system is trained by scanning a particular object, the accuracy greatly increases. For example, the training can increase the accuracy to about one million points as compared to about 8,000 points when the system is not trained on the particular object. The invention can also be used in conjunction with evaluating metal, construction, bridge, and other materials fatigue due to oxidation, wear and tear and deterioration detection.

[0070] Examples of solutions in which the threat detection system may be implemented include border protection, communications, financial services, critical manufacturing, mass events, water and waste treatment systems, commercial facilities, information technology, transport systems, defense industrial base, law enforcement, defense, health and public healthcare, nuclear reactors, materials and waste, food and agriculture, chemical and pharmaceuticals, emergency services and government facilities. [0071] The computer vision tool box is used efficiently to represent the interesting parts of the detected object through radar. This method is used because it is quick in completing the comparison algorithms such as, image matching and retrieval. An algorithm is used for detecting a specific object based on finding point matching between the reference and the target image. The invention may utilize deep learning techniques that automatically learn useful feature representation directly from the image data/heat maps.

[0072] Data collection is one of the crucial parts in developing radars at TMPS. A large amount of data has to be collected to improve the quality of the radar systems especially when it comes to developing artificial intelligence and machine learning algorithms. Databases and file storage servers are used to store, manage and analyze data.

[0073] As shown in Fig. 11, block diagram DDL scripts, DML scripts, SQL Queries,

ETL codes are written to create/drop objects and manipulate the data as needed on the database (disk storage). A database management system is responsible for accessing data, inserting, updating, and deleting data, security, integrity, facilitated by locking, logging, application-defined rules, including triggers, supporting batch and on-line programs, facilitating backups and recoveries, optimizing performance, maximizing availability, maintaining the catalog and directory of database objects, managing the buffer pools and acting as an interface to other systems programs.

[0074] Supporting user interface packages, such as the popular SQL interface for relational database systems. Using databases reduces data redundancy, reduces updating errors and increases consistency, greater data integrity and independence from applications programs, improved data security, reduces data entry, storage and retrieval costs.

[0075] The signature values are stored and indexed on the database (generated by field-programmable gate array). In the process of detecting a material using the radar, the signature values generated by field-programmable gate array are matched with the database and the additional information related to the match is retrieved and is passed on to the next application like image generator. Databases are usually organized into one or more tables. Sound or image files are stored on file storage servers and the location of the files are stored and indexed on the database.

[0076] A combination of databases/big-data and machine leaming algorithms is considered as the best approach in developing TMPS radars. Machine learning takes a major role in analyzing the incoming data and identifying the objects.

[0077] Complex algorithms are written to learn from data and make data-driven predictions and decisions. Algorithms are written to model complex relationships between input and outputs and to find patterns in data. During machine leaming process, the database that is built to store the radar scans of any given object is used as the data for the algorithm to learn, analyze and identify the patterns. The more data, the more the accuracy in identifying an object. Computer code languages like Python, R, C++, Java, etc. are used in creating machine leaming algorithms.

[0078] Steps involved in developing radar machine leaming algorithms are data processing, regression, classification, clustering, artificial neural networks (deep leaming), reinforcement learning, etc.

[0079] Data processing is part of machine leaming where the data is formatted to make it consistent, reducing the amount of data that is provided for machine learning (using attribute sampling, record sampling, aggregating, etc.), cleaning up on missing values which can tangibly reduce prediction and detection accuracy, rescaling data, etc.

[0080] Classification is an algorithm to answer binary yes-or-no questions (like threat or no threat, good or bad, armed or unarmed) or to make a multiclass classification (like grass, trees, or bushes; cats, dogs, or birds etc.). The data provided must be labeled so that the algorithm can learn from the data. [0081] Clustering is an algorithm to find the rules of classification and the number of classes. Regression is an algorithm to yield some numeric value. For example, if too much time is spent coming up with the right price for a product, since it depends on many factors, regression algorithms can aid in estimating this value.

[0082] Artificial neural networks systems "learn" (i.e. progressively improve performance on) tasks by considering examples, generally without task-specific programming. For example, in image recognition, the systems might learn to identify images that contain cats by analyzing example images that have been manually labeled as "cat" or "no cat" and using the results to identify cats in other images. The systems do this without any a priori knowledge about cats, e.g., that they have fur, tails, whiskers and cat-like faces. Instead, the systems evolve their own set of relevant characteristics from the leaming material that they process.

[0083] Reinforcement leaming is concerned with how an agent ought to take actions in an environment so as to maximize some notion of long-term reward. Reinforcement learning algorithms attempt to find a policy that maps states of the world to the actions the agent ought to take in those states.

[0084] The invention is based on using unique millimeter wave frequency profiles of the various threat types (guns, explosives, chemicals, fertilizer, etc.) in the system stored database. The radar, signal processing, database management and communication operation has to be managed autonomously this required software/hardware special interface.

[0085] The millimeter frequency-modulated continuous -wave radar uses a combination of imaging and signal characteristic matching technology for target and threat detection. The first system, imaging, requires the beam of the radar be moved over a targeted area by sending command to the servo controller. [0086] This controller receives these commands over the standard USB interface found on most consumer and commercial grade PC hardware. The serial commands are issued using custom software written in Obj ect Pascal using Code Typhon IDE. This software is also responsible in retrieving and display the radar image. To achieve this, the custom radar software may act as a supervisor for the complete radar system.

[0087] First, the program sends a command to the commercial program spectrum laboratory to obtain a fast Fourier transformation array of 2048 floating point number data. The spectrum laboratory in turn will make a request to a standard sound card (or field- programmable gate array) to retrieve one million 16-bit analog-to-digital converter samples.

[0088] These samples are then converted to the fast Fourier transformation array that is sent to the radar supervisor program. Once these 2048 floating point numbers are in the memory buffer of the supervisor program, it scales and converts these to intensity values useful for displaying. After all values have been converted, they are displayed sequentially column after column from left to right until the screen is filled with a visible image.

[0089] This image is then compared to a known image of a target. The next step may use software from Matrox Imaging to pattern match the images to verify a match has been made. If no match is found, the process repeats. In the event a match is found, the software will issue a custom alert such as displaying a message on the screen, displayed with 3D software from Fastprotect or a message is sent to the user. An e-mail or text message may also be sent to dispatch. The notification can also be made by a telephone call.

[0090] The second matching technology uses the same custom radar superior program as the imaging system but matches the signal characteristic. The process is similar to the imaging system with the supervisor program starting the process. In this system a direct analog-to-digital converter is made from either the sound card or field-programmable gate array and one million 16-bit analog-to-digital converter samples are taken. [0091] These values are then fed into a commercial program Matlab. Using custom scripts, this data is processed and checked for special signatures in the characteristic. These signatures are than matched to known signatures of a threat and if a match is found, a message is displayed on the screen of the user. An e-mail or text message may also be sent to dispatch.

[0092] The third matching technology uses a machine learning algorithm provided by a third party. This software analyzes the wave partem of the radar return and breaks the complete scan into smaller signal clusters that are matched to several known radar return clusters and a statistical analysis is preformed to determine how close the known target clusters are to the unknown target cluster. A trigger threshold is set that when the probability of a good match is found a message is sent to notify the appropriate individual(s) to remove the threat.

[0093] The millimeter radar is a type frequency modulated continuous wave design.

The entire radio frequency front-end may be synchronized by a single local oscillator around 9 GHz. This frequency may be ramped up and down in a triangle waveform partem at 100 Hz generated from a lab.

[0094] If the field-programmable gate array is used, a driver circuit may be used to convert the 0 to 3.3 v output to the required 0 to +15 v range of the voltage controlled coupled feedback oscillator. This 9 GHz signal is then multiplied and filtered to the required output frequency. This radio frequency signal is fed to an antenna. For shorter range, the antenna may be a horn antenna. For longer range sensing, the antenna may be a lens type antenna.

[0095] The signal leaves the radar, bounces from the target and returns at the speed of light. This signal is then mixed with the same local oscillator signal used to transmit the original signal. Since this signal has now slightly moved from the 100 Hz ramp, a small signal shift will occur. This difference indicates the distance from the sensor to the target. For example, if the target is near the sensor and the radar operates at 70 GHz to 75 GHz and the initial frequency was exactly at 70 GHz when it hits the target and returns to the radar which already has increased now to 70.1 GHz the output would be 0.10 GHz.

[0096] If the target were farther away, the delay returning to the radar would be longer and the shift would be wider to 0.20 GHz or greater depending on the range. This output difference signal or intermediate frequency signal is then amplified and sent to the analog-to-digital converter of either a standard PC sound card or analog-to-digital converter controlled and captures by field-programmable gate array for digital signal processing.

[0097] The entire radar front-end may be mounted on a motion controlled chassis.

This chassis may be manipulated by two high-precision servo motors that are driven by a pulse width modulation control board by Pollo-U Technologies. Serial commands are sent over the standard universal serial bus either from a standard PC or field-programmable gate array to set the position of the radar. The miniaturized nano version of the radar may use a multipurpose MINT chip.

[0098] This chip includes the voltage controlled oscillator operating in the range from

23.3 GHz to 25.0 GHz that feeds a 3x multiplier creating the necessary 70 GHz to 75 GHz range that drives both the transmit and receive channels. The MINT chip also includes both the transmit and receive amplification and mixing stages to generate the intermediate frequencies resulting from the detected target(s).

[0099] The threat detection sensor uses frequency-modulated continuous-wave radar technology to sense and identify unknown objects. Commonly this type of radar is used to determine range and velocity of a target object. Our approach expands the signal processing to include more subtle characteristics of the return signal related to the shape of the object and its material composition. [00100] The incorporated frequency-modulated continuous -wave radar continually transmits a microwave frequency that varies with time. Typically the frequency variation is linear changing from Fi ow to F h i gh over a time period T and then reversing direction varying from F h i gh to F tow over the same length of time. The transmitted signal is reflected by a target and returns to the radar receiver after a time delay Td that is determined by the round trip travel time of the microwave signal from the radar to the target and back.

[00101] Since the microwave signal travels at the speed of light the time delay is: Td = 2R/c. Where R is the range to the target and c is the speed of light. The retum signal is then mixed with the signal being transmitted at the time the signal retums producing an IF or beat frequency signal at a frequency:

Fif = (FMgh - Flow) *(Td/T)

[00102] Using the relationship between Td and R we can show:

R = (Fif /(Fhi g h - Fi ow ))*(Tc/2)

[00103] So there is a direct relationship between IF frequency and range to the target.

As an aid in visualizing the frequency-modulated continuous-wave radar process a block diagram of a typical radar system and plots of frequency versus time are shown in Figs. 13 and 14.

[00104] Fig. 13 illustrates a frequency -modulated continuous -wave radar system detecting reflected signal from object. Fig. 14 illustrates frequency-modulated continuous- wave radar transmitted and reflected frequency versus time.

[00105] In the case of a moving target the frequency of a retum signal is shifted by

Doppler shift as well as the range delay. If the target is moving towards the radar transceiver the frequency is increased by the Doppler shift. If it is moving away, the frequency is decreased. The Frequency of the Doppler shift is:

Fd = F rf *V/c [00106] Where Fr f is the frequency of the radio frequency signal and V is the velocity of the target.

[00107] During the period when the frequency is increasing from Fi ow to Fhigh, the

Doppler frequency shift lowers the intermediate frequency so:

F if = (Fhigh- Flow) *(Td/T) - F d

[00108] During the period when the frequency is decreasing from Fhigh to F low , the

Doppler frequency increases the intermedia frequency so:

F if = (FMgh- Flow) *(Td/T) + Fd

[00109] By looking at the intermediate frequency difference between the upsweep and downsweep the range and velocity can be solved for separately. In addition to these basic measurements, the approach will use signal processing algorithms that look more closely at the time and frequency domain characteristics of the return signals to identify potential threat objects. One example of more advanced signal processing is the use of synthetic aperture radar frequency-modulated continuous-wave. The approach is based on a new approach matching signal returns to templates stored in a database.

[00110] In the preceding detailed description, reference is made to the accompanying drawings, which form a part hereof, and in which is shown by way of illustration specific embodiments in which the invention may be practiced. In this regard, directional terminology, such as "top," "bottom," "front," "back," "leading," "trailing," etc., is used with reference to the orientation of the Figure(s) being described. Because components of embodiments can be positioned in a number of different orientations, the directional terminology is used for purposes of illustration and is in no way limiting. It is to be understood that other embodiments may be utilized and structural or logical changes may be made without departing from the scope of the present invention. The preceding detailed description, therefore, is not to be taken in a limiting sense, and the scope of the present invention is defined by the appended claims.

[00111] It is contemplated that features disclosed in this application, as well as those described in the above applications incorporated by reference, can be mixed and matched to suit particular circumstances. Various other modifications and changes will be apparent to those of ordinary skill.