The present disclosure relates, generally, to the field of intrusion detection in an area. In an embodiment, a sensor system is provided with multiple solutions to detect intrusions of people and/or objects into a railroad right-of-way and alert appropriate persons of such events. Other embodiments are also described.
Railroad track intrusion detection is becoming an important part of railway transportation systems, especially high-speed railway systems, where any obstruction on the right of way can be catastrophic. As the world continues to move in the direction of mass transit systems, it is ever more important to ensure that the transit systems are safe to operate at all speeds.
While many attempts using various technologies have been tried to create a train intrusion detection system, these attempts fall short for a variety of reasons.
The present approaches suffer from one or more of the following issues: (1) Unacceptably high false alarm rate from false detections, such as when an alarm is caused by an object which should not have triggered the alarm, e.g., tumble weed, growing grass, small plants popping up, seasonal weed, empty card board boxes, blowing trash, birds, small/large animals crossing the track, etc.; (2) No clear method to verify if an alarm is worthy of taking an action, e.g., no feedback to a central operator to detect an alarming situation and then act on verification before or during an alert is sent to the train operator or train control system; (3) Limited ability of the present systems to operate in all weather conditions including but not limited to fog, rain, snow, dust/sandstorms, etc.; (4) Ability to operate in all types of train operations, e.g., day time, night time, 24 hours a day for 7 days every week, before a train approaches, during train passage, and in vicinity of other traffic on nearby or adjacent tracks, bridges, crossings, track connections, track sidings, etc.
Present offerings also generally focus on using a single modality, while it is clear that there are huge benefits from fusing different technologies, as shown in applicant's prior patent, U.S. Pat. No. 10,202,135, “Operations monitoring in an area”. These benefits are often non-obvious even to those skilled in the art of intrusion detection.
A large number of existing systems also do not provide Safety Integrity Level 4 (SIL-4) certification which is a requirement for deployment into several settings, including that of railroads. SIL-4 certification requires an extremely low chance of failure, and even lower chance of failure which could result in adverse consequences. SIL-4 implementation has many implications for a system architecture, approach, and design.
In prior art, U.S. Pat. No. 10,518,700, “Instrusion detection system and methods thereof” (misspelling of “intrusion” in official patent title), and U.S. Pat. No. 9,610,894, “Intrusion detection system and methods thereof”, a device is described which is designed to work in a transit platform where multiple scanners are used to create upper and lower scanner layers. These patents fail to address long range obstructions, obstructions detection in fog, rain, snow, and many of the key elements needed to make solutions work in real life.
In patents U.S. Pat. Nos. 10,822,008 and 10,179,597, both titled “Automated wayside asset monitoring with optical imaging and visualization”, a camera-based device is described which is used to locate objects from a moving maintenance of way (MoW) vehicle. The patent does not address overall system reliability. Furthermore, it relies solely on camera imagery for inputs to its intrusion algorithm detection. Other forms of environmental sensing, including but not limited to vibration monitors and soil stability sensors are not considered.
U.S. Pat. No. 9,135,796, “Intrusion detection system and its sensors”, describes a system in which a physical barrier is fitted with a sensor array. These sensors are used to detect fence vibration which is processed to detect an intrusion. This patent does not describe a barrier-less method to detect intrusion and a situation where an object is thrown over a fence to land in an area to be protected.
In another example of prior art, U.S. Pat. No. 7,715,276, “Presence detection system for path crossing”, a railway grade-crossing obstruction detector which is activated by ultrasonic sensors is described. These ultrasonic sensors are susceptible to false alarms from falling objects, snow falls, etc. which is not acceptable for real life, practical implementation.
In U.S. Pat. No. 7,576,648, “Cable guided intrusion detection sensor, system and method”, an electromagnetic field is induced in a cable and then detecting any disturbance in the field from an intruder is described. The patent requires a cable to be installed and is more useful in detecting a fenced area where a cable can be installed thereby created an electromagnetic field fence.
U.S. Pat. No. 7,439,876, “Microwave detection system and method”, U.S. Pat. No. 7,295,111, “Microwave detection system and method for detecting intrusion to an off-limits zone”, and U.S. Pat. No. 6,933,858, “System and method for detecting obstacles within the area of a railroad grade crossing using a phase modulated microwave signal”, describe a microwave transmitter-receiver pair which are used to detect any railway crossing obstruction by locating the microwave pairs in a “X” pattern. The field covered by these transmitter-receiver pairs are limited in width and will require many pairs to be installed along a lengthy rail line for full coverage.
In U.S. Pat. No. 7,245,217, “Hazard mitigation for railway track intrusions at train station platform”, a compressible sensor layer is described which can determine if an object has fallen on the layer. The patent is limited by nature to a very small, specific area and thus cannot be used for wide-area coverage.
In U.S. Pat. No. 6,271,754, “Method and system for detecting an intrusion in a particular region”, a cable is fitted with a transmitter and receiver on either end to detect if the cable is being disturbed. This implementation requires that a cable is used as a means to transmit and sense electrical signal disturbance occurring within the cable length.
In U.S. Pat. No. 5,774,045, “Arrangement for detecting objects in a region to be monitored”, a system is described where a pulsed radar or FMCW signals are used on either end of the region to be protected. The patent requires that the region is surrounded by radar beacons similar to earlier discussed patents.
In U.S. Pat. No. 5,194,848, “Intrusion detection apparatus having multiple channel signal processing”, a signal processor is described which uses multiple filter bands to categorize vibration signal from an intrusion. The patent covers a signal processor to systematically categorize sensor signals.
In U.S. Pat. No. 4,952,939, “Radar Intrusion Detection System”, a microwave sensor-based intrusion detection system is used to detect intrusions. The patent covers yet another microwave sensor-based scheme to detect area intrusion.
The above list of prior art cover a wide range of technologies including but not limited to microwave sensors, ultrasonic sensors, camera imaging, etc.
The inventors recognize that the prior art does not address the special intrusion detection needs for a long range, open area, train track intrusion challenge in an effective and cost conscious manner. An embodiment of the following invention covers an innovative method to ensure the track safety against falling objects, human trespassers, track intrusion from derailed trains operating in nearby tracks, etc. and other causes which can result in damage, injury or derailment for train operations. A more particular embodiment of the present invention can provide a Safety Integrity Level 4 (SIL-4) solution to an intrusion detection system (IDS) which will meet the railway requirements for fail-safe operation, especially as required in high-speed operation.
Aspects of the present invention provide a system and method of intrusion detection for an area. In an illustrative embodiment, the system detects intrusions and other disruptions in a railyard or similar location. The system may be generally described as comprising some set of intrusion detection sensors, associated computing systems, and communications systems to permit data recorded by the sensors to be analyzed for signals that indicate an intrusion, and to transmit an alert to a designated location that may or may not be itself part of the system.
In an illustrative embodiment, the method may be generally described as collecting data from the sensors, analyzing that data to determine if an intrusion has occurred, and transmitting an alert signal to an appropriate destination.
In a more particular illustrative embodiment, the system can comprise some number of intrusion detection sensor nodes which make use of more than one sensing modality to provide verification and/or refinement of intrusion detection; these sensing modalities may be visible light, infrared, microwaves, lidar, radar, acoustic, or any other means of sensing. Data from the multiple sensors can be fused (correlated and/or combined in appropriate fashions, as known to those skilled in the art) to provide higher certainties of detection and better rejections of false alarms.
An illustrative embodiment includes redundancy in sensing node and/or monitoring system designs, e.g., to reduce any chances of single-points-of-failure for the devices and systems. These sensing systems may be stationary, mounted to observe some portion of a railyard, or mobile, mounted upon various vehicles, to provide safety and/or security information to the vehicle and/or its operators.
Other aspects of the invention provide methods, systems, program products, and methods of using and generating each, which include and/or implement some or all of the actions described herein. The illustrative aspects of the invention are designed to solve one or more of the problems herein described and/or one or more other problems not discussed.
These and other features of the disclosure will be more readily understood from the following detailed description of the various aspects of the invention taken in conjunction with the accompanying drawings that depict various aspects of the invention.
It is noted that the drawings may not be to scale. The drawings are intended to depict only typical aspects of the invention, and therefore should not be considered as limiting the scope of the invention. In the drawings, like numbering represents like elements between the drawings.
The base station 115 can comprise a centralized location for multiple intrusion detection sensor nodes 105. The base station 115 can have both the visibility and computing power to combine and correlate measurements across a geographically dispersed sensor set. In an embodiment, the central base station 115 can include redundant servers. However, it is understood that this is only illustrative. For example, in other embodiments the base station 115 can comprise a portable computing device. Regardless, the base station 115 can include software to analyze the sensor data from at least one intrusion detection sensing node 105 to identify and characterize an intrusion detection event.
For redundancy, each Ethernet network node includes a cell/satellite backup communications link 120. The base station 115 can provide analysis results, instructions, and/or the sensor data to any remote users 125, a group which may include maintenance personnel or personnel monitoring for incidents. The base station 115 also can provide the analysis results, instructions, etc., machine-to-machine, e.g., in the form of a SCADA interface 130 directly to an external train control interface to a controller on a locomotive. For example, the base station 115 can provide an instruction to trigger a control action of a device. In particular, the device can be a vehicle (e.g., a locomotive, a maintenance of way vehicle, etc.), and the control action can control one or more aspects of the vehicle's function. A third party database interface layer 135 can provide further integration by obtaining additional data (e.g., remote sensing data, etc.) from existing data source(s) which may be fused with the data being provided by the remote IDS nodes 105 in order to generate the analysis results.
Similarly, each controller 220 can be powered using two or more redundant power supplies 225, so that a failure of a single supply does not result in failure of the entire remote IDS node 105. The system power can be provided by one or more external power sources 230. These might include solar power, industrial 110 VAC, or vehicle 24 VAC, etc. In the event that the external power sources fail, a power backup system 235, such as a battery-powered Uninterruptible Power Source (UPS), can supply power until primary power is restored.
The sensor interfaces 315 and 320 are monitored using interface diagnostics modules 330; sensor malfunctions detected by the diagnostics modules 330 are reported to the CPU cores 325. Watchdog modules 335 can monitor the function of the CPU cores 325. The CPU cores 325 are required to notify the watchdog modules 335 with a reset operation on a particular temporal schedule; if the CPU cores 325 fail to notify the watchdog modules properly, a malfunction is adjudged, and the CPU cores 325 are restarted.
The results of the analysis by CPU cores 325 are presented to a voting module 340, such as a 2oo4 hardware voting configuration, where the results are compared; if the results from redundant sensors are not the same, the voting module 340 judges a failure, accepting either a unanimous or majority vote, or rejecting all of the results, depending on the SIL level. The system can be powered by redundant power supplies 345, providing for continued system operation even if one of the power supplies 345 fails.
The overall system power can be supplied by external sources 420, which may include solar, power-line 110/220 VAC, or low-voltage 24 VAC. In the event that the external power source 420 fails, the system can contain a backup power module 425 which functions as an uninterruptible power source.
Communication with the base station 115 can be provided by a communication link module 430. In a preferred embodiment the communication link module 430 utilizes a high-bandwidth Ethernet backbone link 435. In an alternate embodiment where a wired link is not feasible, it may use a mesh radio wireless link 440, which provides less data bandwidth but can reach past some physical impediments. In the event that the primary link fails, a backup link 445 can be provided utilizing cellular or satellite wireless links, which have limited bandwidth but still provide some communication capabilities.
Moreover the controllers can be powered using redundant power supplies 515; the redundancy provides for continued operation even if one supply fails. The overall system power can be supplied by external sources 520, which may include solar, power-line 110/220 VAC, or low-voltage 24 VAC, etc. In the event that the external power source 520 fails, the system can contain a backup power module 525 which functions as an uninterruptible power source.
Communication with the base station 115 can be provided by a communication link module 530. In an embodiment the communication link module 530 utilizes a high-bandwidth Ethernet backbone link 535. In an alternate embodiment where a wired link is not feasible, it may use a mesh radio wireless link 540, which provides less data bandwidth but can reach past some physical impediments. In the event that the primary link fails, a backup link 545 can be provided utilizing cellular or satellite wireless links, which have limited bandwidth but still provide some communication capabilities.
Each sensor interface 605 has an accompanying interface diagnostic module 615 which can check for proper function; each diagnostic module provides its observations to the CPUs 610 so that the CPUs can judge the validity of the relevant sensor data. The CPUs are also monitored using watchdog modules 620, which must be serviced according to a schedule; if the CPUs 610 do not meet the schedule required by the watchdog modules 620, the watchdog modules have the ability to reset or shut down one or more of the CPUs.
The results of analysis from the CPUs 610 can be delivered to a hardware voting module 625, which judges the validity of the results based on agreement between the results delivered by the multiple CPUs 610; if there is agreement per a 2oo4 criterion, the results are considered valid. Each CPU 610 can be powered using redundant power supplies 630; this allows the node to continue to operate even if one of the power supplies fails.
For long-range presence detection, a laser 715 and photoreceptor 720 can be used in combination to perform range measurement to obstacles using, for example, a time of flight method. By reflecting through a rotating mirror 725, a 360° plane may be scanned for obstacles. For shorter-range presence detection, a similar time of flight method can employ laser 730 and photoreceptor 735, but in this case the mirror 740 not only can rotate to provide 360° scanning in azimuth, it also can change angle dynamically to provide a large field of view in elevation.
The first step 1210 uses object recognition to identify the object based on the 2D image or 3D point cloud; if it cannot be identified the analysis completes with a negative result (e.g., unidentifiable) provided to the fuzzy expert system. Otherwise, processing can continue in order to determine spatial and/or temporal object properties for the detected blob. For example, in step 1215, the identified object undergoes a blob-based size analysis to determine whether the blob's size is within the size requirements of intrusion criteria; if it is not within the criteria the analysis completes with a negative result (e.g., size not met) provided to the fuzzy expert system.
The identified and sized object then undergoes motion analysis in step 1220 to determine its speed and direction; if these can't be determined the analysis completes with a negative result (e.g., not calculable) provided to the fuzzy expert system. The object's motion is then analyzed in step 1225 to determine whether the blob has come to rest. If this cannot be determined, the analysis completes with a negative result (e.g., not calculable) provided to the fuzzy expert system.
Next, the object properties can be evaluated with respect to intrusion criteria. For example, the object's location can be analyzed in step 1230 to determine whether the blob is within a geo-fence defining at least one intrusion zone; if the blob is not in any intrusion zone the analysis completes with a negative result (e.g., not violated) provided to the fuzzy expert system. Although the object has been identified as an intruder, it may be one which has manually been identified by personnel as a non-intruder; this is checked against an override list in step 1235; if the blob has been identified as a non-intruder the analysis completes with a negative result (e.g., already excluded) provided to the fuzzy expert system. At this point the object has been identified as a true intruder, so relevant data for the fuzzy expert system is gathered in step 1240 and the analysis completes with a positive result (e.g., intruder) provided to the fuzzy expert system.
In step 1320, the de-noised data is partitioned into blobs, which are groups of points with common attributes, implying potential connectedness, which are thus candidates as objects. Each blob, e.g., candidate object, is labeled in step 1325 with a unique identifier so that it can be tracked through the processing. Since a blob is only a candidate object, it may be ephemeral or illusory (noise); to exclude this possibility, a blob must be verified in step 1330 to appear in multiple consecutive analyses to be considered authentic. If the blob has not met these criteria yet, the process returns to fetch new sensor data in step 1305. If the blob has met these criteria, the blob is reported in step 1335 to the classifier for further analysis.
The track area in the vicinity of the overpass is monitored by geophones 1615, which are capable of sensing minute tremors in the earth resulting from a falling object; multiple geophones 1615 can be laid out in an array, which allows the IDS node to identify the location of the impact. Multi-spectral imaging systems 1620 can be located underneath the overpass (e.g., mounted to an underside of the overpass, on the ground, on a support structure for the overpass, and/or the like) which are capable of visibly identifying objects which have fallen on the tracks. A multi-spectral imaging system might include visible light, near-IR, short-wave IR, and/or LIDAR, with the signals from different imagers fused to provide a multi-spectral view of any object.
The track area can be surrounded at its perimeter with an array of geophones 1710, which are capable of sensing minute tremors in the earth resulting from falling or rolling objects. The geometry of the layout for the geophones 1710 can provide for localizing the center of the impact by comparing the signals from neighboring geophones 1710 in the array. A further distance from the rails, arrays of soil stability sensors 1715—for example, pore pressure sensors—can monitor movements of the surface soil uphill from the tracks 1700, to detect landslide or mud slide activity. Within the tunnel or trench, a set of multi-spectral imaging sensors 1720 can be mounted such that their fields of view overlap, providing in the summation a field of view encompassing the entire track area in the vicinity of the tunnel or trench 1705. By fusing the signals from the geophones 1710, soil stability sensors 1715, and multi-spectral imagers 1720, the IDS node can detect any material encroaching on the rails from the surrounding terrain.
The foregoing description of various embodiments of this invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed and inherently many more modifications and variations are possible. All such modifications and variations that may be apparent to persons skilled in the art that are exposed to the concepts described herein or in the actual work product, are intended to be included within the scope of this invention.
The current application is a continuation of International Patent Application No. PCT/US2022/015194, filed on 4 Feb. 2022, which claims the benefit of U.S. Provisional Application No. 63/145,958, filed on 4 Feb. 2021, each of which is hereby incorporated by reference.
Number | Date | Country | |
---|---|---|---|
63145958 | Feb 2021 | US |
Number | Date | Country | |
---|---|---|---|
Parent | PCT/US2022/015194 | Feb 2022 | US |
Child | 17666067 | US |