Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SYSTEMS AND METHODS FOR IDENTIFYING THREATS AND LOCATIONS, SYSTEMS AND METHOD FOR AUGMENTING REAL-TIME DISPLAYS DEMONSTRATING THE THREAT LOCATION, AND SYSTEMS AND METHODS FOR RESPONDING TO THREATS
Document Type and Number:
WIPO Patent Application WO/2018/148316
Kind Code:
A1
Abstract:
Systems for identifying threat materials such as CBRNE threats and locations are provided. The systems can include a data acquisition component configured to determine the presence of a CBRNE threat; data storage media; and processing circuitry operatively coupled to the data acquisition device and the storage media. Methods for identifying a CBRNE threat are provided. The methods can include: determining the presence of a CBRNE threat using a data acquisition component; and acquiring an image while determining the presence of the CBRNE threat. Methods for augmenting a real-time display to include the location and/or type of CBRNE threat previously identified are also provided. Methods for identifying and responding to CBRNE threats are provided as well.

Inventors:
DONAHUE SCOTT (US)
WALKER JEREMY (US)
MILKE JESSICA (US)
ROBOSKY JASON (US)
Application Number:
PCT/US2018/017269
Publication Date:
August 16, 2018
Filing Date:
February 07, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
FLIR DETECTION INC (US)
International Classes:
G09G5/00
Foreign References:
US20080240578A12008-10-02
US20130034268A12013-02-07
US20160354812A12016-12-08
Other References:
None
Attorney, Agent or Firm:
HYTA, Robert, C. (US)
Download PDF:
Claims:
CLAIMS

1. A system for identifying threat materials and locations, the system comprising:

a data acquisition device configured to determine the presence of a threat material;

image storage media; and

processing circuitry operatively coupled to the data acquisition device and the image storage media, the processing circuitry

configured to display real-time images depicting a location of the threat material determined by the data acquisition device.

2. The system of claim 1 wherein the data acquisition device is an analytical instrument comprising one or more of chemical, biological, radiological, explosives, drugs, and/or narcotics detectors.

3. The system of claim 1 wherein the data acquisition device is an image acquisition device configured as a disclosure spray detector.

4. The system of claim 3 wherein the image acquisition device comprises a video recording device.

5. The system of claim 1 wherein the image storage media comprises both real and augmented images.

6. The system of claim 5 wherein the real and augmented images are stored separately from one another within the image storage media.

7. A method for identifying a threat material, the method comprising:

determining the presence of threat material using a data acquisition component;

acquiring an image while determining the presence of the threat material;

associating the location of the presence of the threat material with a portion of the recorded image using processing circuitry;

altering the image to depict the location of the threat material using processing circuitry; and

displaying the image depicting the location of the threat material.

8. The method of claim 7 wherein the threat material is chemical threat and the determining the presence of the chemical threat comprises mass analysis.

9. The method of claim 7 wherein the threat material is chemical threat and the determining the presence of the chemical threat comprises disclosure spray analysis.

10. The method of claim 7 wherein the recording an image comprises storing live images in image storage media.

11. The method of claim 7 wherein the associating the location of the presence of the threat material with a portion of the recorded image comprises:

marking individual recorded images with a location identifier using processing circuitry; and

marking analytical data indicating the presence of threat material with the location identifier using processing circuitry; and associating tagged individual recorded images and tagged analytical data with like location markings using processing circuitry.

12. The method of claim 11 wherein the altering the image to depict the location of the threat material comprises altering at least a portion of the associated marked individual recorded images.

13. The method of claim 12 further comprising storing the altered images separately from the original images.

14. The method of claim 13 wherein the displaying the image depicting the threat material comprises retrieving one or more altered images from storage.

15. A method for augmenting a real-time display to include the location and/or type of threat material previously identified, the method comprising:

acquiring an image and storing the image on storage media; augmenting the image upon determining the presence of the threat material using processing circuitry; and

storing the augmented image on the storage media.

16. The method of claim 15 wherein the acquiring the image comprises scanning a field.

17. The method of claim 16 wherein the field comprises a room.

18. The method of claim 16 wherein the augmenting the image comprises determining the presence of the threat material.

19. The method of claim 18 wherein the determining the presence of the threat material comprises using processing circuitry to:

prepare a mask of an acquired image;

segment the acquired image; and

compare the segmented images to determine the presence of a threat material.

20. The method of claim 19 further comprising applying object filters to segmented images indicating the presence of a threat material.

21. The method of claim 20 further comprising generating an augmented reality tag for the image

22. The method of claim 21 wherein the augmented reality tag augments the image to display a color masking a portion of the image.

23. The method of claim 22 further comprising associating the augmented reality tagged image with the field.

24. A method for identifying and responding to threat materials, the method comprising:

acquiring an image;

processing the image to tag one or more features of the image and form a tagged image using processing circuitry; and

detecting a threat material and associating the threat material with the tagged image using processing circuitry.

25. The method of claim 24 further comprising using the

processing circuitry to augment the tagged image to indicate the presence of the threat material.

26. The method of claim 24 further comprising using the

processing circuitry to augment another image to indicate the

presence of the threat material.

27. The method of claim 26 wherein the other image is a map.

28. The method of claim 24 further comprising using the

processing circuitry to automatically remove the threat material.

29. The method of claim 24 fu rther comprising prepari ng a three- dimensional depiction of the image.

30. The method of claim 29 wherei n the threat material is associated with a portion of the three-dimensional depiction of the image.

Description:
Systems and Methods for Identifying Threats and Locations, Systems and Method for Augmenting Real-Time Displays Demonstrating the Threat Location, and Systems and Methods for

Responding to Threats

CLAIM FOR PRIORITY

This application claims priority to United States Provisional Patent Application Serial Number 62/456,007 filed February 7, 2017, entitled "Personal Imaging Device for Detecting and Confirming Threat with Mapping and Augmented Recall Capability", the entirety of which is incorporated by reference herein.

TECHNICAL FIELD

The present disclosure relates to threat material detection such as CBRNE threat detection, identification, image augmenting to reflect CBRNE threats, mapping and networks to provide same.

BACKGROUND

Personnel deal with weapons of mass destruction (WMD) CBRNE and chemical, biological, radiological, nuclear and explosive (CBRNE) threats such as lED's, nerve CBRNEs, opioids, etc. throughout our society at almost all levels. Warfighters and first responders seemingly are consistently put in situations wherein knowledge of the presence of these threats or past presence would be extraordinarily beneficial. The present disclosure provides systems for identifying and mapping CBRNE-WMD or CBRNE threats and locations as well as augmenting real-time displays to display the location and/or type of CBRNE threat, as well as methods for decontaminating materials and personnel that have been identified as exposed to CBRNE threats. SUMMARY OF THE DISCLOSURE

Systems for identifying threat materials such as a CBRNE threat and locations are provided. The system can include a data acquisition component configured to determine the presence of threat material; data storage media; and processing circuitry operatively coupled to the data acquisition device and the storage media, the processing circuitry configured to display real-time images depicting a location of threat material determined by the data acquisition component. Methods for identifying threat material such as CBRNE threat are provided. The methods can include: determining the presence of a threat material using a data acquisition component; acquiring an image while determining the presence of the threat material; associating the location of the presence of the threat material with a portion of the acquired image; altering the image to depict the location of the threat material; and displaying the image depicting the location of the threat material.

Methods for augmenting a real-time display to include the location and/or type of threat materials such as a CBRNE threat previously identified are also provided. The methods can include: acquiring an image and storing the image on storage media; augmenting the image upon determining the presence of threat materials; and storing the augmented image on the storage media.

Methods for identifying and responding to threat materials such as CBRNE threats are provided as well. The methods can include: acquiring an image; processing the image to tag one or more features of the image to prepare a tagged image using processing circuitry; and detecting threat material and associating the threat material with the tagged image using processing circuitry. DRAWINGS

Fig. 1 is a system for identifying threat materials such as CBRNE threats according to an embodiment of the disclosure.

Fig. 2 is another system for identifying threat materials such as CBRNE threats according to an embodiment of the disclosure.

Fig. 3 is a system for identifying threat materials such as CBRNE threats and displaying same according to an embodiment of the disclosure.

Fig. 4 is another system for identifying threat materials such as CBRNE threats and displaying same according to an embodiment of the disclosure.

Fig. 5 depicts displays of tagged images according to an embodiment of the disclosure.

Fig. 6 depicts displays of tagged and augmented images according to an embodiment of the disclosure.

Fig. 7 is a display of a processed image according to an embodiment of the disclosure.

Fig. 8 is a display of an image processing series according to an embodiment of the disclosure. Fig. 9 is a process for processing images according to an embodiment of the disclosure.

Fig. 10 is a process for detecting threat materials such as a CBRNE threat using acquired images and processing same.

Fig. 11 is a series of masked and unmasked images according to an embodiment of the disclosure.

Fig. 12 is a depiction of augmented imagery according to an embodiment of the disclosure. Fig. 13 is a depiction of CBRNE threat detection according to an embodiment of the disclosure.

Fig. 14 is another depiction of CBRNE threat detection according to an embodiment of the disclosure. Fig. 15 is a depiction of augmented imagery used to detect a

CBRNE threat according to an embodiment of the disclosure.

Fig. 16 is a depiction of a system for identifying threat materials such as CBRNE threats according to an embodiment of the disclosure. Fig. 17 is a system for identifying threat materials such as

CBRNE threats according to an embodiment of the disclosure.

Fig. 18 is a method for identifying and dealing with threat materials such as CBRNE threats according to an embodiment of the disclosure. Fig. 19 is a method for confirming threat materials such as

CBRNE threats according to an embodiment of the disclosure.

Fig. 20 is a continuation of the confirmation of CBRNE threat according to an embodiment of the disclosure.

Fig. 21 is yet another continuation of the confirmation of CBRNE threat according to an embodiment of the disclosure.

Fig. 22 is additional confirmation of the CBRNE threat according to an embodiment of the disclosure.

Fig. 23 is a depiction of augmented reality threat display according to an embodiment of the disclosure. Fig.24 is another depiction of augmented reality threat display according to an embodiment of the disclosure. Fig.25 is a depiction of augmented mapping display according to an embodiment of the disclosure.

Fig. 26 is a depiction of CBRNE threat mitigation using data from augmented reality display according to an embodiment of the disclosure.

Fig. 27 is an example of automated mitigation or decontamination according to an embodiment of the disclosure.

Fig. 28 is an example of automated mitigation or decontamination according to an embodiment of the disclosure. Fig. 29 is at least one network that can be provided demonstrating previous identification of CBRNE threats.

Fig. 30 is another network that can be provided displaying previously identified threat materials such as CBRNE threats.

DESCRIPTION Multifunctional imaging devices are provided that can be configured to read the signal of threat material detectors such as CBRNE threat detectors. The imaging device can employ cameras with multispectral overlay to identify detection signals and/or enhance those signals to a user on a graphical display. The display may be part of a handheld or wearable device. An integrated chemical detector can provide orthogonal confirmation of threats to reduce the incidence of false determinations or provide semiquantitative analysis of positive results from highly sensitive surface threat detectors. Orthogonal detection can be queued by identification of a positive surface sensor response.

CBRNE threat detectors can include chemical agent disclosure sprays, explosive trace detectors, biological analyzers and/or collectors, bio-threat detectors and/or collectors, gas chromatography/mass spectrometry instruments/detectors, mass spectrometry instru ments/detectors, ion mobility spectrometers, radiation detectors, spectroscopic radiation detectors, and/or radionuclide identification devices.

Embodiments of the systems can overcome poor su rface detector signal visibility for users with restricted fields of vision due to limited lighti ng conditions and protective equipment. Systems can allow users to rapidly scan areas where CBRN E th reat detectors have been used and receive real-time, automated i nformation regarding threats that may be present. Determi nation of colori metric or fluorescent sig nals can be more objective by removi ng user interpretation of signal appearance i n certai n embodi ments. The systems can provide threat i nformation to users in an augmented way that makes the threat more actionable. By integrati ng orthogonal detection capability triggered by identification of su rface sensor responses, the system can greatly reduce the problematic incidence of false determinations throug h alternate confirmation .

A contamination mappi ng system that overlays Agent Disclosu re Spray (ADS) detection locations on a th ree-dimensional digital model that can be recalled after the ADS is removed is provided. This capability can give the warfig hter g reater situational awareness du ring decontamination and recon naissance operations.

Using ADS, the warfig hter can identify the CBRN E via a localized colori metric change, wherein red indicates the presence of the target chemical warfare agent (CWA) . There are presently formu lations for G- & V-series nerve agents, sulfu r mustard (H D) and opioid drug compou nds, for example.

ADS is a sprayable enzymatic sensor which allows the warfighter to locate trace CWA contamination on su rfaces via a localized colorimetric change. Another formu lation that detects trace quantities of H D and one which detects pharmaceutically- based chemical agents is contemplated. These formu lations may detect G- & V-series nerve agents and HD at trace levels (16.7 mg/m2 for G-series nerve agents, 0.4 mg/m2 for V-series nerve agents, and 33 mg/m2 for HD) within 5 minutes.

ADS is already being fielded for Heavy Mobile Equipment decontamination. Since 2010, warfighters have developed several Concepts of Operations (CONOPs) for the use of ADS. ADS has been used at the beginning of a triage line for vehicles used in the field to determine the presence of CBRNE threats.

Vehicles are assessed and decontaminated according to the extent of contamination disclosed. ADS can then be used again at the end of the process to confirm that the CWA has been decontaminated properly. ADS provides capabilities to locate contamination and focus decontamination efforts only on local hotspots, which drastically reduces the time and logistical burden required to perform decontamination. Further, equipment, personnel, and fixed sites can be returned to operational capability more quickly. ADS in these roles can act as a force multiplier, allowing the warfighters to maximize their limited resources of their labor, time, and materials to accomplish their decontamination tasks more efficiently.

Despite existing capabilities, the warfighter requires ADS to provide better tactical functionality at reduced life cycle costs (LCCs). In order to fulfill this need, improvements to the chemistry, application process, and imaging capabilities are required. The Agent Disclosure Spray is a highly sensitive surface sensor for detection of chemical warfare CBRNEs directly on surfaces. Once applied, the liquid formulation can provide either a yellow (negative) or red (positive) visible color response to specific chemical threats. The present system has the potential for future versions to detect other Chemical, Biological, Radiological, Nuclear, and Explosive (CBRNE) threats as well as drugs or Toxic Industrial Chemicals/Materials (TICs/TIMs). Detection signals are not limited to direct visible color but may also include infrared (IR), ultraviolet (UV), fluorescent, or luminescent responses.

Imaging devices of the present system can provide for a system capable of using multiple cameras with and without specific optical filters to simultaneously view an area where the surface threat detector has been applied and specifically identify local positive detection responses. The use of specific cameras and filters can provide for the integration of multiple threat detectors (CBRNE, drugs, TICs/TIMs, thermal, etc.) by reading a variety of spectral signals (visible, ultraviolet, infrared, fluorescent, luminescent) in environments where visibility may be limited. The software algorithm may analyze the filtered images to determine specifically where positive threat detection signals are present pixel by pixel in the field of view, for example. The signal of interest may then be overlaid on the visible scene image and visibly highlighted to the user with false color mapping on a display in real-time. Accordingly, the device can provide actionable information to the user. The device may be configured with built-in memory to automatically capture, store, and recall images. Wireless features can be included to allow for networking capability to relay information, and GPS can provide geolocation capability. Form factors for the imaging device can include either a handheld imager or a wearable system. Orthogonal detection capability may also be integrated into the imaging device. This capability may use Ion Mobility Spectrometry (IMS), Raman Spectroscopy, or other common chemical detection methods. By incorporating this capability, the system can significantly reduce the incidence of false positive determinations by enabling specific chemical threat identification. Some limited quantification capability is introduced based on the sensitivities of surface detectors versus other chemical detectors. For instance, a positive response from both the surface sensor and the orthogonal detector may indicate a relatively high concentration of threat. A positive response from the highly sensitive surface sensor but negative response from the orthogonal detector indicates a trace concentration of threat. A negative response from both detectors can provide a high level of confidence that the target threat is not present. This innovation provides further novelty in that the orthogonal detector can be automatically triggered by identification of a positive surface sensor signal. In accordance with example implementations, the systems can include a Handheld Imaging Platform (FLIR K-series camera (Rugged and reliable (IP67) for use in firefighting, relatively inexpensive, easy to use with gloves, (3" LCD display, multiple imaging modes, ability to save images); uses MSX technology for imaging (2-camera integration of multispectral imaging, real-time overlay of thermal and visible images, provide enhanced image resolution); translatable to visible + filtered image overlay; Tablet- Based Imaging Platform (3D mapping of environment, real-time detection). The systems of the present disclosure can provide a process for detection interpretation with an imager (1) apply threat Indicator (2) collect image (3) make determination of contamination (automated and confirmed) (4) act upon determination.

The systems and methods can accommodate filtered camera views for detection signals, faster locating of detections, adaption for future operations (AR/Auto-Decon). Pixel by pixel determinations of color, clean/contaminated decisions, highlights contaminated spots to user, putting a box around adjacent contaminated pixels, can lock location until user clears alert.

False-Color augmentation can be displayed using MSX technology to enhanced resolution of secondary image on visible background real-time display, processing circuitry can identify threat detection signal based on filtered image, the systems and methods can apply false color to filtered images, enhance detection response on visible background display, identification tags may be provided.

The system can have hands-free imager capability, monocular device & heads-up display on mask, integrated capability for protection, disclosure visualization, and documentation.

The system can include spectral reader confirmation; after a spot is indicated as contaminated the spectral reader will confirm it is a detection and minimize user/ equipment error (IMS integrated confirmation, integrated ion mobility spectroscopy detector to confirm threat.

The disclosure spray use can be combined with digital mapping technology to allow the warfighter to capture and recall 3D models with superimposed ADS detection signals. This system can be a portable system and may use both color and depth sensing cameras for detection signal recognition and model generation. Simultaneous localization and mapping (SLAM) software can be used to track the location of the sensor relative to the target as a scan is performed.

The system can include a single camera or system of cameras equipped with area-learning capabilities configured to map a 3- dimensional object. The system can be optimized for scanning speed and resolution.

As part of this system, methods can be implemented which associate a color with a specific location; for example, a red color to a specific location on the object, and may also include an object's track, such as a GPS map of the object's track.

The methods can be configured for detecting nerve agent simulants paraoxon and diethyl VX on tan and green Chemical Agent Resistance Coating (CARC), non-skid coating, and aircraft aluminum, as well as other surfaces such as SBR rubber, sand, and dark carpet, for example.

The systems can be configured to make measurements of complex 3D objects and render models. The systems can include an outdoor sensor head and power supply, as well as outdoor camera calibration procedures, for example. The systems may be configured to operate in varying light conditions and/or on varying surface types. Image processing, model generation time, and mapping may be conducted of an armored fighting vehicle in 10 minutes.

The systems can provide a detailed map of contamination under operationally relevant environmental conditions with a resolution of recorded contamination locations of within 3 inches or within 1 inch, when reading a contamination from up to a 15-foot standoff distance.

In accordance with at least one implementation, a 3D robotic imaging and modeling platform can be adapted to generate a 3D model of a complex object. These platforms can be used to generate a 3D mesh model from several cameras in a fixed location to create a model. As an example, a forklift carrying as shown in Fig.7

The modeling system can be configured to determine the requisite number of color and depth sensing cameras required to generate models for a vehicle, and can demonstrate optimized scanning speed and resolution on a small scale. The mapping software can be customized to use sign posts for camera position tracking. The cameras can use these sign posts to recalibrate their position if they are being moved too quickly or unsteadily during the scanning process. The system can be configured to operate without these sign posts as well. A color detection process can be integrated into modeling software to begin generating contamination maps of objects. The system can be utilized to detect nerve agent pesticide simulants on operationally-relevant su rfaces such as CARC and non-skid coating. The system can also be configu red to provide a tag or tags that can be overlaid with the 3 D model of a bench-scale object to provide a mapped contamination.

I n accordance with other i mplementations, a user may visualize a contaminated area from safer distances and with higher confidence than is possible with the naked eye or other i maging techniques. By locati ng and savi ng i nformation in a 3D digital map, data can be recalled after the ADS is removed or sig nals fade, focused decon and decon assu rance operations on precise areas of concern can be obtai ned. Fu rther, clearance decon may check vapor off-gassing before transporting equipment or vehicles on C1 30 airplanes. Additionally, data can be transmitted wi relessly to other devices or a command center to provide opti mal situational awareness among warfighters. An eventual application of this technology could involve integration with an automated robotic decontamination system , fu rther protecting the warfig hter from contamination exposu re risks. As described herei n, a digital contami nation mappi ng software application can be developed for use with a mobile phone or tablet. The device can be equipped with depth-sensing capabilities that can be used to generate a 3D mesh network map or hig h resolution model of an area. Software can link information to specific locations i n these 3D maps, which can be recalled at a later ti me or from a remote location , see for example Figs. 5 and 6 demonstrati ng a tag (arrowed) superi mposed onto an ADS detection sig nal and remain i n place when viewed from any angle or distance.

The systems process i mages so that red ADS detection sig nals are aug mented to be more visible to the user of the device as part of the system. Figs. 9- 1 2 depict the initially developed and processed images. The systems and methods of the present disclosure can be compatible with live video in order to allow real-time detection signal augmentation. This algorithm will be integrated into the app to allow for ADS detections to automatically be tagged and stored in a 3D map by the imaging device. Further capabilities beneficial to the user can be designed into the software, such as mapping of potential ADS interferents and measuring distances from the user to contaminated areas. Additionally, GPS positioning capability can be included into the system for reconnaissance mapping of contamination

As indicated above, the imaging platform can create a 3D model of objects such as vehicles in real-time as the objects move past cameras. For example, images of objects may be captured by one or more cameras. The systems and processes of the present disclosure operate to tag a portion of the image and/or prepare an alternative image, such as an alternatively colored image highlighting specifically predefined colors. The systems and processes may also create 3-dimensional images. The alternative images can be screened for CBRNE threats and where determined those threat locations tagged on the image. Referring to Fig. 8, in accordance with an implementation of the systems and methods of the present disclosure, an object such as a fork lift carrying a load is viewed by multiple cameras. The system and methods capture the load being carried on the forks, wherein, (A) RGB image of the fork lift driving past the 3D cameras with the load on the forks boxed in by the software (B) a system diagram (C) the software created 3D model of the forklift and cargo.

The systems and methods of the disclosure can recognize and dynamically capture an object as it is moved through a cluttered environment, which would be very useful in tracking moving vehicles through a field decontamination line. The system can also provide for threat mapping and/or augmented recall. For example, systems can provide a new way of integrating, recalling and displaying information through the generation of 3D augmented conceptualizations pinpointing the location of tagged objects in a profiled environment. The systems can compile data from a multitude of threat or environmental detectors (i.e. CWA, TICS, explosives, radiological, thermal, biological, etc.), and spatially tag the information using 3D high- resolution mapping software (i.e. GPS, Mesh, LIDAR scanning, computer vision hardware, etc.). Sensor detection, location and time inputs can be integrated in real-time to generate a recallable augmented representation to generate a 3D projection displaying the location and identity of tagged features with high accuracy (mm- yards). The sensor input data can also be recalled as a 3D model, versus a 3D projection. In this case, the 3D model displaying detector data would not be overlaid in the real environment, but would be viewed as a high resolution image on a tablet, smart phone, or any other viewing device. The systems can provide communication of actionable, real-time information from multiple CBRNE sensors to a central data processing system to generate threat maps that can then be used by a central command post or disseminated to end users in the field for detector/sensor-free viewing. This information display method can create a history and high-res map of threat events that can be recalled and transmitted on demand.

The system can improve overall situational awareness of the warfighter by allowing for the communication of CBRNE and other environmental threats to be viewed in real-time in the field without having the sensor that detected the threat first hand present. Further, the system may use a multitude of position determination techniques such as LIDAR, 3D Mesh, and computer vision hardware in addition to geo location (G PS) to more accu rately determi ne the location of a threat compared to that of usi ng G PS alone. If a threat is fou nd on an object, the location of the threat can also be determi ned in relation to the object itself versus the geo location of the th reat. This, combined with the barcoding capability of the innovation , can allow the user to recall the location of contamination even if the object that contained the contamination has moved. I n addition , the innovation could enable the use of robotic decon by transferri ng locations of contaminated areas to u nman ned systems, as well as enable assessment of long term materials compatibility after th reat exposu re.

The threat mappi ng and aug mented recall capability system and methods of the present disclosu re can provide for a tag and scan capability that allows an object/area to be pre-mapped and stored i n a library, or a method for scanning objects and spaces in real-time. Sensitivity and scan speed (for both the 3D model/map generation and the contamination map) can be tu nable to the threat scenario. Rapid scans can be used to identify gross amou nts of threat contamination and slow scans can be used for trace detection. Combined superposition of chemical threat data and thermal map may be utilized to identify potential th reats in a suspect chemical lab or potential WM D envi ronment. I nnovation will be applicable i n both outdoor and indoor environ ments by employi ng G PS and laser mapping methods. Wi reless featu res will enable networking capability to relay i nformation , and G PS can provide geolocation capability. Form factors for the contami nation map generation/viewing device could i nclude commercial off the shelf 3D scanners that serve as a tablet accessory or custom cameras with custom software algorithms. Augmented reality devices can i nclude but are not limited to wearable devices such as glasses, heads-u p displays, monocular device, hand-held devices such as a tablet or smart phone, or spatial augmented reality, which requires a projector but no wearable or hand-held devices. The systems and methods of the present disclosure are further described with reference to Figs. 1-30. Referring first to Fig. 1, a system 10 is shown that includes a data acquisition component 12 operatively coupled to processing circuitry which is operatively coupled to storage media. While shown in line, the components of system 10 may be aligned in alternative fashions contemplated by the disclosure and recognized as operable in the industry.

Data acquisition component 12 is a component for acquiring physical data. Physical temperature pressure, humidity, light, darkness, pictures, chemical, biological, are all data that can be acquired by data acquisition component 12. In accordance with example implementations, the data acquisition component can be an image acquisition device such as a digital video camera and/or still picture camera, for example. In accordance with other example implementations, data acquisition component 12 can be analytical devices such as CBRNE analytical instrumentation, for example.

Data acquisition component 12 can be operably coupled to processing circuitry 14, and processing circuitry 14 can be a personal computing system that includes a computer processing unit that can include one or more microprocessors, one or more support circuits, circuits that include power supplies, clocks, input/output interfaces, circuitry, and the like. The computing system can include a memory that can include random access memory, read only memory, removable disc memory, flash memory, and various combinations of these types of memory and this memory can be storage media 16 for example. The memory can be referred to as a main memory and be part of a cache memory or buffer memory. The memory can store various software packages and components such as an operating system. The computing system may also include a web server that can be of any type of computing device adapted to distribute data and process data requests. The web server can be configured to execute system application software such as the reminder schedule software, databases, electronic mail, and the like. The memory of the web server can include system application interfaces for interacting with users and one or more third party applications. Computer systems of the present disclosure can be standalone or work in combination with other servers and other computer systems and/or software support providers. The system is not limited to a specific operating system but may be adapted to run on multiple operating systems such as, for example, Linux and/or Microsoft Windows. The computing system can be coupled to a server and this server can be located on the same site as computer system or at a remote location, for example.

In accordance with example implementations, these processes may be utilized in connection with the processing circuitry described to provide the dynamic localized media options. The processes may use software and/or hardware of the following combinations or types. For example, with respect to server-side languages, the circuitry may use Java, Python, PHP, .NET, Ruby, Javascript, or Dart, for example. Some other types of servers that the systems may use include Apache/PHP, .NET, Ruby, NodeJS, Java, and/or Python. Databases that may be utilized are Oracle, MySQL, SQL, NoSQL, or SQLLite (for Mobile). Client-side languages that may be used, this would be the user side languages, for example, are ASM, C, C++, C#, Java, Objective-C, Swift, Actionscript/Adobe AIR, or Javascript/HTML5. Communications between the server and client may be utilized using TCP/UDP Socket based connections, for example, as Third Party data network services that may be used include GSM, LTE, HSPA, UMTS, CDMA, WiMax, WiFi, Cable, and DSL. The hardware platforms that may be utilized within processing circuitry 70 include embedded systems such as (Raspberry Pl/Arduino), (Android, iOS, Windows Mobile) - phones and/or tablets, or any embedded system using these operating systems, i.e., cars, watches, glasses, headphones, augmented reality wear etc., or desktops/laptops/hybrids (Mac, Windows, Linux). The architectures that may be utilized for software and hardware interfaces include x86 (including x86-64), or ARM.

Storage media 16 can be operably coupled to processing circuitry 14 and/or data acquisition component 12. Accordingly, these three entities of system 10 can be included in one housing or spread across different housings connected via hardwire and/or wirelessly to form a network for example.

Referring next to Fig. 2, system 20 is shown that includes an image acquisition device 12 operably coupled to processing circuitry 24 and storage media 26. In accordance with example implementations, image acquisition device 12 can be a handheld device that provides digital imagery including digital video digital imagery. In accordance with example implementations, digital video imagery includes the capture of multiple still images and the alignment of same in files with each still captured being acquired in time fragments. These images can be compiled in the storage media 26 for recall and play and/or manipulation by processing circuitry 24. Such manipulation can include marking with a location, altering to augment the image, and/or altering to display depicted items as three-dimensional images.

Referring next to Fig. 3, system 30 is provided that includes an image acquisition device 32 operatively coupled to processing circuitry 34 and storage media 36, as well as display component 38. Display component 38 can be a graphical user interface, for example, and/or it can be a simple video display, as another example. Video display 38 can be configured to receive real-time imagery received by the image acquisition device and/or augmented imagery that has been processed and provided by processing circuitry 34 and storage media 36. Referring next to Fig. 4, an example system 40 is shown that can be configured with components as shown. System 40 can include image acquisition devices 42a and 42b operably coupled to an electronics board 45. Electronics board 45 can include a combination of processing circuitry and storage media as described herein. Electronics board 45 can be operatively coupled to a display 48 as described, and upon receiving video imagery of an object 50, replaceable bandpass filters 49a and 49b can be placed between either one or both of cameras 42a and 42b to provide an image to the electronics board that allows for the real-time display to the user of an altered image that highlights the detection of a CBRNE threat. CBRNE threats as used herein can be chemical or biological threats and in accordance with example implementations, the CBRNE threat can be a nerve CBRNE that has been identified through ADS as described herein. In accordance with example implementations, cameras 42a and 42b can be considered an analytical instrument in this regard, for they are analyzing physical data and determining the presence of a CBRNE threat.

As shown in system 40 multiple cameras can be utilized to acquire data relating to a field or object. This data may all be processed to more accurately define the location and type of CBRNE threat.

In accordance with example implementations, images acquired utilizing the systems described herein can have portions thereof tagged and/or portions thereof three dimensionally mapped.

Figs. 5 and 6, provide an example tagging scenario wherein a room is scanned in 52 and portions thereof tagged, and as shown, upon the augmentation of images captured within the room, the augmented image can be recalled to the video display upon viewing the tagged room, wherein the room exists at image 54 and the augmented image is shown in image 56. As is shown, the augmented image displays the existence of what could be considered a past CBRNE threat.

Referring to Fig. 6, another image 62 is taken processed and tagged in 64 and stored in storage media. When viewed in 66 from a very different viewpoint, augmented image is displayed and displays the CBRNE threat. From another view point shown in 67 the image recalled in image depicts another augmented image and shown to the viewer in real-time.

Referring next to Figs.7 and 8, imagery can be 3D mapped as shown and described herein, and this 3D mapped image can be stored as an augmented image in the storage media and recalled at a later point. For example, with reference to Fig. 8 (A), an image can be 3D mapped when it passes through a set of cameras (B) to give a 3D mapped image (C). In accordance with example implementations, this 3D mapped image upon the detection of a CBRNE threat, can have the location of the CBRNE threat augmented on a portion of the 3D image.

Referring next to Fig. 9, a protocol for detecting the presence of a CBRNE threat using an image acquisition device in combination with processing circuitry or storage media as described in the systems of 10, 20, 30 and 40, is shown. In accordance with example implementations, a room can be scanned 96 during an initialization 92 using an image capturing device and saving the room Area Description File (ADF) to a file 98 in storage media, for example, using processing circuitry. From initialization to processing in 94 can be loading the ADF room file 100. Upon loading the ADF room file, processing can commence with capturing video 102 and making a red image mask of the video 104 defining segmentation threshold 106. Segmentation threshold 106 will be described with reference to Figs. 11-15, for example, and then determining the presence or absence of valid segments, where valid segments are not determined, a return to capturing video 102, where they are determined, proceed to apply object filters 110 and then generating alternative augmented reality tag 112 and saving tag with room file 114.

In accordance with example implementations, a more detailed processing depiction is shown that includes images with representation of Fig. 10 that is consistent with the processing step 94 of Fig. 9. As can be seen in Fig. 10, the input frame can be in RGB-HSV-YUV-YCbCr-Lab etc. The initial processing step can include transforming a 3-channel color image into a monochrome normalized red image matrix with the values within the matrix being represented by values between 0 and 1 (or between 0 and 255 to visualize the values). In certain cases, the more red a certain pixel has, the closer to 1 the value will be, and if there is no red color at all, it should have a value of 0. This can form a signal rather than noise determination as is used in typical detection. The adaptive segmentation threshold is then defined so that the matrix can be segmented into objects that can be referred to as blobs. With this threshold in mind, the image can be constructed into objects or blobs i.e., with red pixels with clusters into blobs. Then certain filters are applied on the obtained blobs. The color filters such as brightness, redness, size filters, shape filters can be applied. In the final step, an output image is generated that includes a list of obtained objects or regions that are colored red, and those objects can be monitored over time to see changes. Referring next to Figs. 11-12, more depictions of the conversion of stored imagery into segmented imagery and then finally the formation of blobs are shown. For example, Clear UV- ADS; Additive UV-ADS; and/or Clear NIR-ADS samples were prepared and processed. As can be seen, the processed images provided a much clearer indication of the agent threat. As can be seen in Fig. 12, sections of objects were treated and the imagery processed to shown multiple color depictions during image masking and segmentation to form blobs.

Referring particularly to Fig. 13, the image device 130 can be used to detect the presence of a CBRNE threat through segmentation of images captured by the device. In accordance with example implementations, device 130 can be coupled to or the data associated with another detection method. In this case, for example, ion mobility spectrometer 134 data can be acquired and processed to give an additional level of detection that can be combined with the data received by apparatus 130.

As can be seen in more detail in Figs. 14 and 15, the color difference (shown as 132) is graphed showing the color difference between the visible ADS white image and the monochrome camera masked image. This difference can be considered the difference between detecting or not detecting a CBRNE threat.

Referring next to Fig. 16, in accordance with an example implementation, system 160 is shown. System 160 can include data acquisition component 162 operatively coupled to processing circuitry 164 and storage media 166, which is operatively coupled to display 168. In accordance with example implementations, data acquisition component 162 can include both an analytical instrument 170 and image acquisition device 172. In accordance with example implementations, the image acquisition device is as described herein, and the analytical instrument can be as described herein as well, such as, for example, CBRNE detector networking mapping instrumentation. In accordance with example implementations, analytical instrument 170 and image acquisition device 172 as well as display 168 and processing circuitry 164 and storage media 166 can all be part of the same device. In accordance with alternative embodiments, these components can be part of separate devices that are connected wirelessly or through a network, for example. Referring next to Fig. 17, in a more detailed view, personnel 180 can be equipped with one or more of analytical instrumentation 170 which may be used to acquire data and display same at 168 using, for example, heads-up displays and/or augmented reality displays, and these displays can include the displays shown in 182. As described herein, these displays can be augmented to demonstrate the location of a CBRNE threat. The displays and instrumentation can be coupled to processing circuitry and/or storage media 164/166. As can be seen, displays 182 can be augmented to display CBRNE threats and/or 3-dimensional imagery for example.

Referring next to Fig. 18, a device 185 can have an additional analytical device 186 such as an ion mobility spectrometer integrated therein that may be coupled to a reading device, that may be removably coupled to device 185 and processed using separate processing circuitry 187. In accordance with example implementations, data 188 can be taken from an image 189 to identify a CBRNE threat, for example, utilizing the methods and processes described herein. Referring next to Fig. 19, a system 190 is shown, and this system can include the method of detecting, confirming, documenting, recalling, and acting upon a CBRNE threat. The detection has been described herein, and the confirmation has been through orthogonal confirmation as described herein with both video display as well as additional physical data such as CBRNE threat detection via ion mass spectrometry, for example. The CBRNE threat can be documented and stored as described herein, wherein the CBRNE threat is part of a tagged image and/or an augmented image, and then the CBRNE threat can be recalled via a video heads-up display to show the operator the presence of the CBRNE threat when viewing real-time imagery. In accordance with example implementations and with reference to confirmation, Figs. 20-23 are provided.

Referring to Fig. 20, a room can be entered at 202 by an operator handling a device that has one of the systems described herein. An initial scan of the room can be taken at 204, and then utilizing the processing circuitry, a 3D mesh can be generated of the background and stored in storage 206. This 3D mesh is not seen by the user.

Referring next to Fig.21, the methods of 90 in Fig.9 and Fig. 10 can be applied to provide a box 209 around a CBRNE threat area in view 210, and this box can be viewed as an augmented image in real-time. Referring next to Fig. 22, as shown in views 212, 214, 216 and 218, the box 209 is tagged and remains there as an augmented image upon real-time display, even when viewed from other angles, as shown in the multiple angles of 212, 214, 216, and 218. Referring next to Fig.23, the location 209 of the box is bound not only to the image, but to the 3D mesh that was created of the image, and this can allow users to see where contamination was, even after cleanup or signal fading. Referring next to Figs. 24-27, multiple examples of the augmented reality threat display are depicted, and this augmented threat display can be facilitated through a smartphone app, for example, and the threat location can be pinned by GPS location, thereby giving it another association with a location as described herein. It is contemplated that the display can be a graphical user interface, which would allow for the user to tap on the symbol to provide range, bearing, and status of the threat as well. Referring to Fig. 25, an overall system can provide an event notification to a network and an app platform can be apprised of this notification and augmented reality imaging can be used to view the threat in realtime. Referring to Fig.26, in an additional application, lEDs can be mapped utilizing these systems by pulling in data from multiple network users and then transferring this data to smartphone apps and providing augmented reality to those viewing the area through displays that are on the network system.

Referring to Fig.27, the augmented reality can be recalled for CBRNE threat mitigation. In accordance with an example implementation, a warfighter can be using a video display that can be a part of the systems and methods of the present disclosure that can recall augmented reality that is related to a tagged vehicle, for example, and this tagged vehicle may have a CBRNE threat that has been detected, and upon viewing this tagged vehicle, the augmented reality will display a box or notify of a CBRNE threat, for example. This data would be provided to all users connected to the system and allow the user to see contamination in real-time, even after signal fades at any angle, and any lighting condition. Mitigation can take place, for example, with reference to Fig.

28. In accordance with example implementations, items that may be exposed to CBRNE threats routinely undergo decontamination. These items can include vehicles, for example, such as armored vehicles and/or planes. Mitigation typically takes place present day by an operator cleaning the vehicle in a tented area. The present disclosure provides for the automation of this mitigation, wherein image acquisition devices and processing circuitry and storage media are utilized to both determine the presence of a CBRNE threat and manipulate robotic or automatic cleaning systems to remove the CBRNE threat. For example, once a CBRNE threat is recognized on a Humvee, the Humvee is tagged, 3D mapped, and the CBRNE threat marked on the Humvee. The Humvee can then proceed to a tented area or enclosed area with an automated or robotic cleaning system and the CBRNE threat removed by the system directing the automated cleaning system to the CBRNE threat. Additionally, with reference to Figs. 29 and 30, a network can be provided wherei n a historical library of CBRN E threats as well as l E Ds or any kind of threat is mapped. Access to the network can be obtained, and i ndividuals allowed to access the network using video displays, aug mented reality, or other parts of data systems. These can be useful for the warfig hter and/or the fi rst responder, for example.

I n addition to the applications mentioned above, an additional application of the i nnovation includes being used as a clearance/verification tool and recall previously contami nated vehicles, rooms (enter/exit clearance) , and personal protective equipment to provide contami nation location and decontamination assu rance.