This invention relates generally to the field of tracking and monitoring of radioactive sources. More particularly, the system is directed toward tracking and monitoring one or more radioactive sources as they are transported or stored, and the detection, at a remote monitoring station, of any unauthorized tampering, exchange, or removal of one or more sources.
Monitoring, tracking, and inventorying of radioactive sources have been required by various corporate, government, and international regulatory agencies for many years. These have traditionally been manual tasks requiring much time, energy and cost. In recent years, monitoring and tracking of sources have become even more critical. As an example, the International Atomic Energy Authority (IAEA) requires that certain types and strengths of radioactive sources, defined as “sources of concern”, be tracked continuously as they are physically transported or stored. Sources of concern are defined by type and strength. As an example, the IAEA defines any Americium berillium-241 (241AmBe) of source strength greater than 16.7 Curies (Ci) as a source of concern.
Sources of concern are used in many commercial operations that require transportation of the sources to remote geographic locations, and subsequent storage of the sources when the operations are completed. As an example, 241AmBe sources exceeding the 16.7 Ci level are used in a wide variety of geophysical well logging systems, which require the sources to be transported typically by truck to remote oil and gas well sites. As another example, isotopic gamma ray sources of concern such as 60Co and 137Cs are used in a wide variety of pipeline inspection and geophysical well logging systems, which again require these sources to be transported to remote locations. It is highly desirable, if not actually required in certain situations, for all types and strengths of radioactive sources to be monitored continuously, during storage and transportation, for security breaches such as unauthorized tampering, exchange, or removal. If detected, the security breach should be immediately reported to the appropriate authorities.
Thus, there remains a need for a system for identifying, tracking, monitoring, and inventorying radioactive sources to reduce the burden and cost of current manual systems. The present invention is directed to filling this need in the art.
This invention provides such a system for identifying, monitoring, and tracking radioactive sources, and in particular neutron and gamma ray sources. A plurality of sources at diverse geographic locations can be tracked from a remote, central monitoring station.
The system comprises a source monitor unit that can be disposed near, attached to, or integrated within a source container which comprises shielding material in which a radioactive source is removably disposed. The source monitor unit is controlled by a preprogrammed internal processor, thereby continuously and automatically transmitting information regarding the source to the remote monitoring location. The source monitor unit can also be queried or “polled”, and even overridden, from the remote monitoring station. The source monitor unit can be manually activated or deactivated by authorized personnel using a manual input such as a key pad, magnetic card reader, and the like. Any manual intervention is detected at the remote monitoring station to confirm that the intervention is authorized and is not an attempt to breach the security of the source.
The source monitor unit is in two-way communication with the remote monitoring station via a communication link. This communication link can comprise a cell phone, two-way radio, satellite, and the like, or land telephone lines if the source is not being transported.
A variety of information is transmitted by the source monitor unit. Radiation intensity, preferably in the form of count or count rate data, is automatically and continuously transmitted to the remote monitoring station along with an identifier such as a source serial number. In addition, time of day, type of radiation source, radiation intensity, and geographic location of the source is automatically transmitted to the remote monitoring station at predetermined time intervals. All of the above information is transmitted immediately if the source security is breached, wherein source security breach includes tampering with the source or the source container, and exchanging or removing the source by unauthorized personnel. The information is also transmitted upon query or “polling” by the remote monitoring station. Various information can also be entered into the source monitor unit manually via the manual input as the source, container, and monitor unit pass through check points and the like.
These and other features and innovations of the present invention will be readily apparent to those of skill in the art from a review of the following detailed description along with the accompanying drawings.
So that the manner in which the above recited features, advantages, and objects of the present invention are obtained and can be understood in detail, more particular description of the invention, briefly summarized above, may be had by reference to the embodiments thereof which are illustrated in the appended drawings.
The Monitor Unit
Still referring to
Again referring to
It is desirable to know the physical position of the source monitor unit 10 at all times. This is accomplished using a global positioning system (GPS) 20 that is operationally connected to the processor 16 and powered by the electronics package 18. Many transport vehicles are also GPS equipped. It should be understood that the integrated GPS element 20 can optionally be eliminated in this case, and position information can be input to the source monitor unit 10 by the vehicle's GPS (not shown). Alternatively, the GPS unit of the source monitor unit 10 may be associated with the GPS unit of the vehicle, and a substantial change in the relative positions of the associated GPS unit may indicate a breach during transport of the source.
Again referring to
The source monitor unit 10 shown in
The source monitor unit 10 can be manually activated or deactivated by authorized personnel using a manual input 22 such as a key pad, magnetic card reader, and the like. Any manual intervention is detected at the remote monitoring station 32 to confirm that the manual intervention is authorized and is not an attempt to breach the security of the source 34.
The following describes one method for processing response data measured by the detector 14 of the source monitor unit 10 shown in
Counts Ci from the detector 14 are summed within the processor 16 over time intervals ti, where values of ti are preferably contiguous to minimize statistical error in measurements. It is also preferred that all time intervals ti are equal. Values of Ci, where (i=1, . . . n) are measured and an average count CA is computed from the equation
The absolute difference /Ci−CA/ between the current Ci and the updated CA is compared with a predetermined statistical variation limit ε. If
(2)/Ci−CA/<ε
then the source integrity has not been tampered with, changed, or removed, and there is no security breach. The integer i is then incremented within the processor 16, the incremented value of i is compared to a report integer K for reasons to be subsequently disclosed, and a new value Ci is measured with i incremented. The average CA is updated in the processor 16, and the comparison shown in equation (2) is again made to check for any security breach during the incremented time interval.
If the comparison expressed mathematically in equation (2) fails, a security breach is indicated. The processor 16 initiates a report to be transmitted to the remote monitoring station 32 via the link 28. The report first and foremost is a notification of a source security breach, with the source being identified preferably by serial number. The report also preferably includes the time of day that the breach occurred as indicated by the clock 24, the geographical location of the breach as indicated by the GPS 20, the type of measured radiation, and the last measured count valued Ci that can be used to indicate that the security breach comprises tampering with or moving the source container 36, an exchange of source 34, or complete removal of the source from the container 36.
Assuming that no security breaches are indicated by the comparison of equation (2), a source status report is optionally transmitted from the source monitor unit 10 to the remote monitoring station 32 when i reaches a predetermined report integer K, which is preferably preprogrammed in the processor software. Assume for purposes of discussion that ti is programmed in the processor 16 to be 5 minutes and K is preprogrammed to be 12, then a source status report will be automatically and continuously transmitted to the remote monitoring station every hour. It should be understood that other time intervals ti and other report integers K can be selected to vary the intervals between automatic source status reports.
As a second example, ti is programmed in the processor 16 to be 1 second and K is preprogrammed to be 60, then a source status report will be automatically and continuously transmitted to the remote monitoring station every minute. In addition, every value Ci can be transmitted automatically and continuously to the remote monitoring station. Furthermore, K can be set to unity thereby transmitting a source status report with every value Ci.
As mentioned previously, other methodologies can be used to detect a source security breach using process response data generated the detector 14 of the source monitor 12. As an example, count rate from the detector 14 can be computed either continuously or over predetermined time intervals ti. If the count rate deviates significantly from a running average of count rate, or alternately from a predetermined “calibration” count rate, a source security breach is indicated.
In summary, response data from the detector 14 are processed within processor 16 of the source monitor unit 10 to identify a breach in source security, and information regarding the breach is automatically transmitted to the remote monitoring station 32.
From the conceptual illustration of
While the foregoing disclosure is directed toward the preferred embodiments of the invention, the scope of the invention is defined by the claims, which follow.