This invention relates generally to the field of barrier systems, and in particular to a dynamic barrier system that monitors an area, senses and determines specific types of objects within that area, and actively/dynamically reacts to those objects.
For centuries, barrier systems of various types have been employed to impede or prevent the infiltration of undesirables into an area. From the earliest moats and high castle walls, to present day mine fields, barrier systems have provided impediments to infiltration.
Yet while such historic barrier systems have achieved successes in preventing the infiltration of adversaries, they unfortunately do not discriminate and consequently may serve to inhibit both friend and foe alike. In addition, certain barrier systems such as mine fields remain active indefinitely, or at least until they are removed and/or deactivated—a task that is both dangerous and prohibitively time consuming.
Consequently, barrier systems that inhibit foes while permitting friends and which do not require dangerous deactivation and/or removal would represent a significant advance in the art.
We have developed, in accordance with the principles of the invention, a dynamic barrier system that is selective, i.e., able to engage a credible threat and initiating appropriate action. Viewed from a first aspect, our inventive barrier system includes a series of sensors that monitor a barrier area to determine specific types of objects approaching, within, or exiting the barrier area. Depending upon the type of object(s), our dynamic barrier system initiates an appropriate action.
Viewed from another aspect, our inventive barrier system responds to the type of object(s) sensed in the barrier area with appropriate force(s) for example, lethal or non-lethal. Accordingly, our inventive barrier system may permit the presence or passage of authorized objects (i.e., friendly forces) by not attacking or de-activating certain components of the barrier system, or alternatively, instituting an attack against unauthorized objects (i.e., unfriendly forces) so sensed in the barrier area.
In this inventive manner, our inventive barrier system may be emplaced and then provide a form of self-protection whereby it senses an object, determines its type, and responds appropriately.
Viewed from yet another aspect, our inventive barrier system advantageously deploys munition components only when needed. As a result, barrier areas are not made particularly hazardous until needed, and munitions are not wasted. As a further aspect, our inventive barrier system does not persist in the barrier area after its intended period of operation. In this inventive manner, difficult and/or dangerous removal is not required of our system.
A more complete understanding of the present invention may be realized by reference to the accompanying drawing in which:
a is a schematic illustration of an exemplary barrier area/system in which a number of sensors are placed along with an unmanned robotic vehicle according to the present invention;
b is a schematic illustration of an exemplary barrier area/system layout in which the robotic vehicle is placed within the sensor field according to the present invention;
c is a schematic illustration of an exemplary barrier area/system layout showing the relationship(s) between the barrier sensors and control systems;
a is a schematic illustration of a dual purpose munition for use in a barrier system according to the present invention;
b is a schematic illustration of the dual purpose munition of
c is a micrograph illustration of the surface of the dual purpose munition for anti-personnel applications showing a series of scribe lines; and
At this point it is worth noting that the barrier area 100 depicted in
The sensor systems 120[1] . . . 120[N] may be delivered to the barrier area 100 by a variety of methods including aerial deployment, unmanned aerial deployment and/or unmanned vehicle deployment or a combination thereof. As we will later describe, the sensor systems may advantageously deployed as part of projectile payload(s).
With continued reference to
At this point it is important to note that the exemplary barrier area 100 shown in this
Advantageously, when multiple barrier sensor systems are arranged in a manner like that shown in
Importantly, while
For example, a given barrier sensory field may have barrier sensor systems responsive to E-Field, B-Field (Magnetometers), acoustic, electromagnetic, vibrational, chemical, visual or non-visual stimulus, or a combination thereof. In this manner, a target that did not produce, for example, an audible signature may nevertheless produce a vibrational signature, capable of being detected by a vibrational barrier sensor system. Still further—and according to the present invention—when dissimilar barrier sensor systems or sets of barrier sensor systems (i.e., E-Field, B-Field and/or Acoustic) detect a particular object—it becomes possible to determine more precisely what type of object is being detected.
In particular quasi-static electricity generated by passing individuals and/or vehicles generate temporal perturbation(s) in the geoelectric field. These perturbations, while small, may be measured using small, highly sensitive E-Field barrier sensors.
Of further importance, geoelectric field perturbations caused by persons (both with and without magnetic materials) and vehicles exhibit very different, detectable, and consequently recognizable differences in E-Field signatures. As a result, using B-Field sensors (magnetometers) in addition to the E-Field barrier sensors mentioned, it is possible to make simultaneous measurement of geomagnetic field perturbations due to persons both with and without magnetic materials passing within an effective barrier area of our barrier sensor(s).
At this point it is essential to note that while we have so far limited the discussion of our combined barrier sensor systems to those only including E-Field and B-Field barrier sensor(s), our invention is not so limited. More specifically, by including acoustic barrier sensor(s) (and others) along with the E-Field and B-Field barrier sensors, more flexible, and accurate determinations may be made.
In fact, individual sensor systems may comprise multiple sensors, each capable of sensing individual stimuli. Normally, such sensor(s) will not contain any lethal or otherwise intentionally harmful payload. Instead, such payload(s) may be provided by another DBS component, i.e., a UGV which may have been the same UGV that deployed the particular sensor. In this manner the sensor(s) that are deployed in a barrier area pose no residual threat and their removal is not particularly hazardous. Of course, sensor(s) systems that are potentially harmful/lethal may be deployed with their harmful/lethal aspects being remotely enabled/disabled from, for example, a UGV. Such systems are certainly within the scope of our inventive teachings.
As is known, acoustic sensors and accompanying algorithm(s) have been developed by the art to detect vehicles powered by internal combustion engines. Consequently, such acoustic sensors, when used in combination with the E-Field and B-Field barrier sensors described, may comprise a comprehensive barrier sensory system which—when combined with data fusion method(s)—can provide a barrier system with the ability to discriminate among various object types that are detected within a particular barrier area.
Returning now to our discussion of our inventive dynamic barrier system and in particular with reference to
In this exemplary barrier system, each of the individual barrier sensor systems 220[1] . . . 220[N] is shown in communication with barrier system unmanned ground vehicle (UGV) 210 via individual sensor communications links 230[1] . . . 230[N], respectively. As used in this example, the UGV 210 is a motorized, unmanned vehicle which is deployed into an area and optionally deploys one or more barrier sensor(s) and subsequently receives barrier sensor data transmitted from those sensors—or others deployed via separate deployment systems described previously, i.e., aerial vehicles, aerial unmanned vehicles or other ground vehicles—both manned and unmanned.
In one embodiment, the UGV 210 may employ METAL STORM® pod capable of deploying both sensors and munitions. METAL STORM technology is an electronically initiated, stacked projectile system that eliminates the mechanisms required to fire a conventional weapon. Effectively, the only parts that move in a METAL STORM pod are the projectiles contained within individual barrels comprising the pod. Multiple projectiles are stacked within the barrels. As a result, each projectile may be fired sequentially fired from an individual barrel, with multiple barrels being fired simultaneously.
As a result, METAL STORM barrels are individual weapons, without traditional ammunition feed or ejection system, breech opening or any other moving part (other than the vehicle carrying the pod and the pod itself). METAL STORM barrels may be grouped in multiple configurations to meet a diversity of applications. Each individual projectile stacked in a barrel includes its own propellant load, such that a leading propellant may fire its projectile, without resulting in an unplanned ignition of propellant of following projectile(s). As a result, such systems may advantageously deploy a wide variety of projectile(s), including sensory projectiles (for deployment) or munition projectiles that may attack a target with both lethal or non-lethal force as appropriate.
Returning our discussion to
Further, such communications link(s) may be any one or a mix of known types. In particular, while surveillance systems such as those described herein are particularly well-suited (or even best suited) to wireless communications link(s), a given surveillance application may be used in conjunction with wired, or optical communications link(s). Advantageously, the present invention is compatible with all such links. As we noted prior, not all of the individual communications links are shown in the
Speaking topologically, our inventive method and systems may operate over a “star” or “peer-to-peer” topologies. Such topologies, will be determined largely by the specific deployment needs. And while our discussion herein has been limited for the sake of simplicity to that of a star, the peer-to-peer topology differs from the star in that any node can communicate with any other node as long as they are within radio range of one another. Peer-to-peer topologies allow more complex network formations to be implemented, such as mesh topologies. Advantageously, peer-to-peer networks formed according to our inventive teachings may be ad hoc, self-organizing and self-healing. Furthermore, multiple hops to route communications messages from a particular sensor node(s) to any other node(s) or gateway(s) within the network are possible and foreseen.
We note that the UGV 210 is shown as the recipient of the sensory data sensed at each of the barrier sensors 210[1] . . . 210[N]. While not specifically shown in this
The function of a control station is to receive sensor data (which may be target information), optionally fuse them into barrier area information, and enable/initiate an appropriate response including, automated deployment of munitions, and/or disabling munitions. As can be now appreciated, when an object is detected by one or more individual sensors within a barrier area, its sensor data is used to determine the type of object (i.e., friend or foe, tank or platoon) and from this information an appropriate response is initiated. When that response is initiated by, for example, an UGV, it is advantageously in very close proximity to the particular object(s) sensed and identified, and therefore is likely to be most effective.
Of course, barrier system applications generally require flexibility, distributed across a wide geography including various terrain(s) and topographies as noted before. As such, wireless methods are preferably used and receive the most benefits from the employment of the present invention. Of particular importance to these wireless systems, is the very high transmission compression rates afforded, thereby allowing the maximum amount of data transmitted in a minimal amount of time. Such benefit(s), as will become much more apparent to the reader, facilitate scalability as additional wireless barrier sensor systems may be incrementally added to an existing barrier area as requirements dictate, and because barrier sensory systems do not have to transmit for extended periods of time, power consumption is reduced and delectability (by unfriendly entities) of the barrier sensor systems themselves is reduced.
The UGV 210/control system receives data streams transmitted from each of the barrier sensor systems situated within the barrier area 200. As can be appreciated by those skilled in the art, since the surveillance area 200 may include scores (or more) of barrier sensor systems, UGV 210/control system must be capable of receiving data streams in real time from such a large number of barrier sensor systems. In the situation where different types of communications links are used between UGV 210/control system and individual barrier sensor(s) systems, the UGV 210 must accommodate the different type of communications link or additional UGVs (not specifically shown) which do support the different communications link(s) may be used in conjunction with UGV 210.
According to the present invention, UGV 210/control system receives data from one or more barrier sensors 220[1] . . . 220[N] positioned within the barrier area 200 and further processes the received data thereby deriving further informational value. As can be appreciated, the data contributed from multiple sensor systems within the barrier area 200, may be “fused” such that this further informational value may be determined. When this data fusion involves the E-Field, B-Field, Acoustic and/or other sensors described previously, the result is a determination of the specific type of object(s) detected within the barrier area at a given time and permits the UGV 210 to initiate an appropriate response.
Before describing the response(s) initiated however, we reference
With reference now to
Specifically shown in this
As a further note, and as will be described in more detail later, the communications links 230[1] . . . 230 [N] are preferably bi-directional such that configuration/command/control information may be provided to an individual sensor node from the master processing system 212. Typically, the uplink (master processing system to sensor node) need be of lower bandwidth than the downlink, as the volume of data sent in the uplink direction is usually much less.
As depicted in the
At this point it should be apparent to those skilled in the art that the communication/computational control system 205 may advantageously be deployed within a barrier area, nearby a barrier area or remote to a barrier area. With our inventive architecture and arrangement(s), the systems comprising the control systems may be positioned in locations dictated by the circumstances and specific application.
According to the present invention, master processing system 212 receives data from one or more sensors nodes 220[1] . . . 220[N] positioned within the surveillance area 200 and further processes the received data thereby deriving further informational value. As can be appreciated, the data contributed from multiple sensor nodes with the surveillance area 200 permits the operation of powerful “sparse arrays” of sensor systems, exhibiting much higher detection/classification/identification/tracking potential than existing systems.
In a preferred embodiment, and according to the present invention, the master processing system 212 offers equivalent functions of present-day, commercial computing systems. Consequently, the master processing system 212 exhibits the ability to be readily re-programmed, thereby facilitating the development of new data fusion methods/algorithms and/or expert systems to further exploit the enhanced data fusion potential of the present invention.
Advantageously, our inventive dynamic barrier system may employ a variety of sensors and/or munitions. One such munition, a dual purpose munition (DPM) is shown in
It is important to note at this point that the METALSTORM dispenser is but one means of emplacement. Accordingly, other emplacement systems/methods could be effectively utilized with our inventive dynamic barrier system and in preferred embodiments, such systems/methods would provide the remote emplacement whereby the munitions are delivered from a safe distance as needed. In this inventive manner, the sensing and attack or lethal aspects of the munitions are separable.
The DPM 310 as shown in
As shown, the DPM 310 has a vertically orienting warhead to improve its performance against vehicles. This ability to engage a threatening vehicle from underneath improves its ability to disable the vehicle with a relatively small warhead. The DPM 310 permits emplacement of a short term barrier in an area that a threat has been detected by pre-emplaced sensors comprising the dynamic barrier system.
As shown in
In the embodiment shown in
With reference now to
A shaped warhead 314 is known in the art and generally comprises an explosive 318 formed behind a liner 316. A vertically orienting explosive 320 may comprise a ring of detonation cord that encircles the front end 336 of the housing 312.
The safe and arm device 322 is known and operates to arm the shaped warhead 314 contingent on one or more preconditions or combination of preconditions. Such preconditions may include, for example, set forward acceleration, setback acceleration, spin, centrifugal force, impact or time delay.
As used in our exemplary DPM 310, the dual sensor circuit 338 comprises a geoelectric field sensor (E-field sensor) board 326, a geomagnetic field sensor (B-field) board 328 and a processor board 332. As can be appreciated, quasi-static electricity generated by humans and vehicles causes a local temporal perturbation in the geoelectric field. These perturbations, although small, can be detected and measured using the E-Field sensor board 26. Geoelectric field perturbations caused by passing humans and vehicles have very different and easily recognizable structures.
The B-Field sensor board 328 measures the geomagnetic field perturbations due to passing humans and vehicles. The processor board 332 processes and data-fuses the outputs of the E-Field and B-Field sensor boards 326, 328 to detect and differentiate between a human and a vehicle (automobile, truck, armored personnel carrier, tank, etc.). An exemplary dual sensor circuit 338 is disclosed in U.S. provisional patent application Ser. No. 60/593,283 filed on Jan. 4, 2005, the entire contents of which is hereby incorporated by reference. An impact switch may be included in the dual sensor circuit 338 to start the E-field and B-field sensor boards 326, 328 upon impact of the munition 310.
The processor 332 combines signals from the E-field and B-field sensor boards 326, 328 to determine whether a target is personnel or a vehicle and, if the target is personnel, the safe and arm device 322 initiates the vertically orienting explosive 320 and then initiates the shaped warhead 314.
Of further interest, and as shown in
Alternatively if a target is a vehicle, the processor 332 determines from the B-field sensor board 328 when the vehicle is above the munition 310. The processor 332 monitors the change in the B-field reading. As the vehicle approaches the munition 310, the B-field reading rises until the centroid of the vehicle is reached. Once the centroid passes over the munition 310, the B-field signal begins to weaken. This change in the B-field signal is the trigger to vertically orient the munition 310 and then detonate the shaped warhead 314. Because the shaped warhead 314 is directly beneath the target vehicle, the munition 310 is especially lethal.
The safe and arm device 322 may include a timed self-destruct circuit that causes initiation of the shaped warhead 314 after an elapsed time. In this way, the barrier of munitions 310 has a predictable life span. The self-destruct circuit helps to eliminate the problem of unexploded ordnance on the battlefield. Alternatively, when equipped with appropriate communications circuitry, the device may be disabled electronically from a remote vehicle or system.
As described so far, the dual purpose munitions is a sensor fused grenade which can detect and distinguish between humans and vehicles and then engage with a dual purpose warhead. With the DPM, internal sensors are used to detect the target from a distance, without requiring physical contact. The onboard sensors enable the DPM to distinguish between personnel and vehicles, thus allowing a single version of the grenade to perform both functions. The sensors allow the DPM grenade to be emplaced at the desired location and linger until a target is detected or a preset time expires and the DPM self destructs. The DPMs create a barrier quickly and only when needed, thus eliminating the problem of having energetic devices in the battle field after the conflict has ended.
While those skilled in the art will quickly recognize that such a DPM as described may operate in a “stand-alone” mode or alternatively in a “network” mode. When operating as stand alone, the DPM is basically deployed and is left operating on its own. When part of a network, the multiple DPMs act as separate sensor systems, each capable of providing an important individual component of barrier area information.
By way of example, one or more DPMs, when used in conjunction with an array of field sensors such as those described previously, permit the accurate, real-time determination of a threat and permit rapid response. For example, if data received from a sensor or sensors indicated that not a single vehicle, but rather a convoy of vehicles was near, the DPM could detonate itself. In a networked mode, the other DBS component systems (i.e., UGV, for example) could launch a further attack on the convoy using what munitions it had at its disposal.
Finally, we turn to
Once operational, the barrier area containing the deployed nodes is monitored, for objects approaching, within, or leaving the barrier area (Block 430) When objects are detected (Block 440), a determination is made about an appropriate action to take (Block 450).
In the case of a DPM node, its one or more sensors will determine the type of object and possibly detonate, applying lethal force to the object. In a networked scenario, higher-order information systems may determine that coordinated attack on the object is appropriate, and launch such an attack with weapons in close proximity to the barrier area. This monitor-determine-take appropriate action is continued (455) until the barrier is disabled, either explicitly or through the passage of time or by some other indicative method (Block 460).
At this point, while we have discussed and described my invention using some specific examples, those skilled in the art will recognize that my teachings are not so limited. More specifically, a variety of different sensor types, deployment methods and communications schemes are satisfactory for use with our inventive method(s). In addition, alternative lethal and non-lethal munitions components would work equally well with our dynamic barrier system. Accordingly, our invention should be only limited by the scope of the claims attached hereto.
This application claims the benefit under 35 USC 119(e) of U.S. Provisional Patent Application No. 60/594,239 filed Mar. 15, 2005, the entire file wrapper contents of which provisional application are herein incorporated by reference as though set forth at length.
The invention described herein may be made, used, or licensed by or for the United States Government for government purposes without payment of any royalties thereon or therefore.
Number | Name | Date | Kind |
---|---|---|---|
3885501 | Schneider, Jr. | May 1975 | A |
5020411 | Rowan | Jun 1991 | A |
5415103 | Radermacher | May 1995 | A |
5497705 | Bredy et al. | Mar 1996 | A |
6739547 | Redano | May 2004 | B2 |
6896220 | McKendree et al. | May 2005 | B2 |
7047861 | Solomon | May 2006 | B2 |
7367525 | McKendree et al. | May 2008 | B2 |
20030051597 | O'Dwyer | Mar 2003 | A1 |
20030126977 | Garcia et al. | Jul 2003 | A1 |
20030132746 | Cox | Jul 2003 | A1 |
20030136290 | Kolbli | Jul 2003 | A1 |
20030159572 | Downs, Jr. | Aug 2003 | A1 |
20040237762 | O'Dwyer | Dec 2004 | A1 |
20060169832 | Glasson | Aug 2006 | A1 |
20070244673 | Khosla et al. | Oct 2007 | A1 |
20080018522 | Redano | Jan 2008 | A1 |
20080148925 | O'Dwyer | Jun 2008 | A1 |
20080314234 | Boyd et al. | Dec 2008 | A1 |
20090000465 | Deflumere et al. | Jan 2009 | A1 |
20090223354 | Root, Jr. | Sep 2009 | A1 |
Number | Date | Country | |
---|---|---|---|
60594239 | Mar 2005 | US |