A Review of Nonimaging Stand-Off Concealed
A Review of Nonimaging Stand-Off Concealed
The author thanks Dr. Kate Remley, Editor of IEEE Riley, R. C. Smythe, and B. D. Weglein, “The effects of acceleration
on precision frequency sources,” U.S. Army Lab. Command Elec-
Microwave Magazine, and the reviewers for their insight- tron. Technol. Dev. Lab., Fort Monmouth, NJ, Res. Dev. Tech. Rep.
ful suggestions that improved this article. SLCET-TR-91-3 (Rev. 1).
[3] G. R. Kurzenknabe, “Phase noise under vibration in crystal
References oscillators,” in Measurement Product Dig., May/June 1989, pp.
[1] S. Goldman, “Phase noise leakage through a mixer,” MSN CT, pp. 33–35.
80–96, Nov. 1987.
Correction
Due to a production error, four references were left [13] D. C. Schleher, Electronic Warfare in the Information Age. Boston:
Artech House, 1999, pp. 380–381, (6.10) and (6.6.12).
out of the Application Note by Samuel J. Caprio [1]
[14] R. L. Goodwin, “Ambiguity-resistant three- and four- channel
in the last issue. The following are the correct refer- interferometers,” Tactical Electronic Warfare Division, Naval
ences that should have appeared on the list, with Res. Lab., Washington, DC, p. 23, Table 3-1.
added information that should have appeared in the [15] S. J. Caprio, “Effects of single-tone spurious signals in ESM re-
ceivers,” Microwave J., vol. 53, no. 10, pp. 64–70, Oct. 2010, (8)
citation of the reference in text (e.g., equation num-
and Figure 1.
ber, etc.). We apologize for this error and any confu- [16] R. L. Goodwin, “Ambiguity-resistant three- and four- channel
sion it may have caused. interferometers,” Tactical Electronic Warfare Division, Naval
Res. Lab., Washington, DC, pp. 4–5, Figs. 1 and 2.
[12] W. Bishop, “Interferometer accuracy and DOA cell size trade-
offs,” private communication, Apr. 19, 1978.
Reference
[1] S. J. Caprio, “Specifying upper bounds on phase noise in phase-
locked oscillators in electronic warfare systems—Part I [Appli-
Digital Object Identifier 10.1109/MMM.2011.2178290 cation Notes],” IEEE Microwave Mag., vol. 11, no. 7, pp. 96–112,
Date of publication: 13 January 2012 2011.
T
here is now, more than ever before, a need for to conceal on the body, and successful detection is re-
technologies that enable the screening of people quired at considerable distance or stand-off range be-
from a distance. A wide variety of weapons can fore the bomber reaches the target area.
be easily concealed under clothing and carried into Current electromagnetic screening technologies,
crowded public sites to target national infrastructure, such as metal detectors, explosive trace detection, and
spread fear, and inflict mass murder and casualties. x-ray backscatter are very restricted in the coverage,
The most feared and devastating terrorist weapon is stand-off capability, flexibility, and efficacy they afford.
the suicide bomb or person borne improvised explo- Perhaps the most widely known of these technologies
sive device (PBIED). Such devices are relatively simple is millimeter-wave or submillimeter-wave imaging [1]–
[7], where millimeter-wave images are interpreted by a
trained human operator or by computer algorithm to
ascertain the presence or absence of concealed threats.
Stuart William Harmer ([email protected]),
Nicholas Bowring, David Andrews, Nacer Ddine Rezgui, Millimeter-wave imaging is certainly the most com-
Matthew Southgate, and Sarah Smith are with monly employed technique for stand-off detection of
The School of Electrical and Electronic Engineering at concealed threats.
Manchester Metropolitan University, Manchester, U.K. A prerequisite of a screening system based on imag-
ing is the ability to form an image in which there exists
Digital Object Identifier 10.1109/MMM.2011.2174125 a contrast between concealed items and the human
Date of publication: 13 January 2012
body. This condition requires that the portion of the
400
350
Beam FWHM (mm)
300
250
200
150
100
50
0
5 10 15 20 25 30
Range-m
Number of Sweeps
60 60
80 80
100 100
120 120
140 140
160 160
180 180
200 200
2,900 2,950 3,000 3,050 3,100 3,150 3,200 3,250 3,300 2,900 2,950 3,000 3,050 3,100 3,150 3,200 3,250 3,300
Target Depth (mm) Target Depth (mm)
(a) (b)
Figure 5. Axial depth profiles for a person at an indicated range of ~ 3 m. The plots show the strength of return (red being
highest and blue zero) at different ranges (horizontal axis) as a function of increasing numbers of frequency scans of target
(vertical axis). (a) is for a body with no explosive device while (b) is for a body with a PBIED without any fragmentation; the
device clearly shows up as a area of significant radar return immediately in front of the body response.
trained networks for items of interest; these training not reproduced by any other commonly carried benign
sets can include a broad spectrum of threat objects or objects. The exact type of fragmentation used, includ-
can instead focus on very specific items. Detection and ing nails, nuts and bolts, and ball bearings, did not
discrimination of PBIED containing shrapnel compo- greatly affect performance. Other, smaller, threat items,
nents (see Figures 7 and 8) is particularly effective, such as handguns, can be detected and differentiated
with the system being able to differentiate successfully with some success, but at lesser standoff ranges, where
between a person carrying such a device and a per- the beam size is smaller and more suited to the detec-
son without an explosive device but carrying the usual tion of these items. By taking multiple scans, a more
accoutrements of modern living such as a mobile robust detection of the threat level can be made. The
phone, iPod, car keys, wallet, etc, at ranges up to 25 m effect of multiple scans on the discrimination of PBIED
(see Figure 4). by both polarimetric and axial profile determination is
Fragmentation components of a simulated PBIED shown in Figures 4 and 5. In walking tests, where the
present such a good target because the small fragments subject walks towards the radar system as readings are
whose size is around one centimeter to provide a strong taken, the range-scaled polarimetric data clearly allows
cross-polarized return from a large body area, which is differentiation between a person carrying a simulated
Radar Ranger
Lens
Multiplier to
Microwave
W-Band
Source
Frequencies
Control,
Processing, and
Threat
Evaluation
Single Receiver Channel
Analog to Zero
Low-Noise
Digital Bias
Amplifier
Converter Detector
Figure 6. Schematic of Manchester Metropolitan University concealed threat detection radar system showing major system
blocks.
40
60
30
Counts
Counts
40
20
20
10
0 0
0 0.5 1 1.5 2 2.5 3 0 0.5 1 1.5 2 2.5 3
Copolar Amplitude X-Polar Amplitude
(a)
50 20
40
15
30
Counts
Counts
10
20
5
10
0 0
0 0.5 1 1.5 2 2.5 3 0 0.5 1 1.5 2 2.5 3
Copolar Amplitude X-Polar Amplitude
(b)
Figure 7. Amplitude histograms of radar return in copolarized and cross-polarized (X-polar) channels for (a) a person
without a PBIED and (b) with PBIED. The data was taken for a person walking toward the radar system, each data point has
been range scaled (to remove effects of range on amplitude), and normalized with reference to a test target.