key: cord-1028909-c674xxbo authors: Farina, Alfonso; Ortenzi, Luciana; Ristic, Branko; Skvortsov, Alex title: Chapter 22 Integrated Sensor Systems and Data Fusion for Homeland Protection date: 2014-12-31 journal: Academic Press Library in Signal Processing DOI: 10.1016/b978-0-12-396500-4.00022-3 sha: 79218b7084ef4c8e3fb854a04a61a35a5efaf6c2 doc_id: 1028909 cord_uid: c674xxbo Abstract This chapter addresses the application of data and information fusion to the design of integrated systems in the Homeland Protection (HP) domain. HP is a wide and complex domain: systems in this domain are large (in terms of size and scope) integrated (each subsystem cannot be considered as an isolated system) and different in purpose. Such systems require a multidisciplinary approach for their design and analysis and they are necessarily required to provide data and information fusion in the most general sense. The first data fusion algorithms employed in real systems in the radar field go back to the early seventies; now a days new concepts have been developed and spread to be applied to very complex systems with the aim to achieve the highest level of intelligence as possible and hopefully to support decision. Data fusion is aimed to enhance situation awareness and decision making through the combination of information/data obtained by networks of homogeneous and/or heterogeneous sensors. The aim of this chapter is to give an overview of the several approaches that can be followed to design and analyze systems for homeland protection. Different fusion architectures can be drawn on the basis of the employed algorithms: they are analyzed under several aspects in this chapter. Real study cases applied to real world problems of homeland protection are provided in the chapter. and data links. After conceiving also algorithms to track targets on the basis of the angle and identification measurements provided by ESM on a moving platform, data fusion of active and passive tracks was provided [14] [15] [16] [17] . Nowadays concepts have been developed and spread to be applied to very complex systems with the aim to achieve the highest level of intelligence as possible and hopefully to support decision. Data fusion is aimed to enhance situation awareness and decision making through the combination of information/data obtained by networks of homogeneous and/or heterogeneous sensors. A sensor network presents advantages over a single sensor under different points of views, as it supplies both redundant and complementary information. Redundant information is exploited to make the system robust to the failure in order that a malfunction of an entity of the system means only a degradation of the performances, rather than the complete failure of the system, since information about the same environment can be obtained from different sources. More robustness can be achieved also with respect to interferences, both intentional and unintentional, due to frequency and spatial diversity of the sensors. Complementary information build up a more complete picture of the observed system; for example sensors are dislocated over large regions providing diverse viewing angles of observed phenomenon and different technologies can be employed in the same application to provide improved system performance. A large number of different applications, algorithms and architectures have been developed exploiting these advantages. Several examples can be found in robotics, military applications, Homeland Protection and management of large and complex critical infrastructures. Although the specific nature of each problem is different, the final goal, from the point of view of the sensed information, is always the same: using all the available data to better understand the investigated phenomena. The aim of this chapter is to give an overview of the several approaches that can be followed to design and analyze systems for Homeland Protection. Different fusion architectures can be drawn on the basis of the employed algorithms; according to this approach, three general categories can be identified in the literature [18, 19] : centralized, hierarchical, and decentralized/netcentric. The traditional architecture is centralized: in this framework several sensing devices are connected to a central component, the fusion node. For example, in the case of a sensor network employed for the surveillance of an area, usually the information traffic goes from the sensor nodes to a single sink node called information fusion center. According to the information received from the sensors, the fusion center monitors the area where the sensors are deployed and decides the actions to take. Conceptually, the algorithms employed in this case are relatively simple and the resource allocation is straightforward because the central component has an overall view of the whole system. This kind of architecture presents several drawbacks: high computational load, the possibility of catastrophic failure when the fusion node goes down and the lack of flexibility to changes of the system and sensor entities. Therefore this approach is still valid if the number of sensors, whose information is fused, independently of the width of the area to be monitored, is limited and also the relationship and interconnections among sensors are limited too. In hierarchical architectures, there are several fusion nodes, where intermediate fusion processes are performed, and an ending central fusion node. The principle of a hierarchy is to reduce the communications and computational loads of centralized systems by distributing data fusion tasks among a hierarchy of sensor entities. However in a hierarchy there is still a central component acting as a fusion center. Entities constituting local fusion center, locally process information and send it to the central fusion node. This approach is commonly used in robotics and surveillance applications. Although this architecture reduces the computational and communication loads, there are still some drawbacks The diagram of Figure 22 .2 provides a decomposition of the Homeland Protection domain: the two main sub-domains are Homeland Defense (HD) and Homeland Security (HS) [21] . HD includes the typical duties and support systems of military joint forces and single armed forces. Usually HD systems are strictly military, are employed by military personnel only, satisfy specific technical requirements, operational needs and environmental scenarios, and in most cases are designed to face only military threats. The new trend aims to employ military surveillance systems in combined military and civil operations, especially to face terrorism [22] . The military domain has also been swept in recent years by the NCO paradigm; NCO predicates a tighter coupling among forces, especially in the cognitive domain, to achieve synchronization, agility and decision superiority and it is a strong driver in the transformation from a platform-centric force to a network-centric force [20] . HS is a very broad and complex domain that requires coordinated action among national and local governments, private sector and concerned citizens across a country; it covers issues such as crisis management, border control, critical infrastructure protection and transportation security [23, 24] . Crisis management is the ability of identifying and assessing a crisis, planning a response, and acting to resolve the crisis situation. Border control aims to build a smart protection belt all around a country to counter terrorism and illegal activities; yet it is not resolutive due to the difficulty of controlling the country boundaries along their full and variegated extension, the non necessarily physical nature of attacks in the current information age, and the threats which often arise internally to the country itself. HS includes also land security that is particularly critical because of its complexity and strategic importance; the security of critical assets, such as electric power plants, communication infrastructures, strategic areas and railway networks, must be ensured continuously in space and time [25] [26] [27] . The most recent terrorist attacks have shown the vulnerability of national critical infrastructures [28] and have made the world aware of the possibility of large-scale terrorist offensive actions against civil society: the September 11th, 2001 attack on the World Trade center in New York City is the most dramatic example of this new terrorism. The main emphasis has been put on the terrorist threat, but what emerges is the fragility and vulnerability of modern society to both deliberate threats and natural disasters. The HP domain includes also the protection from deliberate attacks against the commercial activities of a Country led also out of the national territory, comprehensive also of the territorial waters and Exclusive Economic Zone (EEZ). Seaborne piracy against transport vessels remains a significant issue (with estimated worldwide losses of US$13-16 billion per year), particularly in the waters between the Red Sea and Indian Ocean, off the Somali coast, and also in the Strait of Malacca and Singapore, which are navigated by over 50,000 commercial ships a year [29, 30] . The globalization, the pervasiveness of information technologies and the transformation of the industrial sector and civil society have created new vulnerabilities in the system as a whole, but all this has happened without a corresponding effort to increase its robustness and security. As an example, single infrastructure networks have grown over the years independently, creating autonomous "vertical" systems with limited points of contact; around year 2000, as a consequence of the change of trend in the socio-techno scenario, the infrastructures have begun to share services and thus to create interconnected and interdependent systems. Nowadays infrastructures are interconnected and mutually dependent in a complex way: a phenomenon that affects one infrastructure can have a direct or indirect impact on other infrastructures, spreading on a wide geographical area and affecting several sectors of the citizen life. This is schematically represented in Figure 22 .4 [31, 32] . Beside the physical protection of territory, citizens, critical assets and activities, the security of information and computer systems is one the greatest challenges for a Country. Information and communication technologies have enhanced the efficiency and the comfort of the civil society on one hand, but added complexity and vulnerability on the other hand. The cyber security consists in ensuring the protection of information and property from hackers, corruption, or natural disaster, maintaining however the information and property accessible and productive to its intended users. This problem is pervasive in nearly all the systems supporting a nation: financial, energy, healthcare and transportation. The new trend toward the mobile communications is revealing a new cyber vulnerability, for instance the sheer mass of mobile endpoints gives more protection to hackers leading a cyber attack starting from a mobile. Therefore, the mobile infrastructure is becoming a critical infrastructure as well [33] . Nowadays the challenge is to understand this new scenario and to address the use of new and efficient algorithms for the information fusion in the domain of large integrated systems [34] . To integrate such heterogeneous information the necessity emerges to develop new algorithms of data fusion and information fusion to achieve an operational picture. In such scenario, where the attack can be lead with unconventional manners, information of heterogeneous sources, despite appearing uncorrelated, Interdependencies between present infrastructures. (From [31] , reprinted with permission.) can be related and hence exploited by its fusion. Therefore particular attention is due to the information sources; Section 2.22.4 is devoted to this aspect of the problem, giving an overview of the sensors and the systems that traditionally provide information. Before addressing in more detail the topic of data fusion applied to the domain of Homeland Protection, it is useful to briefly review the evolution of data fusion and, more recently, the definition of the new paradigms and the introduction to high-level data fusion and information fusion. A definition of data fusion is provided in [35] : "Data fusion is a process that combines data and knowledge from different sources with the aim of maximizing the useful information content, for improved reliability or discriminant capability, while minimizing the quantity of data ultimately retained." Another definition is provided by the Joint Directors of Laboratories (JDL) Data Fusion Subpanel (DFS) which, in its latest revision of its data fusion model, Steinberg and Bowman [36] settle with the following short definition: "Data fusion is the process of combining data or information to estimate or predict entity states." Due to its generality, the definition of JDL encompasses the previous one. One aspect of the data fusion process, which is not included in the first definition and is implicit in the second, is process refinement, i.e., the improving of data fusion process and data acquisition. Many authors, recognize process refinement and data fusion to be so closely coupled that process refinement should be considered to be a part of the data fusion process. This is not a new technique in itself, rather a framework for incorporating reasoning and learning with perceived information into systems, utilizing both traditional and new areas of research. These areas include decision theory, management of uncertainty, digital signal processing, and computer science. The data fusion process comprises techniques for data reduction, data association, resource management, and fusion of uncertain, incomplete, and contradictory information. In 1986, an effort to standardize the terminology related to data fusion began and the JDL data fusion working group was established. The result of that effort was the conception of a process model for data fusion and a data fusion lexicon. The so-called JDL fusion model [37] is a functional model, developed to overcome potential confusion in the community and to improve communications among military researchers and system developers. The model provides a common frame of reference for fusion discussions and to facilitate understanding and recognizing the problems where data fusion is applicable. The first issue of the model, dated 1988, provided four fusion levels: • level 1: Object refinement, • level 2: Situation refinement, • level 3: Threat refinement, • level 4: Process refinement. In 1998 Steinberg et al. [38] revised and expanded the JDL model to broaden the functional model and related taxonomy beyond the original military focus. They introduced a level 0 to the model for estimation and prediction of signal/object observable states on the basis of pixel/signal-level data association and characterization. They also suggested renaming and re-interpretation of level 2 and level 3 to focus on understanding the external world beyond military situation and threat focus. Figure 22 .5 reports a block diagram representing this functional model. Although originally developed for military applications, the model is generally applicable. Furthermore, the model does not assume its functions to be automated, they could equally well be maintained by human labor. Hence, the model is both general and flexible. The revised JDL model levels specify logical separations in the data fusion process and divide information into different levels of abstraction depending on the kind of information they produce, where the lower levels yield more specific, and the higher more general, information. The model is divided into the following five levels [18] : • Level 0-sub-object assessment: the pre-detection activities such as pixel or signal processing, spatial or temporal registration is present. Level 0 deals with the estimation and prediction of signal/object observable states on the basis of pixel/signal level data association and characterization. • Level 1-object assessment: is concerned with estimation and prediction of target locations, behavior or identity. In this level, which is sometimes referred to as multi-sensor data fusion or multisensor integration, data is combined to assign dynamic features (e.g., velocity) as well as static (e.g., identity) to objects, hence adding semantic labels to data. This level includes techniques for data association and management of objects (including creation and deletion of hypothesized objects, and state updates of the same). Level 1 addresses the following functions: data alignment, data/object correlation, object positional/kinematic/attribute estimation, object identity estimation. • Level 2-situation assessment: investigates the relations among entities such as force structure and communication roles. This level involves aggregation of level 1 entities into high-level, more abstract entities, and relations between entities. An entity in this level might be a pattern of connected objects of level 1 entities. Input data are assessed with respect to the environment, relationship among level 1 entities, and entity patterns in space and time. Level 2 addresses the following functions: object aggregation, contextual interpretation/fusion, event/activity aggregation, multi-perspective assessment. • Level 3-impact assessment: outlines sets of possible courses of action and the effect on the current situation. The impact assessment, which is sometimes called significance estimation or threat refinement, estimates and predicts the combined effects of system control plans and the entities of level 2 (possibly including estimated or predicted plans of other environment agents) on system objectives. Level 3 addresses the following functions: estimate/aggregate force capabilities, predict enemy intent, identify threat opportunities, estimate implications, multi perspective assessment. • Level 4-process refinement: is an element of Resource Management used to close the loop by re-tasking resources to support the objectives of the mission. Process refinement evaluates the performance of the data fusion process during its operation and encompasses everything that refines it, e.g., acquisition of more relevant data, selection of more suitable fusion algorithms, optimization of resource usage with respect to, for instance, electrical power consumption. Process refinement is sometimes called process adaption to emphasize that it is dynamic and should be able to evolve with respect both its internal properties and the surrounding environment. The function of this level is in some literature handled by a so called meta-manager or meta-controller. It is also rewarding to compare level 4 fusion to the concept of covert attention in biological vision which involves, e.g., sifting through an abundance of visual information and selecting properties to extract. Level 4 addresses the following functions: evaluation (real-time control/long term improvement), fusion control, source requirements, mission management. The 1998 revised JDL fusion model recognized the original Process Refinement level 4 function as a Resource Management function. In 2002, a level 5 was added [39, 40] , named User Refinement, into the JDL model to support a user's trust, workload, attention, and situation awareness. Mainly the level 5 was added to distinguish between machine-process refinement and user refinement of either human control action or the user's cognitive model. In many cases the data fusion process is focused on the machine point of view, however a full advantage can be taken by considering also the human factor, not only as a qualified expert to refine the fusion process, but also as a costumer for whom the fusion system is designed. Figure 22 .6, taken from [40] , shows the JDL fusion model including also the level 5. Later in [41] also a level 6, Mission Management, was added; this level tackles the adaptive determination of spatial-temporal control of assets (e.g., airspace operations) and route planning and goal determination to support team decision making and actions (e.g., theater operations) over social, economic, and political constraints. Figure 22 .7 shows a multi-sensor data fusion architecture with a representation of the levels involved into each process of data fusion. Level 0 and level 1 concern the combination of data from different Data fusion architecture. sensors, level 2 and level 3 are often referred to as information fusion. Under the proposed partitioning scheme, the same entity can simultaneously be the subject of level 0, 1, 2, and 3 fusion processes. Entity features can be estimated from one or more entity signal observations (e.g., pixel intensities, emitter pulse streams) via a level 0 data preparation/association/estimation process. The identity, location, track and activity state of an entity (whether it be a man, a vehicle, or a military formation) can be estimated on the basis of attributes inferred from one or more observations; i.e., via a level 1 data preparation/association/estimation process. The same entity's compositional or relational state (e.g., its role within a larger structure and its relations with other elements of that structure) can be inferred via level 2 processes. Thus, a single entity-anything with internal structure, whether man, machine, or mechanized infantry brigade-can be treated either as an individual, subject to level 1 observation and state estimation-or as a "situation," subject to compositional analysis via level 2 entity/entity association and aggregate state estimation. The impact of a signal, entity, or situation on the user goal or mission can then be predicted based upon an association of these to alternative courses of action for each entity via a level 3 process. There are also other fusion models developed on the basis of different perspectives, including a purely computational and a human information processing. In the following an overview of different models [42] . The DIKW (Data Information Knowledge and Wisdom) [43] hierarchy organizes data, information, knowledge, and wisdom in layers with an increasing level of abstraction and addition of knowledge, starting from the bottommost data layer. The hierarchy can be considered alike the JDL data fusion model because both start from raw transactional data to yield knowledge at an increasing level of abstraction. The JDL model and many other computational models do not simulate the complex human cognitive process that leads to "become aware," because they do not model the fusion process from a human perspective. In 1988, Endsley defined the situation awareness as "the perception of the elements in the environment within a volume of time and space, the comprehension of their meaning, and the projection of their state in the near future" [44] . In [45, 46] he identified three levels of situation awareness, namely perception, comprehension, and projection, parallel to the corresponding levels in the JDL model. Therefore the levels in the JDL model can be considered as processes producing results to help a human operator became aware of the situation. In [47] in addition to this three different aspects identified by Endsley, the model included also "intention" (i.e., the understanding of own options and courses of action relative to own goals) and "metacognition" (i.e., accounting for how reliable own situation awareness is likely to be). These levels summarize the fact that situation awareness requires the understanding of information, events, and the impact of own actions on own goals and objectives. This process involves several capabilities as learning, detection of anomalies, prediction of future behaviors, managing uncertainty, and analysis of heterogeneous sources. The OODA (Observe-Orient-Decide-Act) loop, developed by Boyd in 1987 [48] , is one of the first C4I (Command, Control, Communications, Computers, and Intelligence) architectures and it represents the classic decision-support mechanism in military information operations. Because decision-support systems for situational awareness are tightly coupled with fusion systems, the OODA loop has also been used for sensor fusion [49] . Observations in OODA refer to scanning the environment and gathering information from it; orientation is the use of the information to form a mental image of the circumstances; decision is considering options and selecting a subsequent course of action; and action refers to carrying out the conceived decision. Bedworth and O'Brien [50] report a comparison of the OODA loop to the levels of the JDL model. The human information processing can be modeled by the Rasmussen model [51, 52] . It is composed of three layers, namely skill-based, rule-based, and knowledge-based processing. The input of the process is a perception (e.g., the detection of a target by a sensor) and the output is an action. An example of result at the first level may be represented by the automatic identification of a tank by processing of row sensors data; at the next level an enemy unit composition can be indentified on the basis of its number and relative locations. Knowledge-based behavior represents the most complex cognitive processing used to handle novel, complex, situations where no routine or rule is available to manage situations. An example of this type of processing may be the interpretation of unusual behavior, and the consequent generation of a course of actions based on enemy unit size and behavior. The Generic Error modeling System (GEMS) [53] is an extension of Rasmussen's approach, which describes the competencies needed by workers to perform their roles in complex systems. GEMS describes three major categories of errors: skill-based slips and lapses, rule-based mistakes, and knowledge-based mistakes. Table 22 .1, from [42] , shows a correspondence, and not a comparison, among levels and layers of various models presented before. This table is intended as a guide to identify the components of a data fusion architecture, where the separation between the columns is not so sharp. Notice that the JDL model does not explicitly model into a level the action consequent to the threat assessment. The action Rule/knowledgebased processing n/a n/a level, with the sense of a reaction is only in part included in the process refinement level 4, for this reason the column "action" has been inserted in the table, to allow a more clear correspondence with the other models that explicitly account for the reaction. The JDL model is the one that allows the most global view of the data fusion process from an operative perspective: there is not any correspondence of the other models with JDL level 4. This section gives a broad and very general description of the basic categories of intelligence that are the source of data/information employed to perform the fusion process. The USAF (United States Air Force) in 1998 first and the ODNA (Office of Directors of National Intelligence) later in 2008 described in their studies that there are six basic intelligence categories [54, 55] : In addition, there is also Scientific and Technical (S&T) Intelligence resulting from the analysis of foreign scientific and technical information. In the following is an overview of the categories. SIGINT is achieved by the interception/detection of electromagnetic (em) emissions. SIGINT includes Electronic Intelligence (ELINT) and Communications Intelligence (COMINT). The former derives from the processing and analysis of em radiation emitted from emitters, in most of cases radars, not employed for communications, other than nuclear detonations or radioactive sources. An emitter may be related closely to a specific threat. The information that can be achieved by a typical ESM (Electronic Support Measures) device consists of an estimate of the emitter category, location, with a certain accuracy, and various electronic attributes, such as frequency and pulse duration. This information can be employed in a high-level fusion process. COMINT derives from the processing and analysis of intercepted communications from emitters. The communications may be encrypted and they may be of several forms such as voice, e-mail, fax and the like. IMINT is obtained by sensors working in several bandwidths which are able to produce a view of the scenario or of the specific target: electro/optical sensors, infrared, radar (e.g., Synthetic Aperture Radar (SAR) and Inverse SAR (ISAR), and Moving Target Indicator (MTI)), laser, laser radar (LADAR), and multi-spectral sensors. Each sensor has a unique capability. Some work in all weather conditions, some may work also in night conditions, and some produce high-quality images with detectable signatures. MASINT is obtained by the collection and the analysis of several and heterogeneous sensors and instruments usually working in different regions or domains of the em spectrum, such as infrared or magnetic fields. MASINT includes Radar Intelligence (RADINT), Nuclear Intelligence (NUCINT), Laser Intelligence (LASINT), and Chemical and Biological Intelligence (CBINT). RADINT, for example, is a specialized form of ELINT, which categorizes and locates as active or passive collection of energy reflected from a target. HUMINT is the collection of information derived by the human contact. Information of interest might include target name, size, location, time, movement, and intent. HUMINT typically includes structured text (e.g., tables, lists), annotated imagery, and free text (e.g., sentences, paragraphs). HUMINT provides comprehension of adversary actions, capability and capacity, plans and intentions, decisions, research goals and strategies. OSINT is publicly available information appearing either in print or in electronic form including radio, television, newspapers, journals, the Internet, commercial databases, videos, graphics, and drawings. OSINT can be considered as a complement to the other intelligence categories and can be used to fill gaps and improve accuracy and confidence in classified information. A special mentioning is for the Internet, that, with its blogs, e-mails, videos, messages and mobile systems, favors an ever greater interaction between users. Moreover notice that there is a little overall planning in the development of the World Wide Web, but rather a myriad of initiatives by individuals of small groups. Government have always tried to use telephone tapping, surveillance, files, i.e., intelligence. Now this is possible on a different scale given the technical possibilities offered by satellites, mobile, phones, credit cards management systems, information storage, etc. From the topological point of view, Internet is a scale-free complex network with a power-law of the distribution of the nodes [56] ; this technical remark should be considered in the data exploitation analysis. GEOINT is the analysis and the visual representation of the activities on the earth related to the security achieved by the sensors (radar, optical, IR, multispectral) deployed in the space. The information related to GEOINT is obtained through an integration of imagery, imagery intelligence, and geospatial information. Stand-alone sensors usually provide a fragmentary view of a complex situation of interest. A significant enhancement of performance can therefore be accomplished by a combination of networked sensors in the close vicinity to the region of interest. Using efficient methods of centralized or decentralized multiple sensor fusion, the quality of the produced situation picture can significantly be improved. In practice, improvements with respect to the following aspects are of interest: • production of accurate and continuous tracks (e.g., objects, persons, single vehicles, group objects), • system reaction rates (e.g., track extraction, detection of target maneuvers, track monitoring), • sustainment of reconnaissance capabilities in case of either system or network failures (e.g., graceful degradation), • system robustness against jamming and deception, • compensation of degradation effects (e.g., sensor misalignment, limited sensor resolution), • robustness against sub-optimal real-time realizations of sensor data fusion algorithms, • processing of eventually delayed sensor data (e.g., out-of sequence measurements). In the following, several sections tackle different aspects related to homogeneous sensor networks. Sensor fusion networks can be categorized according to the type of sensor configuration. Durrant-Whyte distinguishes three types of sensor configuration as schematized in Figure 22 .8 [57, 58] . Sensors configuration (from [57] , reprinted with permission). Competitive sensor data fusion: Sensors are configured competitive if each sensor delivers independent measurements of the same property. Sensor data represent the same attribute, and the fusion is to reduce uncertainty and resolve conflicts. Competitive sensor configuration is also called a redundant configuration. Sensors S1 and S2 in Figure 22 .8 represent a competitive configuration, where both sensors redundantly observe the same property of an object in the environment space. Complementary sensor data fusion: A sensor configuration is called complementary if the sensors do not directly depend on each other, but can be combined to give a more complete image of the phenomenon under observation. Fusion of the sensor data provides an overall and complete model. Examples for a complementary configuration is the employment of multiple cameras each observing disjoint parts of a room, or using multiple spectrum signatures to identify a land cover type, or using different waveform to identify an aircraft type. Sensor S2 and S3 in Figure 22 .8 represent a complementary configuration, since each sensor observes a different part of the environment space. In both competitive and complementary sensor configurations, there is an improvement of the accuracy of the target characteristics estimation consequent to the data fusion. In their seminal work H. Cramer and C.R. Rao found how to compute the best theoretical accuracy that can be achieved by an estimator. The lower bound of accuracy, i.e., the mean square error of any unbiased estimator, is given by the inverse of the so-called Fisher Information Matrix (FIM). The computation of the CRLB (Cramer-Rao Lower Bound) applies to problems involving the maximum likelihood estimation of unknown constant parameters from noisy measurements [59] . The best achievable improvement of target location and track accuracy can be quantified by the reduction of the CRLB consequent to the track fusion. In [60] this computation is reported in case of fusion of data from two sensors with an ideal unitary detection probability. In [61, 62] the same computation has been proposed in case of detection probability less than one and false alarm probability higher than zero. Cooperative sensor data fusion: A cooperative sensor network uses the information provided by two independent sensors to derive information that would not be available from the single sensors. An example for a cooperative sensor configuration is stereoscopic vision: by combining two-dimensional images from two cameras at slightly different viewpoints a three-dimensional image of the observed scene is derived. Cooperative sensor fusion is the most difficult to design, because the resulting data are sensitive to inaccuracies in all individual participating sensors. Thus, in contrast to competitive fusion, cooperative sensor fusion generally decreases accuracy and reliability. Sensor S4 and S5 in Figure 22 .8 represent a cooperative configuration. Both sensors observe the same object, but the measurements are used to form an emerging view on object C that could not have been derived from the measurements of S4 or S5 alone. These three categories of sensor configuration are not mutually exclusive. Many applications implement aspects of more than one of the three types. An example for such a hybrid architecture is the application of multiple cameras that monitor a given area. In regions covered by two or more cameras the sensor configuration can be competitive or cooperative. For regions observed by only one camera the sensor configuration is complementary. Sensor networks have countless applications, for example, we mention the sensor networks used in computer science and telecommunications, in biology, where they can be used to monitor the behavior of animal species such as birds or fishes, and in habitat monitoring, where they can be used to provide real-time rainfall and water level information used to evaluate the possibility of flooding. In the field of Homeland Protection one of the main task to be assigned to a sensor network is the surveillance with its most general significance. Automatic surveillance is a process of monitoring the behavior of selected objects (targets and/or anomalies) inside a specific area by means of sensors. A target generally consists of an object (e.g., a tank close to a land border or a rubber approaching to the coast) whose presence and characteristics can be detected and estimated by the sensor; an anomaly consists in a non usual behavior (e.g., a jeep moving off-road, the increasing of the radioactivity level within an area) that can be revealed by the sensor. Sensors typically provide the following functions: • detection of a targets or anomalies inside the surveillance area, • estimation of target position or the anomaly localization and extension, • monitoring of the target kinematic (tracking) or of the anomaly behaviors, • classification and/or recognition of the targets. To perform the previous functions, the sensors can be organized on the bases of several approaches. The classical approach to surveillance of wide areas is based on the use of a single or few sensors with long range capabilities. The signal received by the single sensor is processed by means of suitable digital signal processing subsystems. In this case the sensors are costly, with adequate computation and communication capabilities. Sensors are normally located in properly selected sites, to mitigate terrain masking problems; nevertheless, they provide different performance depending on the location of target inside the surveillance area. Typical sensors are radars (ground-based, air-borne, ship-borne or space-based), infrared or TV cameras, seismic, acoustical, radioactive sensors. Usually in this kind of networks, as represented in Figure 22 .9, the information traffic goes from the sensor nodes to a single Block-diagram for optimal system resource management in a sensor network. sink node called information fusion center that performs the target localization and tracking. According to the information received from the sensors the fusion center monitors the area where the sensors are deployed and decides, on the basis of the state estimates and their accuracy (e.g., a covariance matrix for a Kalman filter or a particle cloud for a particle filter) the actions to take. In [63] an example of high-performance radar netted for Homeland Security application with a centralized data fusion process is described. The same classical approach is presented in [64] where this kind of sensor network is employed for natural resource management and bird air strike hazard (BASH) applications. However if an intruder reaches and neutralizes the fusion center, the communication between the network nodes are interrupted and the whole network is exposed to the risk of becoming useless as a network even if the individual sensors may still be all working. Nowadays, a novel approach to the automatic surveillance has been adopted; it is based on the use of many sensors with short range capabilities, low costs, and limited computation and communication capabilities. In case of a huge number of sensors, the use of information fusion centers is unpractical and their functioning is based on the information exchange between "near-by" sensors. The sensors can be distributed in fixed positions of the territory, but they could also be deployed adaptively to the change of the scenario. There are several approaches: they can be randomly distributed inside the surveillance area and if the number of sensors is high, the performance of the surveillance system can be considered independent of the location of the targets; then the signal received by each sensor is processed using the computational capabilities of a sub-portion of the sensor system and employed to re-organize dynamically the network. Sensors may be agile in a variety of ways, e.g., the ability to reposition, point an antenna, choose sensing mode, or waveform. Notice that the number of potential tasking of the network grows exponentially with the number of sensors. The goal of sensor management in a large network is to choose actions for individual sensors dynamically so as to maximize overall network utility. This process is called Collaborative Signal and Information Processing (CSIP) [65] . One of the central issues for CSIP to address is energy-constrained dynamic sensor collaboration: how to dynamically determine who should sense, what needs to be sensed, and who the information must be passed onto. This kind of processing system allows a limitation in the consumption of power. Applying a surveillance strategy which accounts for the target tracking accuracy and the sensor random location, only a limited number of sensors are awake and follow/anticipate the target movement; thus, the network self-organizes to detect and track the target, allowing an efficient performance from the energetic point of view with limited sensor prime power and with a reduced number of sensors working in the whole network. For example in [66] , instead of requesting data from all the sensors, the fusion center iteratively selects sensors for the target localization: first a small number of anchor sensors send their data to the fusion center to obtain a coarse location estimate, then, at each step a few non-anchor sensors are activated to send their data to the fusion center to refine the location estimate iteratively. Moreover the possibility to actively probe certain nodes allows to disambiguate multiple interpretations of an event. In [67] the techniques of information-driven dynamic sensor collaboration is introduced. In this case an information utility measurement is defined as the statistical entropy and it is exploited to evaluate the benefits in employing part of the network that consequently is re-organized. Other cost/utility functions can be employed as criteria to dynamically re-organize the sensor network as described in [68, 69] . Several analytical efforts have been done to evaluate the performance of such networks in terms of tracking accuracy. As usual the CRLB has been taken as reference of the best achievable accuracy; in particular a new concept of conditional PCRLB (Posterior Cramer Rao Lower Bound) is proposed and derived in [70] . This quantity is dependent on the actual observation data up to the current time, and is implicitly dependent on the underlying system state. Therefore, it is adaptive to the particular realization of the underlying system state and provides a more accurate and effective online indication of the estimation performance than the unconditional PCRLB. In [71, 72] the PCRLB is proposed as a criterion to dynamically select a subset of sensors over time within the network to optimize the tracking performance in terms of mean square error. In [73] the same criterion is proposed as a framework for the systematic management of multiple sensors in presence of clutter. Self-organization can be defined as the spontaneous set-up of a globally coherent pattern out of local interactions among initially independent components. Sensors are randomly spread out over a two dimensional surveillance area. In a self-organized system, its elements affect only close elements; distant parts of the system are basically unaffected. The control is distributed, i.e., all the elements contribute to the fulfillment of the task. The system is relatively insensitive to perturbations or errors, and have a strong capacity to restore itself. Initially independent components form a coherent whole able to efficiently fulfill a particular function [74] . Flocks of birds, shoals of fish, swarms of bees are examples of self-organizing systems; they move together in an elegantly synchronized manner without a leader which coordinates them and decides their movement. It has been shown that flocks of birds selforganize into V-formations when they need to travel long distances to save energy, by taking advantage of the upwash generated by the neighboring birds. Cattivelli and Sayed [75] propose a model for the upwash generated by a flying bird, and shows that a flock of birds is able to self-organize into a Vformation as if every bird processes spatial and network information by means of an adaptive diffusive process. This result has interesting implications. First, a simple diffusion algorithm is able to account for self-organization of birds. Second, according to the model, that birds can self-organize on the basis of the upwash generated by the other birds. Third, some information is necessarily shared among birds to reach the optimal flight formation. The paper also proposes a modification to the algorithm that allows birds to organize, starting from a V-formation, into a U-formation, leading to an equalization effect, where every bird in the flock observes approximately the same upwash. The same algorithm based on birds flight is extended in [76] to the problem of distributed detection, where a set of sensors/nodes is required to decide between two hypotheses on the basis of the collected measurements. Each node makes individual real-time decisions and communicates only with its immediate neighbors, in order that any fusion center is not necessary. The proposed distributed detection algorithms are based on diffusion strategies described in [77] [78] [79] and their performance is evaluated by means of classical probabilities of detection and false alarms. These diffusion detection schemes are attractive in the context of wireless and sensor networks thanks to their intrinsic adaptability, scalability, improved robustness to node and link failure as compared to centralized schemes, and their potential to save energy and communication resources. Several studies have shown how a simple self-synchronization mechanism, borrowed from biological systems, can form the basic tool for achieving globally optimal distribution decisions in a wireless sensor network with no need for a fusion center. Self-synchronization is a phenomenon first observed between pendulum clocks (hooked to the same wooden beam) by Christian Huygens in 1658. Since then, self-synchronization has been observed in a myriad of natural phenomena, from flashing fireflies in South East Asia to singing crickets, from cardiac peacemaker or neuron cells to menstrual cycles of women living in strict contact with each other [80] . The goal of these studies is to find a strategy of interaction among the sensors/nodes that could allow them to reach globally optimal decisions in terms of a "consensus" value in a totally decentralized manner. Distributed consensus algorithms are indeed techniques largely studied in distributed computing [81, 82] . The approaches suggested in [83, 84] give a form of consensus achieved through self-synchronization that may result critical in wide-area networks, where propagation delays might induce an ambiguity problem. This problem is overcome in [85] [86] [87] where also a model of the network and of the sensors is proposed. Each of the N nodes composing the network is equipped with four basic components: (1) a transducer that senses the physical parameter of interest y i (e.g., temperature, concentration of contaminants, radiation, etc.); (2) a local processing unit that provides a function g i (y i ) of the measurements; (3) a dynamical system, initialized with the local measurements, whose state x i (t) evolves as a function of its own measurement g i (y i ) and of the state of nearby sensors; (4) a radio interface that makes possible the interactions among the sensors. The criterion to reach a consensus value is the asymptotical convergence toward a common value of all the derivatives of the state, for any set of initial conditions and for any set of bounded. This condition makes the convergence to the final consensus independent of the network graph topology. However the topology has an impact on several aspects: the overall energy necessary to achieve the consensus and the convergence time. In general there exists a trade-off between the local power transmitted by a each sensor and the converge time depending on the algebraic connectivity of the network graph, as shown in [88] . In the practical applications these aspects cannot be neglected; for instance, the design of a network should account for the precision to achieve, and the time to get the consensus value at the given precision, versus such constraints as the energy limitations of the sensors. A global overview of the problem is given in [89] . Moving from the functional model to a working implementation in a real environment involves a number of design considerations: including what information sources to use and what fusion architecture to employ, communication protocols, etc. Admittedly, the fusion of data is decoupled from the actual number of information sources and, hence, does not require necessarily multiple sensors: the fusion, in fact, may be performed also on a temporal sequence of data that was generated by a single information source (e.g., a fusion algorithm may be applied to a sequence of images produced by a single camera sensor). However, employing a number of sensors provides many advantages as well explained in the previous Sections. Unsurprisingly, there are also difficulties associated with the use of multiple sensors. A missed sensor registration may cause a failure in the correct association between signals or features of different measurements. This problem and the similar data association problem are very important and apply also to single sensor data processing. To perform data registration, the relative locations of the sensors, the relationship between their coordinate systems, and any timing errors need to be known, or estimated, and accounted for otherwise a mismatch between the compiled picture and the truth may result. An overstated confidence in the accuracy of the fused output, and inconsistencies between track databases, such as multiple tracks that correspond to a single target may appear. A missed registration can result from location and orientation errors of the sensor relative to the supporting platform, or of the platform relative to the Earth, such as a bearing measurement with an incorrect North alignment. Errors may be present in data time stamping, and numerical errors may occur in transforming data from one coordinate system to another. Automatic sensor registration can correct for these problems by estimating the bias in the measurements along with the kinematics of the target. However, the errors in sensor registration need to be known and accounted for [90] . In [91] a maximum likelihood (EML) algorithm for registration is presented using a recursive two-step optimization that involves a modified Gauss-Newton procedure to ensure fast convergence. In [92] a novel joint sensor association, registration, and fusion is performed exploiting the expectation-maximization algorithm incorporated with the linear Kalman filter (KF) to give simultaneous state and parameter estimates. The same approach can be followed also with non linear filtering techniques as the Extended KF (EKF) and the Unscented KF (UKF) as proposed in [93] , where also the performance is evaluated by means of the PCRLB. Next to the spatial sensor registration also the temporal alignment cannot be neglected. For instance, a critical aspect of a sensor network is its vulnerability to temporary node sleeping, due to duty-cycling for battery recharge, permanent failures, or even intentional attacks. Other realistic problems, such as conflicting information and noise model assumptions, may enable the use of some fusion techniques. Noisy input data sometimes yield conflicting observations, a problem that has to be addressed and which does not arise in single sensor data processing. The administration of multiple sensors have to be coordinated and information must be shared between them. Most of the optimization algorithms have been developed in a centralized framework, i.e., they have been conceived to perform centralized data fusion process. In the last years the trend is to employ network centric approaches, and the mathematical optimization algorithms must be able to support this approach. In the following an example of the adaptation of a "centralized-conceived" algorithm to the new trend is presented. Consider the following minimization problem to solve: where α, β, γ , δ, ε, η are real positive values and the function f x, y, z = w ≥ 0 represents an ellipsoid function, whose axes do not coincide with the reference frame axes if δ = 0, ε = 0, η = 0. The problem of Eq. (22.1) can be solved by the steepest descent method in a centralized fusion process frame, hence it will be named "centralized steepest descent." The centralized steepest descent method when used to solve minimization problems is an iterative procedure that, beginning from an initial guess, updates at every iteration the current approximation of the solution of the function to minimize with a step in the direction of the gradient of the own function. In a network centric approach it may Data Fusion centralnode be solved by the application of the Jacobi method 2 usually employed for the iterative solution of linear system equation. Consider three agents (namely agent 1, 2, and 3) controlling the three variables x, y, and z. In the centralized data fusion process, represented in Figure 22 .10a, the communication between the three agents is completely performed at the same instant of time; in the network centric case this does not happen. Consider the model of Figure 22 .10b with the following communication scheme: agent 1 communicates to agent 2, agent 2 communicates agent 3, agent 3 communicates to agent 1; moreover the communications among agents is not instantaneous, but they succeeds in time. The method of the centralized steepest descent applied to the function f (x, y, z), given a starting point (x 0 , y 0 , z 0 ), is based on the following iterations: where k = 0, 1, . . ., and h ≥ 0 represents the step employed in the steepest descent method. 2 The Jacobi method is an algorithm for determining the solutions of a system of linear equations with largest absolute values in each row and column dominated by the diagonal element. Each diagonal element is solved for, and an approximate value plugged in. The process is then iterated until it converges. This algorithm is a stripped-down version of the Jacobi transformation method of matrix diagonalization. The method is named after German mathematician Carl Gustav Jakob Jacobi [96] . A network centric steepest descent method can be derived by the communication scheme represented in Figure 22 .10b and described below. Given the starting point (x 0 , y 0 , z 0 ), the following iterations can be done: where k = 0, 3, 6, . . . and h ≥ 0 represents the step employed in the steepest descent method. Figure 22 .11 shows the comparison of the two methods for the previous model. Note that the three agents in the net-centric approach are those looking at the function to be minimized along the x, y, and z axes respectively. The black square and the red diamond in the curves represent respectively the starting point of the iteration and the final position. The black solid line shows the trajectory described by the variables (x, y, z) obtained by the application of the centralized steepest descent method; the red solid line shows the behavior of the variables obtained by the net-centric steepest descent method. Note that the red line approaches the minimum by moving along the x, y, and z axes separately. The ellipsoids of Figure 22 .11 represent the iso-level surfaces of the objective function. Notice that the telecommunication network modeled for the net-centric steepest descent determines the usual Jacobi iteration employed for the solution of linear systems associated to minimization problems [94] [95] [96] . In the following Section 2.22.6.1 this approach is applied to reach the optimal deployment of a sensor network. This section proposes several study cases of sensor networks employing novel approaches. Section 2.22.6.1 proposes an optimization method, projected in the network centric frame, to obtain the optimal deployment of a cooperative sensor network; Section 2.22.6.2 describes how to employ the so-called bio-inspired models of dynamic sensor collaboration in a chemical sensor network to detect a chemical pollutant; finally Section 2.22.6.3 gives a description of the typical problem of detection of radioactive sources. This section presents a mathematical model for the deployment of a sensor network, for the creation of consensus values from the noisy data measured and a statistical methodology to detect local anomalies Starting point Convergence point Centralized steepest descent Net-centric steepest descent Comparison between the trajectories computed by the centralized and the network centric steepest descent. in these data. A local anomaly in the data is associated to the presence of an intruder. The model of sensor network presented here is characterized by the absence of a fusion center. In other words the deployment, the construction of the consensus values, and the detection of local anomalies in the data are the result of local interactions between sensors. Nevertheless the local interactions will lead to global solution of the considered problem. This is an example of model of a network centric sensor network. The sensors are assumed to be identical and they measure a quantity pertinent to the properties of the area to survey able to reveal the presence of an intruder. In the proposed study case the sensors are able to measure the temperature of the territory in the position or in the "area" where they are located; in absence of anomalies there is a uniform temperature on the territory where the sensors are deployed. The sensor measures are noisy and can be considered synchronous. This measurement process is repeated periodically in time with a given frequency. From these measures a "consensus" temperature is deduced, pertinently to the territory where the sensors are deployed and an estimate of the magnitude of the noise contained in the data. Finally using these consensus values as reference values local anomalies are Territory of the city of Urbino (Italy) selected for the study case. detected by the individual sensors. In the following we give some analytical details of the consensus method [97] . Let be a bounded connected polygonal domain in two dimensional real Euclidean space R 2 . The domain represents the territory where the sensor network must be deployed; in our case the downtown part of the Italian city of Urbino, shown in Figure 22 .12. Let · denote the Euclidean norm of in R 2 . Consider N sensors s 1 , s 2 , . . . , s N , located respectively, in the points ξ 1 , ξ 2 , . . . , ξ N ∈ , assumed to be distinct. To the sensor network deployed in the points ξ 1 , ξ 2 , . . . , ξ N corresponds a graph whose nodes are the sensors location and whose edges join the sensors able to communicate between themselves. This graph is assumed to be connected and can be imagined as laid on the territory. The assumption that the graph is connected is equivalent to assuming that the sensors constitute a network. For i = 1, 2, . . . , N , a polygonal region i ⊂ is associated to each sensor s i ; this region is defined by the condition that the points belonging to i are closest to the sensor s i , that is they are closest to ξ i , than to any other of the remaining sensors s j located in ξ j , j = i, j = 1, 2, . . . , N . It follows: When for a given x ∈ the minimizer of the function f ( j) = x − ξ j , j = 1, 2, . . . , N is not unique we attribute x to i , where i is the smallest index between the indices that are minimizers of the function f. The collection of subsets { 1 , 2 , . . . , N } defined in Eq. (22.4) and further specified by the condition above is a partition of and it is a Voronoi partition of associated to the Voronoi centers ξ 1 , ξ 2 , . . . , ξ N , as represented in Figure 22 .13 [98] , where the sets 1 , 2 , . . . , N are the Voronoi cells. The sensor s i is located in ξ i , with ξ i ∈ i , i = 1, 2, . . . , N , and monitors the sub-region i of . Note that there is a Voronoi partition of associated to each choice of the Voronoi centers After the definition of a Voronoi partition of , we want to determine the optimal one with respect to a pre-specified criterion, that in this study case is the fact that the Voronoi centers ξ 1 , ξ 2 , . . . , ξ N should coincide (as much as possible) with the centers of mass of the corresponding Voronoi cells 1 , 2 , . . . , N . This property translates in mathematical terms the request that the sensors are well distributed on the territory. That is what is called optimal Voronoi partition, i.e., the Voronoi partition associated to the Voronoi centers whose coordinates ξ * 1 , ξ * 2 , . . . , ξ * N are the solution of the following problem: (22.5) subject to the constraints: where B j is the center of mass of the Voronoi cell j , j = 1, 2, . . . , N . Moreover we require: That is the Voronoi centers and the centers of mass of the Voronoi cells coincide. Note that in general B j depends on ξ 1 , ξ 2 , . . . , ξ N and that the function .7) is not unique and it can be solved by the application of the steepest descent concept, revised in a network centric frame as shown conceptually in Section 2.22.5.7 [94] . This method can be used to solve the problem of Eq. (22.5) with an iterative procedure, that beginning from an initial guess, updates at every iteration the current approximation of the solution with a step in the direction of the gradient of the .7) and to the requirement that its implementation must lead to a network centric solution of the deployment problem. For sake of brevity, how to impose Eq. (22.6) will not be discussed here, however a treatment of constraints in the continuous analog of the steepest descent algorithm can be found in [99] . Note also that the solutions of Eqs. (22.5) and (22.6) that are of interest are usually interior points of the constraints (6) . That is the constraint issue usually is not relevant in the solution of Eqs. (22.5) and (22.6) . Similarly we will not pay attention to condition of Eq. (22.7). In fact with respect to Eq. (22.7), we will simply verify if the solution of the optimization problem determined by the steepest descent method satisfies Eq. (22.7). Let us concentrate our attention on the issue of building a network centric implementation of the continuous analog of the steepest descent method to solve Eq. (22.5) . Assume that the sensor s i knows only the position of its neighbor sensors, that is of the sensors that belong to a disk with center ξ i and radius r > 0, i = 1, 2, . . . , N . Later we will show how to choose r. The solution of the optimization problem of Eq. (22.5) is found approximating the solution of the system of differential equations: where λ 1 denotes a real parameter, with the solution of the "network centric" system differential equations:ξ where andB i, j being the center of mass of the Voronoi cell˜ i, j obtained computing the Voronoi partition of associated to the Voronoi centers ξ j , j ∈ L i , i = 1, 2, . . . , N . Assume that r > 0 is large enough to guarantee that ξ j is neighbor of ξ i when the distance between j and i is zero, i, j = 1, 2, . . . , N . Note that with this assumption we haveB i,i = B i , i = 1, 2, . . . , N . In Eqs. (22.8) and (22.9 ) the dot denotes the differentiation with respect to λ 1 . We observe that Eq. Remind that we have assumed that the graph G associated to the optimal deployment is connected (see Figures 22.14 and 22.13b) . Moreover we remind that, since there is not a fusion center, each node of the graph G does not know the positions of all the remaining nodes of the graph, in fact it knows only the positions of its neighbor nodes. Let L be the Laplacian matrix associated to G [100] . The matrix L is a symmetric positive semi-definite N × N matrix. Let x(λ 2 ) = (x 1 (λ 2 ), x 2 (λ 2 ), . . . , x N (λ 2 )) T , λ 2 > 0, be a real N dimensional vector depending on the real parameter λ 2 . The superscript (·) T means transposed. We consider the system of ordinary differential equations: x(λ 2 ) = −Lx(λ 2 ), λ 2 > 0 (22.12) equipped with the initial conditions: where Lx denotes the usual matrix vector multiplication, α = (α 1 , α 2 , . . . , α N ) T is a known initial condition and the dot denotes differentiation with respect to λ 2 . Since G is connected we have: where x(λ 2 ), λ 2 > 0, is the solution of Eqs. (22.12) and (22.13) . This result follows easily from the spectral properties of L [100] . Note also that the right hand side of Eq. (22.14) is the "average" of the initial condition α. Note that Eq. (22.12) can be interpreted as the "heat equation" on the graph G, that the problem of Eqs. (22.12) and (22.13) can be seen as an initial value problem for the heat equation on G and that Eq. (22.14) can be understood as the approach to an asymptotic equilibrium "temperature" in an "heat transfer" problem. We assume that during the monitoring phase the sensor measures a physical quantity, such as, for example, the temperature, of the region i where it is located. The sensors are identical, the measures made by the sensors are synchronous, repeated periodically in time and of course they are noisy. Moreover they are assumed to be independent. A first set of measures is taken by the sensors at time t = t 0 and is collected in the vector β 0 = (β 0,1 , β 0,2 , . . . , β 0,N ,) T , where β 0,i is the measure done by the sensor s i . The set of measure β 0 will be used to obtain the "consensus" value β 0 of the quantity monitored in at time t = t 0 . We choose: Remind that the sensor s i located in ξ i knows β 0,i and communicates with the sensors s j located in ξ j , j ∈ L i , i = 1, 2, . . . , N . In order to provide to the sensor s i , the consensus value β 0 in a network centric manner we proceed as follow: we choose α = β 0 in Eq. (22.13) and we integrate numerically the initial value problem of Eqs. (22.12) and (22.13) using the explicit Euler method to obtain a numerical approximation of lim λ 2 →+∞ x(λ 2 ). Note that the ith differential equation of Eq. (22.12) is integrated in the location ξ i , and that using the explicit Euler method this can be done using only information available in the location ξ i . Note that the analytic solution of Eqs. (22.12) and (22.13) is not "network centric" but its approximation with the explicit Euler method is "network centric." In the former case to achieve the solution each node should know the whole graph, i.e., all the nodes. The ith node is not able to achieve the solution exploiting only the information in its posses: in this sense the solution is not "network centric." Otherwise, exploiting the Euler approximation of the exponential of a matrix, the whole knowledge of the graph is not necessary: in this sense a "network centric" solution is achieved. Once obtained β 0 we consider the following vector: Then we choose α = γ 0 in Eq. (22.13) and we integrate Eqs. (22.12) and (22.13) with the explicit Euler method as done above. In this way we obtain asymptotically a numerical approximation of γ 0 where: This approximation of γ 0 is provided to each sensor in a network centric manner. Note that γ 0 is an estimate of the magnitude of the noise contained in the data; in fact γ 0 is the "sample" variance of the measures β 0,i made by the sensor at time t = t 0 . The approximation of β 0 and γ 0 obtained integrating numerically Eqs. (22.12) and (22.13) are the consensus values. These values are "global" values (that is they depend on all the measures made by the sensor network at time t = t 0 ) and have been provided to each sensor in a network centric manner (that is using only "local" interactions between sensors). The sensor s i repeats periodically in time the measure of the quantity of interest and after a given time interval has as its disposal a set of measures that can be compared with the consensus values β 0 and γ 0 to detect (local) anomalies. Let us assume that the set of measures made by the sensor s i is a sample taken from a set of independent identically distributed Gaussian random variables of mean μ i and variance σ 2 i . In these hypotheses the Student t-test and the Chi-square test [101] are the elementary statistical tools that must be used to compare μ i and σ 2 i (that are unknown) to β 0 and γ 0 . The result of this comparison is the detection of local anomalies. A (statistical) significance is associated to the detected anomalies. The statistical tests used are based on the assumption that the measures come from a set of independent identically distributed Gaussian random variables. Note that the estimators β 0 and γ 0 can be used in more general circumstances. Typically the challenge in the deployment of an operational wireless sensor network (WSN) resides in establishing the balance between its operational requirements (e.g., minimal detection threshold, the size of surveillance region, detection time, the rate of false negatives, etc.) and the available resources (e.g., energy supply, number of sensors, communication range, fixed detection threshold of individual sensors, limited budget for the cost of hardware, maintenance, etc.) [102] . The issue of resource constraints is particularly important for a network of chemical sensors, because modern chemical sensors are equipped with air-sampling units (fans), which turn on when the sensor is active. Operating a fan requires a significant amount of energy as well as a frequent replacement of some consumable items (i.e., cartridges, filters). This leads to the critical requirement in the design of a WSN to reduce the active (air-sampling) time of its individual sensors. One attractive way to achieve the described balance between the requirements and the constraints of WSN is to exploit the idea of dynamic sensor collaboration (DSC) [103, 104] . The DSC implies that a sensor in the network should be invoked (or activated) only when the network will gain information by its activation [104] . For each individual sensor this information gain can be evaluated against other performance criteria of the sensor system, such as the detection delay or the detection threshold, to find an optimal solution in given circumstances. However, the DSC-based algorithms involve continuous estimation of the state of each sensor in the network and usually require extensive computer simulations [103, 104] . These simulations may become unpractical as the number of sensors in the network increases. Furthermore, the simulations can provide the numerical values for optimal network parameters only for a specific scenario. This motivates the development of another simple and analytic approach to the problem of network analysis and design. The main idea is to phenomenologically employ the so-called bio-inspired (epidemiology, population dynamics) or physics inspired (percolation and graph theory) models of DSC in the sensor network in order to describe the dynamics of collaboration as a single entity [105] [106] [107] [108] [109] [110] . From a formal point of view, the equations of bio inspired models of DSC are the ones of the "meanfield" theory, meaning that instead of working with dynamic equations for each individual sensor we use only a small number of equations for the "averaged" sensor state (i.e., passive, active, faulty, etc.), regardless of the actual number of sensors in the system. The analytic approach can lead to the valuable insights into the performance of the proposed sensor network system by providing simple analytical expressions to calculate the vital network parameters, such as the detection threshold, robustness, responsiveness and stability and their functional relationships. The fluctuations in concentration C of the pollutant are modeled by the probability density function (pdf) with the mean C 0 as a parameter [111] : Here the value γ = 26/3 can be chosen to make it compliant with the theory of tracer dispersion in Kolmogorov turbulence [111] , but it may vary with meteorological conditions. The parameter ω, which models the tracer intermittency in the turbulent flow, can be in the range We adopt a binary model of a chemical sensor, with reading V specified as: where C * is the threshold (an internal characteristic of the sensor). It can be shown [112] that the probability of detection of an individual sensor embedded in the environmental model described by Eq. (22.18) is given by: where is the cumulative distribution function corresponding to pdf of Eq. (22.18), see [113] . Examples of WSN network operating in the tracer filed with different correlation structure [117] . (reprinted with permission.) Suppose that N chemical sensors are uniformly distributed over the surveillance domain of area S and adopt the following network protocol for dynamic collaboration. Each sensor can be only in one of the two states: active and passive. The sensor can be activated only by a message it receives from another sensor. Once activated, the sensor remains in the active state during an interval of time τ * ; then it "dies out" (becomes passive). While being in the active state, the sensor senses the environment and if the chemical tracer is detected, it broadcasts a (single) message. The broadcast capability of the sensor is characterized by its communication range r * . This network with the described dynamic collaboration can be modeled using the epidemic SIS model (susceptible-infected-susceptible) [114] : (22.22) where N + , N − denote the number of active and passive sensors, respectively. The nonlinear terms on the right hand side of Eq. (22.22) are responsible for the interaction between the sensors; parameter α is a measure of this interaction. The number of sensor is assumed constant, hence we have an additional equation: N + + N − = N . Since the parameter alpha describes the intensity of social interaction in a community [114] we can propose that: where m is the number of contacts made by the activated ("infected") sensor during its infectious period τ * (i.e., the number of sensors that received the wake-up message from an alerting sensor). In our case m = π · r 2 * · N /S. Then we have: where G is a calibration constant. In order to simplify notation we will further assume that G is absorbed in the definition of r * . Equation (22.22) combined with N + + N − = N can be reduced to one equation for y = N + : where b = α N − 1/τ * . By simple change of variables z = α y/b, this equation can be reduced to the standard logistic equation [115, 116] : The solution of the logistic equation is well-known: where z 0 = z(0). Observe that the WSN will be able to detect the presence of a pollutant only if b > 0, because then z → 1 as t → ∞ independent of z 0 . In this case, after a certain transition interval, the WSN will reach a new steady state with: From (22.27) and using the expression for b stated above, the activation time (transition interval) is given by: From Eq. (22.29) it follows that the key requirement for the network to be operational b > 0 is that ατ * N > 1, that is: where R 0 is a well-known parameter in epidemiology, referred to as the basic reproductive number [114] . Observe that R 0 is independent of τ * ; however, according to Eq. (22.29) the response time of the WSN is strongly dependent on τ * . It remains to specify q, the number of sensors that should initially be active for the described WSN with dynamic collaboration to be effective. The initial condition is simply q · p > 1, that is on average q > 1/ p. Eqs. (22.28)-(22.30) are important analytic results. For a given level of mean pollutant concentration C 0 and meteorological conditions (γ, ω), these expressions provide a simple yet rigorous way to estimate how a change in network and sensor parameters (i.e., N , C * , τ * ) will affect the network performance (i. e., N + , τ ) . The examples of agent-based simulation of "information epidemic" in WSN, which satisfies the threshold condition of Eq. (22.30) is presented in Figure 22 .16. We can observe that by change of the configuration parameters of WSN we can vary the activation time and the saturation limit of the detection system. Further development of the theoretical framework presented in this section can be found in [117] [118] [119] [120] . Recently there has been an increased interest in detection and localization of radioactive material [121] [122] [123] [124] [125] . Radioactive waste material is relatively easy to obtain with numerous accidents involving its loss or theft reported. The danger is that a terrorist group may acquire some radiological material and use it to build a dirty-bomb. The dirty bomb would consist of waste by products from nuclear reactors wrapped in conventional explosives, which upon detonation would expel deadly radioactive particles into the environment. The ability to rapidly detect and localize radioactive sources is important in order to disable and isolate the potential threat in emergency situations. This section is concerned with radiological materials that emit gamma rays. The probability that a gamma radiation detector registers z ∈ N counts (N being the set of natural numbers including zero) in τ seconds, from a source that emits on average μ counts per second is [126] : where λ = μτ is the mean and variance of the Poisson distribution. The measurements of radiation field are assumed to be made using a network of low-cost Geiger-Müller (GM) counters as sensors. In general, the problem of detection and localization of point sources or radioactive sources can be solved using either controllable or uncontrollable sensors. Controllable sensors can move and vary the radiation exposure time [127, 128] . In this Section we will focus on uncontrollable sensors, placed at known locations with constant and known exposure times. Assume that r ≥ 0 sources (r is unknown) are present in the area of interest. Furthermore, the assumption is that the area is flat without obstacles ("open field"). Each source i = 1, 2, . . . , r is parameterized by its 2D location (x i , y i ) and its equivalent strength α i (a single parameter which takes into account the activity of the source, the value of gamma energy per integration and scaling factors involved, see [129] ). Thus the parameter vector of source i is ϑ i = x i y i α i T , while the total parameter vector is a stacked vector: ϑ = ϑ T 1 · · · ϑ T r T . Suppose a network of GM counters is deployed in the field of interest. Let GM counter j = 1, . . . , m, located at ξ j ζ j , reports its count z j every τ seconds. Assuming that each GM counter has a uniform directional response and that attenuation of gamma radiation due to air can be neglected, the joint density of the measurement vector z = z 1 · · · z m T , conditional on the parameter vector ϑ and the knowledge that r sources are present, can be modeled as [129] : Here λ j (ϑ) is the mean radiation count at sensor j: being the distance between the source i and sensor j, and λ b the average count due to the background radiation (assumed known). The problem for the network of GM counters is to estimate the number of sources r and the parameter vector for each source ϑ i , i = 1, . . . , r . In this section we will present the experimental results obtained using real data and a Bayesian estimation algorithm combined with the minimum description length (MDL) for source number estimation. A radiological field trial was conducted on a large, flat, and open area without any obstacles at the Puckapunyal airfield site in Victoria, Australia. The measurements were collected using the DSTOs 3 Low Cost Advanced Airborne Radiological Survey (LCAARS) survey system which consists of an AN/PDR-77 radiation survey meter equipped with an RS232 interface module, a gamma probe and software written in Visual Basic running on a laptop computer. The gamma probe contains two GM tubes to cover both low and high ranges of dose rates. It was capable of measuring gamma radiation dose rates from background to 9.99 Sv/h 4 without saturating [130] with a fairly flat response [131] . Three radiation sources were used in the field trial: source 1 was a cesium sources ( 137 Cs) with ϑ 1 = 11 m 10 m 9105 µSv/h T , source 2 was also a cesium source with ϑ 2 = 3 m 50 m 1868 µSv/h T , and source 3 was a cobalt source ( 60 Co) with ϑ 3 = 41m 5m 467 µSv/h T . The aerial image of the experimental site with the location of sources and the local Cartesian coordinate system is shown in Figure 22 .17. Four data sets were collected during the field trails in the presence of r sources, with respectively r = 0, 1, 2, 3 [132] . Data sets with r > 0 sources contains 50 count measurements in each measurement point. Estimation of parameter vector ϑ, under the assumption that r is known, was carried out using the Bayesian importance sampling technique known as the progressive correction [125, 133] . This technique assumes that prior distribution of ϑ, denoted p 0 (ϑ), is available. The information contained in the measurement vector z is combined with the prior to give the posterior pdf: p(ϑ|z) ∝ l(z|ϑ) · p 0 (ϑ). The minimum mean squared error estimate of ϑ is then the posterior expectation: The problem is that the posterior pdf and hence the posterior expectation of Eq. (22.35) cannot be found analytically for the described problem. Instead, an approximation of Eq. (22.35) is computed via the importance sampling: it involves drawing N p samples of the parameter vector from an importance density and approximating the integral by a weighted sum of the samples. This is carried out in a few stages, each stage drawing samples from a "target distribution" which is gradually approaching the true posterior. The "target distribution" at stage s = 1, . . . , S is constructed as: p s (ϑ|z) ∝ l(z|ϑ) G s · p 0 (ϑ), (22.36) where G s = s l=1 γ l with γ ∈ [0, 1) and G S = S l=1 γ l = 1. An adaptive scheme for the computation of S and factors γ 1 , γ 2 , . . . , γ S is given in [125, 133] . Assume that a random sample ϑ n s−1 N p n=1 from p s−1 (ϑ|z) is available and one wants to generate the samples or particles from p s (ϑ|z). The progressive correction algorithm steps are then as follows [125] : compute not-normalized weight of each sample as: w n s = l(z|ϑ) γ s , for n = 1, . . . , N p ; 3. normalize weights; 4. perform re-sampling of particles [134] ; 5. carry out Markov chain Monte Carlo (MCMC) move step for each particle [134] . The procedure is repeated for every stage s < S until G s < 1. The initial set of particles is drawn from the prior density p 0 (ϑ). The final estimate in Eq. (22.35) is approximated aŝ The number of sources was estimated using the MDL algorithm [59] , which will choose r ∈ {1, 2, . . . , r max } that will maximize the following quantity: β r = log l(z|θ(r )) − 1 2 log J(θ(r )) , (22.38) whereθ(r ) is the estimate obtained under the assumption that r sources are present and is the Fisher Information Matrix. It can be shown that The inverse of the FIM gives us the CRLB, which represents the theoretical lower bound for estimation error covariance [135] . Figure 22 .18 shows the output of the progressive correction algorithm for data set 3 (with three sources present) after (a) s = 2 and (b) s = 11 stages of processing. The red stars indicate the locations of three sources. The green line shows the initial polygon A for the location of sources. The prior density for sampling the initial set of particles for source i = 1, . . . , r is: (22.42) where U A (x i , y i ) stands for uniform distribution over the polygon A and κ.ν (α i ) is the gamma distribution with parameters κ = 1.5 and ν = 8000. From Figure 22 .18 we observe how the progressive correction algorithm localiszs the three sources fairly accurately. As we mentioned earlier, 50 count measurements have been collected by each sensor. This allows us to find the root mean square (rms) estimation error using each snapshot of measurement data from all sensors. Table 22 .2 shows the resulting rms errors versus the theoretical CRLB. The theoretical CRLB was computed using the idealized measurement model as stated by Eqs. (22.32)- (22.34) . Considering that this measurement model was very crude with a number of factors neglected (e.g., uniform directional response, neglected air attenuation, perfect knowledge of sensor locations, known and constant average background radiation, etc.), the agreement between the theoretical bound and the RMS estimation errors in Table 22 .2 is remarkable. The experimental results in this table effectively verify the measurement model as well as the estimation algorithm. Results for estimation of r are shown in Table 22 .3. The table lists the number of runs (out of 50) that resulted in r ∈ {0, 1, 2, 3}. It can be observed that the number of sources is estimated correctly in the majority of cases. More results of experimental data processing can be found in [131, 132] . In a recent study [136] it was found that by using all 50 snapshots of measurement data for estimation by progressive correction, results in a posterior pdf which is very narrow but does not include the true source positions. This indicates that the measurement model is not perfect, which is not surprising considering that it is based on many approximations. In situations where the measurement likelihood is not exact, it is necessary to introduce a degree of caution to make the estimation more robust. In the framework of progressive correction this can be achieved by G S = S l=1 γ l < 1. In this way the measurement likelihood is effectively approximated by a fuzzy membership function which has a theoretical justification in random set theory [137, Chapter 7] . If one wants to relax the assumption that radioactive sources are point sources, the problem becomes the one of radiation field estimation. This is an inverse problem, difficult to solve in general. By modeling the radiation field by a Gaussian mixture, however, the problem becomes tractable and some recent results are reported in [138] . Multi-sensor management concerns with the control of environment perception activities by managing or coordinating the usage of multiple heterogeneous sensor resources. Multi-sensor systems are becoming increasingly important in a variety of military and civilian applications. Since a single sensor generally can only perceive limited partial information about the environment, multiple similar and/or dissimilar sensors are required to provide sufficient local pictures with different focus and from different viewpoints in an integrated manner. As viewed, information from heterogeneous sensors can be combined using data fusion algorithms to obtain synergistic observation effects. Thus the benefit of multi-sensors system are to broaden perception and enhance awareness of the state of the world compared to what could be acquired by a single sensor system. The increased sophistication of sensor assets along with the large amounts of data to be processed has pushed the information acquisition problem far beyond what can be handled by human operator. This motivates the emerging interest in research into automatic and semi-automatic management of sensor resources for improving overall perception performance beyond basic fusion of data. Multi-sensor management is formally described as a system or process that seeks to manage or coordinate the usage of a suite of sensors or measurement devices in a dynamic, uncertain environment, to improve the performance of data fusion and ultimately that of perception. The basic objective of sensor management is to select the right sensors to do the right service on the right object at the right time. Sensor management, aiming at improving data fusion performance by controlling sensor behavior, plays the role of level 4 functions in JDL model presented in Section 2.22.3. Mainly the same considerations made for homogeneous sensor networks are still valid: the criteria followed to manage the network remains the same, however there is an increasing of complexity due to the diversity of the sensors. In the following Sections the problems related to multi-sensor management are divided into three main categories i.e., sensor deployment, sensor behavior assignment, and sensor coordination. Sensor deployment is a critical issue for intelligence collection in an uncertain dynamic environment. It concerns with making decisions about when, where, and how many sensing resources need to be deployed in reaction to the state of the environment and its changes. Sensor placement needs special attention in sensor deployment. It consists of positioning multiple sensors simultaneously in optimal or near optimal locations to support surveillance tasks when necessary. Typically it is desired to locate sensors within a particular region determined by tactical situations to optimize a certain criterion usually expressed in terms of global detection probability, quality of tracks, etc. This problem can be formulated as one of constrained optimization of a set of parameters. It is subject to constraints due to the following factors: • sensors are usually restricted to specified regions due to tactical considerations; • critical restrictions may be imposed on relative positions of adjacent sensors to enable their mutual communication when sensors are arranged as distributed assets in a decentralized network (e.g., net-centric approach); • the amount of sensing resources that can be positioned in a given period is limited due to logistical restrictions. In simple cases, decisions on sensor placement are to be made with respect to a well-prescribed and stationary environment. An example of a stationary problem is the placing of radars to minimize the terrain screening effect in detection of an aircraft approaching a fixed site. Another example is the arrangement of a network of intelligence gathering assets in a specified region to target another well-defined area. In the above scenarios, mathematical or physical models such as terrain models, propagation models, etc. are commonly available and they are used as the basis for evaluation of sensor placement decisions. Paper [139] presents a study for finding a solution to the placement of territorial resources for multi-purpose telecommunication services considering also the restrictions imposed by the orography of the territory itself. To solve this problem genetic algorithms 5 are used to identify sites to place the resources for the optimal coverage of a given area. The used algorithm has demonstrated to be able to find optimal solutions in a variety of considered situations. More challenging are those situations in which the environment is dynamic and sensors must repeatedly be repositioned to be able to refine and update the state estimation of moving targets in real time. Typical situations where reactive sensor placement is required are, for instance, submarine tracking by means of passive sonobuoys in an anti-submarine warfare scenario; locating moving transmitters using ESM (Electronic Support Measures) receivers; tracking of tanks on land by dropping passive acoustic sensors. The basic purpose of sensor management is to adapt sensor behavior to dynamic environments. By sensor behavior assignment is meant efficient determination and planning of sensor functions and usage according to changing situation awareness or mission requirements. Two crucial points are involved. Firstly the decisions about the set of observation tasks (referred to as system-level tasks) that the sensor system is supposed to accomplish currently or in the near future, on the basis of the current/predicted situation as well as the given mission goal. Secondly the planning and scheduling of actions of the deployed sensors to best accomplish the proposed observation tasks and their objectives. Owing to limited sensing resources, it is prevalent in real applications that available sensors are not able to serve all desired tasks and achieve all their associated objectives simultaneously. Therefore a reasonable compromise between conflicting demands is sought. Intuitively, more urgent or important tasks should be given higher priority in their competition for resources. Thus a scheme is required to prioritize observation tasks. Information about task priority can be very useful in scheduling of sensor actions and for negotiation between sensors in a decentralized paradigm. To focus on this class of problems, let us consider a scenario including a number of targets as well as multiple sensors, which are capable of focusing on different objects with different modes for target tracking and/or classification. The first step for the sensor management system should be to utilize evidences gathered to decide objects of interest and to prioritize which objects to look at in the time 5 Genetic algorithm (GA) is a search heuristic that mimics the process of natural evolution. This heuristic is routinely used to generate useful solutions to optimization and search problems. GA belongs to the larger class of evolutionary algorithms (EA), which generate solutions to optimization problems using techniques inspired by natural evolution, such as inheritance, mutation, selection, and crossover [140] . following. Subsequently, in the second step, different sensors together with their modes are allocated across the interesting objects to achieve best situation awareness. In fact, owing to the constraints on sensors and computational resources, it is in general not possible to measure all targets of interest with all sensors in a single time interval. Also, improvement of the accuracy on one object may lead to degradation of performance on another object. What is required is a suitable compromise among different targets. As stated in the previous Sections, there are two general ways to integrate a set of sensors into a sensor network. One is the centra1ized paradigm, where all actions of all sensors are decided by a central mechanism. The other alternative is to treat sensors in the network as distributed intelligent agents with some degree of autonomy. In such a decentralized architecture, bi-directional communication between sensors is enabled, so that communication bottlenecks possibly existing in a centralized network can be avoided. A major research objective of decentralized sensor management is to establish cooperative behavior between sensors with no or little external supervision. In a decentralized sensor network scenario a local view perceived from a sensor can be shared by some members of the sensor community. Intuitively, a local picture from one sensor can be used to direct the attention of other sensors or transfer tasks such as target tracking from one sensor to another. An interesting question is how participating sensors can autonomously coordinate their movements and sensing actions, on grounds of shared information, to develop an optimal global awareness of the environment with parsimonious consumption of time and resources. As for homogeneous sensor network, the CSIP approach can be exploited [141, 142] : the network consists of different kinds of sensors, randomly distributed inside the surveillance area and if the number of sensors is high, the performance of the surveillance system can be considered independent of the location of the targets. Each sensor has a different functioning level. A first level sensor, with small sensing and communication capabilities may provide only detection information; a second level sensor may provide detection and localization information, with medium sensing and communication capabilities. Finally a third level sensor may provide tracking information and may be able to perform target recognition and classification. Usually the number of low level sensors exceeds the number of higher level sensors and only close sensors exchange data. In [143] the network consists of two types of sensors: simple and complex as represented in Figure 22 .19a. The simple ones have only the capability of sensing their coverage area with a reduced computation capabilities and they transmit data to complex sensors. The information they provide may be encoded, for example, by a "1" if sensor detects something crossing its coverage area and by a "0" otherwise. Complex sensors, instead, have computation capabilities; they are able to locate the target by applying sophisticated algorithms (e.g., in [143] the maximum likelihood estimation algorithm is applied). The topology simulated in [143] , constituted by 80 simple sensors and 20 complex sensors, is represented in Figure 22 .19b: the sensors are indicated by circles; the complex sensors are connected by the solid lines, simple and complex sensor by dashed lines. Figure 22 .20 shows the number of active sensors during the target tracking: the theoretical value and the simulated value are compared. It is evident that in a self-organizing configuration the number of active sensors is optimized with the consequent advantage of saving of power. An adaptive self-configuring system consists of a collection of independent randomly located sensors that, carrying ahead local interactions, estimate the position of the target without a centralized control unit that coordinates their communication. It is fault tolerant and adapts to changing conditions. Furthermore, it is able to self-configuring, i.e., there is not an external entity that configures the network. Finally, the task is performed efficiently, i.e., it guarantees both a reasonably long network life and good target tracking performances. From local interactions, sensors form an efficient system that follows the target, i.e., local communication leads to a self-organizing network that exploits the features of the theories of random graphs and of self-organizing systems. The most natural way to approach random network topology is by means of the theory of random graphs [144, 145] . The theory of random graphs allows, for instance, to compute an upper bound to the estimated number of active sensors at each time step. When the fusion of heterogeneous signals is performed, there is a formal problem to solve. The signal received by the different sensors may be statistically dependent because of the complex intermodal interactions; usually the statistical dependence is either ignored or not adequately considered. Usually the multiple hypotheses testing theory is based on the statistical independence of the received signals, in our case this condition is not maintained, therefore techniques as the "copula probability theory" may be useful. In probability theory and statistics, a copula can be used to describe the dependence between random variables [146] . The cumulative distribution function of a random vector can be written in terms of marginal distribution functions and a copula. The marginal distribution functions describe the marginal distribution of each component of the random vector and the copula describes the dependence structure between the components. Copulas are popular in statistical applications as they allow one to easily model and estimate the distribution of random vectors by estimating marginal distributions and copula separately. The Sklar's theorem ensures that the joint cumulative distribution function (cdf) F Z (z 1 , z 2 , . . . , z N ) of random variables Z 1 , Z 2 , . . . , Z N are joined by a copula function C(·) to the respective marginal distributions F Z 1 (z 1 ), F Z 2 (z 2 ), . . . , F Z N (z N ) as [147] : F Z N (z N ) ). (22.43) Further, if the marginals are continuous, C(·) is unique. By the differentiation of the joint cdf, the joint pdf is obtained: The copula density c(·), function of the N marginals from the N sensors, represents a correction term of the independent product of densities of Eq. (22.44) . Processing heterogeneous data set is not straightforward as they may not be commensurate. In addition, the signals may also exhibit statistical dependence due to overlapping fields of view. In [148] the authors propose a copula-based solution to incorporate statistical dependence between disparate sources of information. The important problem of identifying the best copula for binary classification problems is also addressed and a copula based test-statistic, able to decouples marginals and dependency information, is developed. This section tackles the problem of the surveillance of the borders of a nation. The region of interest, in general, may be very wide consisting even of thousands of kilometers of coastline and land border line, and millions of square kilometers. Such a system must face threats such as drug trafficking, intrusions (man, vehicles and airplanes), illegal immigration, smuggling, human trafficking, arms smuggling, unauthorized deforestation, terrorist activities over the military defense of the borders in order to ensure the territorial defense and the national sovereignty in the areas close to the border line. In the following Sections an overview of the range of possibilities and solutions in the design of the surveillance asset and data fusion process of such systems devoted to border control is given. The size of the region, the nature of the border and the complexity of the scenario require the provision of different pictures of the region with different field of view at different resolution and time scales, suggesting a multi-sensor/multi-scale approach integrated in a hierarchical architecture of the whole system. Typically a global field of view of the whole region is necessary at the higher Command and Control (C2) level to capture the overall situation. A higher level of resolution and refresh rate is necessary at the lower and local level to analyze and control in depth each single zone of a region. Therefore the surveillance segment may be structured according to a multilayer architecture where layers realize different trade-offs in terms of field of view and granularity and refresh time. The surveillance segment comprises several types of sensors, each one characterized by different achievable resolution, field of view, and revisiting time. A pictorial sketch of the surveillance architecture is depicted in Figure 22 .21 for a notional country: sensors on board of satellites are expected to provide a global coverage of the monitored area at medium resolution with a low refresh rate, typically in the order of several hours or days; a higher resolution data and a higher refresh rate, in the order of seconds or tens of seconds, is provided by ground sensors on limited areas; airborne sensors (e.g., Unmanned Air Vehicle, UAV) will provide data on remote areas with good resolution data and short deployment time. All data collected by the sensors are exploited by the fusion engine, highlighted in the figure. It is responsible to track and classify relevant entities present in the scenario and to provide a high quality representation of the situation. Also the data fusion process supports this multi-scale approach performing a distributed and network-centric processing at the various levels of the architecture, in accordance with available communication bandwidth and latency. Pictorial of the surveillance architecture. The surveillance of critical perimeters is one of the most important issues in Homeland defense and Homeland Protection systems. The ground surveillance needs are relevant to border protection applications, but include also local area protection, such as critical infrastructure, military/civilian posts. During the last 10 years special attention has been focused on the realization of so-called "electronic fence" for perimeter/border control and several developments have been carried out to demonstrate the efficiency of such systems. However several problems occurred when the electronic fences became operational, showing lacks in the practical use by the operators (i.e., high number of false alarms, loss of/slow communication links) together with the problem of the high funding required for the whole system. One example is described in [149] , that requires now a total different approach for the surveillance of a wide national border (>500 km). In the following an overview of the problems and solutions related to the implementation of an electronic fence is presented. The major components are: • Sensors: they may be either active or passive, radar networks or heterogeneous sensor networks, (e.g., passive IR-infrared, seismic, acoustic, electro-optic-E/O, etc.). • Communication network: necessary to data exchange, may be subdivided into sub-networks if necessary. • Fusion engines: they perform data collection, data fusion and classification; this capability can be spread across the layers that compose the electronic fence (i.e., in the master stations, but also in the C2 centers). Depending on the geographical deployment of the protection system, the data are then exchanged with C2 centers, both at local level and wide area (i.e., national) level. In Figure 22 .22 an example of an electronic fence architecture is depicted. In this case a wide area to be controlled, such as a border of a nation, has been considered; the subnets are geographically distributed along the boundaries. The architecture has the advantage to be modular and scalable and it can be organized with different level C2 centers (local, regional, national), depending also on the size of the considered boundaries. Each subnet is able to ensure the data exchange among the sensors. An overview of the sensors that can be employed in an electronic fence is presented. Example of electronic fence architecture. Microwave (X, Ku, Ka band) ground based radars are widely used to perform the monitoring of open wide areas. The monitoring of walking people and vehicles for ground applications, and of small sized boat for sea and river applications are relevant. The detection ranges varies from 2 km to 10 km for people, and from 5 km to 20 km for vehicles. Aerial targets (e.g., helicopters, low level aircraft) are also detected. Depending on the technology used these radars can be subdivided into the following two categories: • Incoherent: they are low cost devices, FMCW (Frequency Modulated Continuous Wave) or pulsed (often a magnetron is used as most of the navigational radars), where the detection of the moving targets is based on inter-clutter visibility. Resolutions are typically of few meters or tenths of meters both in range and cross-range. • Coherent: they are solid state transmitter based, FMCW or pulse compressed, where the detection of the moving targets is based on sub-clutter visibility. The MTD (Moving Target Detection) filtering, even if the radar is working at X-band, requires low scan rates (in the order of 1-3 RPM-Round Per Minute) to allow high Doppler frequency resolution (0.2-0.5 m/s) to resolve slow moving target also in presence of strong clutter [150] . The attention is for sensors able to operate in critical environments and many studies have been performed, in this direction, mainly using aerial platforms equipped with SAR. The aircraft equipped with sensors are used for wide areas where ground based sensors are not suitable or cannot be installed, such as in forest or jungle. However the use of airborne platforms to perform surveillance, are limited to missions "on spot" because it is not practical or cost/effective for continuous surveillance. The radar sensor can be mounted on manned or unmanned aircraft, usually equipped with electro-optic devices, and they can be used to monitor areas of several tenths of kilometer length. Other solutions take into account the installation of the radar either on a tethered aerostat or on a hovering helicopter. GMTI (Ground Moving Target Indication) from a stationary platform has been demonstrated. Fixed radars for border control are usually in X and Ku band, but, because of the attenuation they suffer from foliage, they cannot be used for FOPEN applications. The ability of traditional microwave radars in operating in an environment with dense foliage is severely limited by foliage backscatter and attenuation of microwave frequencies through foliage [151] . As attenuation falls with increasing wavelength, lower frequencies such as those in the VHF and UHF bands (30-1000 MHz) may be suitable for FOPEN radar applications [152] [153] [154] [155] . FOPEN SAR (Synthetic Aperture Radar) systems started to be used in the early 1990s. They are usually mounted on manned or unmanned aircraft and mainly address illegal activity control and search-and-rescue operations. The focus is now for ground based systems and/or sensors with capabilities to detect walking personnel and moving vehicles [156] . Logistic constraints drive the technology to very low power devices, that are able to operate for several months or years, without maintenance. Another important issue is, together with a good probability of detection, the low false alarm probability, that is requested to be lowered up to 1 false alarm per day, or lower, even in presence of specific weather conditions (rain, wind) and/or local seasonal fauna. A special attention is due to the effect of environment. In dense foliage environments the main clutter effects are the backscatter and the attenuation. Backscatter: The fixed clutter returns can have a zero Doppler component raising up to 60-70 dB above the noise level with spectra amplitude and shape without large variations with frequency, but depending mainly on the wind strength [150] . Considering the measurements reported in [150] of the backscatter Doppler spectra, in order to perform efficient clutter rejection, two values of thresholds can be used: i.e., 1 m/s in case of light air, 2 m/s in case of windy/gale. Attenuation: The attenuation depends mainly on the frequency used and the radar beam grazing angle, even if small variations are reported with different polarizations [153] . Many studies have been carried out for SAR application and several studies report data for attenuation measured directly at ground level [151, 153, 154, 157] . The total attenuation, taking in account the major effects of the environment for a ground radar, can be summarized as follows: (22.45) where: 4 is the attenuation due to the ground reflection at the heights of the antenna (h r ) and the target (h t ), for the wavelength λ, • L f is the attenuation due to the foliage: it depends on the distance, the polarization and the forest type. It depends also on the distribution of the trees and the diameter of the masts, that can limit the line of sight, together with the height and density of lower canopy level. The main requirements/constraints addressed are the range of the detections, which is reduced by the attenuation due to foliage and the low antenna height, that is usually limited to 1-2 m for logistic purposes. Also the power consumption must be kept at minimum level, also considering that photovoltaic cells are not suitable for installation on the ground in the forest. As a consequence the emitted power must be kept at a level of several mW. Camouflage and anti-tamper are often required. Very low cost is a mandatory requirement. Low Probability of Intercept (LPI) capabilities are necessary. Walking personnel and moving vehicles should be detected. Even if the FOPEN radars are referred to the forest environment, the sensor described above is suitable to operate also in different installations, considering, for example, riverside or sea harbor protection applications. In these cases the different environmental conditions allow to achieve better radar performances. In addition, several other constraints (for example the management of transmitted power) can be mitigated by the use of photovoltaic cells and/or different antenna installations. In Figures 22.23 and 22 .24 some outputs of the target detected by the UHF radar are shown. The information are displayed on range-Doppler maps, that are suitable to be read by a trained operator, giving information on the radial speed and, with a medium-high resolution in range, it helps the operator in the targets discrimination and alarm recognition. In this section we consider the Unattended Ground Passive Sensors (UGPS) and Electro-Optic (EO) to detect moving people or vehicles. UGPS. They are used in case of small areas or critical infrastructure perimeter surveillance. They give alarms in presence of target in the operational range and, in some cases, can give a pre-classification of the target detected. The range of each sensor is usually limited to 10 m, but the latest technologies promise to reach detection ranges up to 50 m. They have very small dimension (less than 1 l volume) and low weight (less than 1 kg); they can be rapidly installed on rough ground or roads. Figure 22 .25 gives an example of positioning of UGPS in an operative field. They are of following basic types: • seismic: to detect seismic movement produced by vehicles wheels or people walking, • acoustic: to detect vehicle engine noise, • infrared: to detect differences in thermal data from the environment due to the infrared signature of people and vehicles, • magnetic: to detect magnetic filed variation produced by vehicles. Electro-Optic: They are widely used for surveillance, and many signal processing techniques assist the operator for target detection alerts. They can be fixed or rotating covering up to 360 • in azimuth. For the night vision infrared EO are used, either passive or active, and they can reach a visibility of several kilometers in range. The EO are normally used stand alone or connected with radar sensor to help the operator for classification and identification of the detected targets. For example, with active infrared the operator can read (up to 2 km far from the camera) the license plate of a vehicle previously detected and tracked by the radar. The sensors operate in cluster, and they are connected via a low power RF link, operating at UHF or L/S bands. The data of the unmanned radars can be combined with the data of other UGPS sensors C2 and operator console Unattended ground radar network. (infrared, acoustic, seismic), or connected to an existing network, to perform a more reliable detection system. In Figure 22 .26 an example of sensor network is reported. As shown, adjacent sensor nodes are connected together and the information are sent, to the master station, via the short range radio link; the master station performs data fusion and medium range connection with the other master stations, or the C2 center. In case of long range connection the master stations are connected via radio link repeaters or satellite connections. Special care must be taken to avoid interactions among the sensors, where two or more sensors share the same visibility area. Mutual interferences can be avoided using different frequencies and/or different timing for the transmitted waveform and also orthogonally coded waveforms. The data transfer among the nodes is performed using the radio link between adjacent nodes. In case of linear geometric distribution the data grow up linearly with the number of nodes in the subnet; as a consequence the number of nodes in the subnet is limited by the maximum data rate of the single connection link. The linear electronic fence can be composed of two or more parallel sections to allow redundancy in case of failure or loss of visibility of one or more sensors. An example of electronic fence is shown in Figure 22 .27. In this case different environment conditions have been considered (riverside, forest, manmade buildings, and obstacles) and a network of FOPEN unattended ground radar sensors is used. The fusion engine allows to fuse heterogeneous sensor data at multiple levels to perform tracking and classification of relevant entities present in the scenario and to provide a high quality representation of the situation together with cartographic layers and sensed images of the terrain. Figure 22 .28 provides an example of architecture for the fusion engine. Border surveillance: a notional case. Fusion engine architecture. The tracking function processes the raw data provided by sensors and generates a set of tracks, representative of the real entities present in the scenario. A track typically carries the following information: a timestamp, position coordinates, velocity components, uncertainty on the kinematic components as expressed through the covariance matrix and additional attributes such as class/type and identity. In consideration of the potentially huge geographic extension of the system and of the importance to optimize the deployment of sensors as well as communication and processing power resources, a distributed tracking architecture is necessary. At the first level of the tracking architecture each sensor produces its own "local" tracks, in order to make available to the fusion engine a filtered information. Then a second level tracking combines local tracks originating from different sources into system tracks. This solution distributes the computational load on the peripheral nodes and reduces considerably the communication traffic which must be transmitted from the local level to the higher echelons; this is extremely important in consideration of the reduced bandwidth generally available between the peripheral elements and the center of the system. In this step of the process, information of different nature can be fused producing a unique high quality information. Radar tracks can be fused with multiple images acquired by SAR and optical sensors, even if acquired at different resolutions, to achieve an improved representation of the scene with respect to the one achievable by processing data sets separately, in particular in terms of detection and false alarm probabilities when dealing with small targets (i.e., targets that occupy only few pixels of the image) [158] [159] [160] [161] [162] . The cartographic layers, superimposed with SAR or optical images, allow to put into context all the available information and support the fusion process (e.g., target tracking for ground vehicles especially during maneuvers). Another output of the fusion engine is the classification of the tracked targets and entities of the scenario, i.e., the attribution of a class to the track under examination, hence supporting the capability to achieve a situation awareness. From an operational point of view, the fusion engine can be considered as the responsible of producing a multi-resolution and multi-layer COP (Common Operating Picture), whose definition, as provided by [163] , is the following: "A single identical display of relevant information shared by more than one command that facilitates collaborative planning and assists all echelons to achieve situational awareness." The COP therefore provides to the operators at the different levels the capability to view each time a well-suited map, both in terms of proper scale (with respect to the scale of the observed situation) as well as in terms of number and type of information, according to the situation under analysis. This characteristic allows the system to properly support the operator without overloading him with unimportant information and keep him focused on events and information that might be related with his goal in terms of spatial, temporal, and logic correlation. In the following the main constituents of the fusion engine are described. The local tracking function processes the measurements provided by the sensor and produces a local track for each of the observed targets present in the surveillance region. The task of the tracking function at the local level is therefore of using the measurements made available by the sensor to estimate the number of targets and their kinematic components [164] [165] [166] . Local tracks provide position and velocity estimates at a given time, together with an indication of track quality; the track may also include other attributes relative to track classification, derived directly from radar measurements, from other sensors (EO/IR, UGPS, UAV) or assigned by a human operator. In the scenario of a generic land border may be necessary to form low altitude tracks, surface tracks and ground tracks. Tracking of ground targets is especially critical due to the characteristics of the ground environment and of ground targets. The main criticality may be the masking effect due to terrain orography and vegetation. Another interesting feature of the ground environment is the presence of areas, mainly roads, where the probability of finding targets is higher, and areas such as off-road where the presence of targets is less probable. Distinguishing features of ground targets are high maneuverability and move-stop-move dynamics. Even a well trained operator would be unable to select the correct hypothesis when a ground target is maneuvering since available information is insufficient. In these situations the best strategy is to defer the final decision until more data is available. To take into account these difficulties, the tracking function must be designed so as to handle several concurrent hypotheses and to make final decisions with a deferred logic [167] [168] [169] , i.e., when more data is available which allows to make a final decision with sufficient confidence. The choice of hypotheses is also dependent on the environment and on the target type. The management of multiple hypotheses is then the capability of the function to consider at each time instant a set of hypotheses, such as: • the target is proceeding regularly/is maneuvering on road; • the target is moving/maneuvering off-road; • the target has stopped, etc. The tracking function assigns a score to each hypothesis and identifies the most probable; the function keeps alive for some time not only the most likely hypothesis but also a set of alternative hypotheses which represent different kinematic evolutions of the target. Figure 22 .29 shows an example of the set of hypotheses generated by the function: each hypothesis is relative to a path in the tree from time t0 to time t3 and the single branches may be relative to the choice of a specific dynamic model and/or a specific correlation hypothesis with a measurement in the set. For example in the path highlighted in red it is assumed that the target trajectory in the interval t0-t3 is described by the dynamic model m1; the other branches are relative to alternative hypotheses where it is assumed for example that the target has maneuvered (m2) or stopped (m3), etc. As new information is acquired, the probability of each hypothesis is updated according to new information; hypothesis which initially have a low score may gain credibility and vice versa. This characteristic, i.e., defer the decision until the available information is considered sufficient, allows to resolve most critical situations. To take into account terrain and geographic information, the tracking solution leverages also context information provided by the GIS (Geographic Information System) in accordance with logics of terrain and road aided tracking. Digital Terrain Elevation Data (DTED) are also used to perform accurate projections of the tracks on the terrain and to identify zones where the target trajectory will be masked by obstacles and thus improve track continuity and the estimate of track kinematic parameters (e.g., maximum target velocity given the terrain type). The following Figure 22 .30 shows, for instance, how environmental knowledge can be exploited to improve the tracking function [170, 171] . Figure 22 .30a shows a landscape covered by forests and crossed by a network of paths; due to the nature of the environment, targets especially if motorized, will preferentially move along the track, avoiding off-road areas more difficult to traverse. The blue line represents the trajectory of a track which moves along a winding path in the forest. Figure 22 .30b on the other side shows how information relative to roads and viability in general can be exploited to improve the tracking performance. When the track approaches a bifurcation or a crossing, different hypotheses are generated to take into account possible target trajectories, such as on-road, off-road and also move-stop motion. More specifically the adoption of techniques such as road aided tracking is specifically important since it allows to improve the accuracy in the estimation of target kinematic parameters and therefore to make longer term projections. Finally weather information is exploited to further improve the tracking processing by feeding in information about areas where target detection is less probable (e.g., flooded areas) and expected target velocity is low given the past days weather conditions (e.g., heavy rain is expected to result in limited target velocity). The classification function allows attributing a class to the track under examination, i.e., to determine its belonging to a class of targets. Target classification is extremely important since it helps to determine target identity and its threat level. Part of the classification process is the non-cooperative target recognition (NCTR), in order to avoid fratricide and to allow proper allocation of defensive means against the threat. In a coastal scenario NCTR capabilities are needed against ships, potentially involved in terrorism, illegal immigration or contraband operations, in order to assess and prioritize threats and to provide the appropriate response. Sensors such as radar, EO/IR, may provide useful information for classification. In the radar case, the NCTR technology facilitates the identification of non-co-operative targets by transmitting wide band signals and by processing the radar echoes in a suitable multidimensional domain; e.g., time-frequency and range-angle. In the former case the target is discriminated on the basis of the jet engine or the helicopter rotor modulations of the echo [172] [173] [174] [175] ; in the latter case the target is discriminated on the basis of the measured two-dimensional radar image obtained by ISAR techniques [176] [177] [178] (Figure 22 .31 shows a snapshot of the radar image of a ship). The automatic classification, that the radar is capable of providing by means of these processing techniques, is used directly within the tracking function, to support the plot-track correlation process and to attribute a class to the track. The classification process allows therefore determining the class to which the track belongs (such as pedestrians, vehicles, convoys, helicopters, and small low altitude aircrafts) and performing cueing to other sensors (e.g., EO/IR sensors, high resolution radars) or demanding a patrolling mission (e.g., a mission with UAV). While data provided by sensors are needed to perform the classification processing, once the target has been assigned to a class, this information can be exploited at sensor level to achieve better accuracy in the performed processing (e.g., target classification can be used to refine kinematic target parameters used in the tracking processing). The range-Doppler information can be furthermore employed to produce a confusion matrix useful for target classification. The confusion matrix expresses the a posteriori probability that a target has been classified correctly among a finite number of classes that have been a priori established. References [21, 179] give an example of the use of confusion matrix in the classification issue. Epidemics can impose serious challenges on societies in modern times. The poor health of general population due to a disease causes hardship and pain but also negative trends in the economy through absenteeism from work, missed business opportunities, etc. The ongoing epidemics of AIDS (Acquired Immune Deficiency Syndrome), tuberculosis and the recent outbreaks of SARS (Severe Acute Respiratory Syndrome) and H1N1 (swine flu) provide some revealing examples. In the absence of an effective cure against an infectious disease, the best approach to mitigate its malicious or natural epidemic outbreak resides in the development of a capability for its early detection and prediction of its further development [180] . This enables typical countermeasures, such as the quarantine, vaccination, medical treatment, to be much more effective and less costly [181, 182] . Therefore this issue can be approached as a surveillance problem in the context of Homeland Protection. Syndromic surveillance is referred to as a systematic collection, analysis, and interpretation of public health data for the purpose of early detection of an epidemic outbreak and the mobilization of a rapid response [180, 182] . The key idea is to detect an epidemic outbreak using early symptoms, well before the clinical or laboratory data result in a definite diagnosis. The rationale is that a spread of an infectious disease is usually associated with the measurable changes in the social behavior, which can be measured by non-medical means. Recent studies [183] [184] [185] have demonstrated that these non-medical sources of syndromic data streams, such as the absenteeism from work/school, the pharmaceutical sales, internet queries, twitter messages, and alike, can enable one to draw important conclusions regarding the epidemic state in the community. The "Google Flu" project [186] (flu-related searches in Google) is a well publicized example of this approach. The algorithms for syndromic surveillance and have recently attracted significant attention by scientists and practitioners; there is a vast amount of literature devoted to this topic (for more comprehensive review see [180, 182] and references therein). In general, all algorithms applied in this area can be divided into two main groups, the data mining methods and the information fusion (also known as data assimilation) methods. Data mining is primarily concerned with the extraction of patterns from massive amounts of raw data without using dynamic models of the underlying process (i.e., epidemic spread) [183, 185] . Information fusion algorithms, on the contrary, strongly rely of mathematical models: in this case, the dynamic model of an epidemic outbreak and the measurement model of a particular syndromic data stream [187, 188] . Naturally, the accuracy of information fusion algorithms is significantly determined by the fidelity of the underlying models. This section presents a study of a recursive information fusion algorithm for syndromic surveillance, formulated in the Bayesian context of stochastic nonlinear filtering and solved using a particle filter [134] . While a similar work has been considered earlier, see [189] [190] [191] [192] , this section introduces two novelties. First, in order to overcome the limitations of the standard "compartment" model of epidemic spread (the "well-mixed" approximation) we employ a more flexible alternative, see [193, 194] . The adopted epidemic model has the explicit parameter of "mixing efficiency" (or level of social interaction) and is therefore more appropriate to represent a variety of social interactions in a small community (e.g., self-isolation and panic). An advantage of the adopted epidemiological model is also that it enables to estimate the scaling law of the noise level with respect to the population size of a community. Second, a more flexible model of syndromic measurements, validated with data sets available in the literature [183, 186] , is adopted in the section. This measurement model is robust in the sense that some of its parameters are specified imprecisely, as interval values. The optimal sequential estimator (filter) and predictor are then formulated in the Bayesian framework and solved using a particle filter. To describe the dynamics of an epidemic outbreak we employ the generalized SIR (Susceptible, Infectious and Recovered) epidemic model with stochastic fluctuations [195] [196] [197] . According to this model, the population of a community can be divided into three interacting groups: susceptible, infectious and recovered. Let the number of susceptible, infectious and recovered be denoted by S, I, and R, respectively, so that S + I + R = P, where P is the total population size. The dynamic model of epidemic progression in time can be then expressed by two stochastic differential equations subject to the "conservation" law for the population: where s = S/P, i = I /P, r = R/P, and ξ, ζ are two uncorrelated white Gaussian noise processes, both with zero mean and unit variance. The terms σ q ξ and σ β ζ are introduced into Eq. (22.47) to capture the demographic noise (random variations in the contact rate α and in the recovery time β) [197, 198] . Parameter ν in Eq. (22.47) is the population mixing parameter, which for a homogeneous population equals 1. In the presence of an epidemic, however, ν may vary as people change their daily habits to reduce the risk of infection (e.g., panic, self-isolation). In general, model parameters α, β, ν can be assumed to be partially known as interval values. In order to insure P {s, i, r ∈ [0, 1]} ≈ 1, standard deviations σ q , σ β need to satisfy [199] : Assuming that non-medical syndromic data are available for estimation and forecasting of the epidemic, we adopt a measurement model verified by [185, 186] , where a power law relationship holds for the odds-ratio between the observable syndrome z j and the (normalized) number of infected people i: The power law exponent ς j in Eq. (22.48) is in general syndrome specific. Since at the initial stages of an epidemic (which is of main interest for early detection and forecasting) we have: i 1 and z j 1, Eq. (22.48) can be reduced to a simple power-law model: where b j is a constant and τ j is introduced to model the random nature of measurement noise. It is assumed that τ j is uncorrelated to other syndromes and dynamic noises ξ,ζ . Since z j ≥ 0 (e.g., number of Google searches), the noise term τ j associated with syndrome j should be modeled by a random variable that provides strictly non-negative realizations. For this purpose we adopt the lognormal distribution, that is τ j = σ j η j , with η j ∼ ln N (0, 1) and N (0, 1) being the standard Gaussian distribution. Parameters b j , σ j , ς j typically are not known, but with a representative data set of observations the model of Eq. (22.49) can be easily calibrated (see for example the results of the linear regression fits in [186] ). The data fit reported in [183] suggests that ς j may be close to unity, although it is difficult to precisely specify its value because of significant scattering of data points). To cater for this uncertainty, we assume that ς j can take any value in an interval, ς ∈ ς 1 , ς 2 around ς = 1. Unfortunately [185, 186] do not report any specific values of fitting parameters, so we use in this study some heuristic values for b j , σ j in our simulations. The problem now is to estimate the (normalized) number of infected i, and susceptible s at time t, using syndromic observations z j of Eq. (22.49) , collected up to time t. Let x denote the state vector to be estimated; it includes i and s, but also the imprecisely known epidemic model parameters α, β and ν. The formal Bayesian solution is given in the form of the posterior pdf p(x t |z 1:t ), where x t is the state vector at time t and z 1:t denotes all observations up to time t. Using the posterior p(x t |z 1:t ), one can predict the progress of the epidemic using the dynamic model of Eq. (22.47). For the purpose of computer implementation, first we need a discrete-time approximation of dynamic model of Eq. (22.47) . The state vector is adopted as: x = i s α β ν T , where T is the matrix transpose. Using Euler's method with small integration interval δ, the nonlinear differential equations in Eq. (22.47) can be approximated as The optimal Bayes filter is typically presented in two steps, prediction and update. Suppose the posterior pdf at time t k is given by p(x k Z | 1:k ). Then the prediction step computes the pdf predicted to time t m = t k + δ as [194] : p(x m |z 1:k ) = π(x m |x k ) p(x k |z 1:k )dx k , (22.52) where π(x m |x k ) is the transitional density. According to Eq. (22.50), we can write π(x m |x k ) = N ( f k (x k ), Q). The prediction step is carried out many times with tiny sampling intervals δ until observation z j,k+1 about syndrome j becomes available at t k+1 . The predicted pdf at t k+1 is denoted p(x k+1 |z 1:k ). In the standard Bayesian estimation framework, the predicted pdf is updated using measurement z j,k+1 by multiplication with the measurement likelihood function [200] . According to Eq. (22.49) , the likelihood function in this case is g(z j,k+1 |x k ) = ln N (h(x k+1 ; ς j ), σ 2 j ), where h(x; ς) = b j · x 1 ς . The standard Bayesian approach, however, cannot be applied because h(x; ς) defined in this way is not a function: ς is effectively an infinite set (an interval) and therefore h(x; ς) is one-to-many mapping. An elegant solution to the imprecise measurement transformation is available in the framework of random set theory [137] . In this approach h(x; ς) + τ is modeled by a random set x and the likelihood function represents the probability:g(z|x) = Pr {z ∈ x }, and is referred to as the generalized likelihood. More details and a theoretical justification of this approach can be found in [201] . The Bayes update using syndromic measurement z j,k+1 is now defined as [137] : p(x k+1 |z 1:k+1 ) =g z|x k+1 · p x k+1 |z 1:k g z|x k+1 · p x k+1 |z 1:k dx k+1 . (22.53) For the measurement model Eq. (22.49) with additive Gaussian noise, the generalized likelihood has an analytic expression [201] :g (z j |x) = ϕ z; x , σ 2 j − ϕ z; x , σ 2 j , (22.54) where x = min{h(x; ς ), h(x; ς )}, x = max{h(x; ς ), h(x; ς )} define the limits of the set and ϕ(u; μ, P) = u −∞ ln N (y; μ, P)dy is the cumulative log-normal distribution. The recursions of the Bayes filter start with an initial pdf (at time t k = 0), denoted p(x 0 ), which is assumed known. The proposed Bayesian estimator cannot be solved in the closed form. Instead we developed an approximate solution based on the particle filter (PF) [134, 202] . The PF approximates the posterior pdf p(x k |z 1:k ) by a weighted random samples; details can be found in [134, 202] . The only difference here is that importance weight computation is based on the generalized likelihood function. Epidemic forecasting will be demonstrated using an experimental data set obtained using a large-scale agent based simulation model [203, 204] of a virtual town of P = 5000 inhabitants, created in accordance with the Australian Census Bureau data. The agent based model is rather complex (takes a long time to run) and incorporates a typical age/gender breakdown, family-household-workplace habits, including the realistic day-to-day people contacts for a disease spread. The blue line in Figure 22 .32 shows the number of people of this town infected by a fictitious disease, reported once per day during a period of 154 days (only first 120 days shown). The dashed red line represents the adopted SIR model fit, using the entire batch of 154 data points and integration interval δ = 0.0052 days, with no process noise, i.e., w k = 0 in Eq. (22.50 ). The estimated model parameters are:α = 0.2399,β = 0.1066,ν = 1.2042. These estimates were obtained using the importance sampling technique of progressive correction [202] . Figure 22 .32 serves to verify that the adopted non-homogeneous mixing SIR model, although very simple and fast to run, is remarkably accurate in explaining the data obtained from a very complex simulation system. The true number of infected people in forecasting simulations is chosen to be the output of the agent based population model, shown by the solid blue line in Figure 22 .32. The measurements are generated synthetically in accordance with Eq. (22.49) and discussions above, using the following parameters: ς = 1.05, b j = 0.25, σ j = 0.01, for all j = 1, 2, 3, 4 monitored syndromes. Independent measurements concerning all Nz = 4 syndromes are assumed available on a daily basis during the first 25 days. The problem is to perform the estimation sequentially as the measurements become available until the day number 25, and at that point of time to forecast the number of infected people as a function of time. The initial pdf for the state vector was chosen as p( , and uniform distribution, respectively. The imprecise measurement parameter is adopted as ς ∈ [1.03, 1.07], while its true value The number of particles is set to 10,000. Figure 22 .33 shows the histograms of particle filter estimated values of α, β, and ν, after processing 25 days of syndromic data (i.e., in total 100 measurements). The histograms in this figure reveals that the uncertainty in parameters α and β has been substantially reduced after processing the data (compared with the initial p(α 0 ) and p(β 0 )). The uncertainty in ν, on the other hand, has not been reduced, indicating that this parameter cannot be estimated from syndromic data. While this is unfortunate, it does not appear to be a serious problem in forecasting the epidemic mainly because the prior on ν in practice is fairly tight ( ν ≈ 1). This is confirmed in Figure 22 .34 which shows a sample of 100 overlaid predicted epidemic curves (gray lines) based on the estimate of i, s, α, β, ν obtained after 25 days. Figure 22 .34 indicates that the forecast of the peak of the epidemic is fairly accurate, while the forecast of the size of the peak is more uncertain. Most importantly, however, the true epidemic curve (solid red line) appears to be always enveloped by the prediction curves. More experimental results can be found in [199] . Integrated sensor systems and data fusion have been the main focus of this chapter. The discussed matter has been subdivided in nine sections which have covered a long trip starting from the description of the Homeland Protection problem, to the illustration of a wide spectrum of information sources (sensors and the like), to the netting of such sensors (both homogeneous and heterogeneous), with a broad range of practical applications: cooperative sensing to defend a urban territory, network of cooperative chemical sensors, detection and localization of radioactive point sources, use of so-called electronic fence to protect long borderlines of a territory, up to the estimation and forecasting of an epidemic. This work, an unofficial collaboration between experts from industry, research centers and academia, has brought together a wide spectrum of competences scientific, technical/technological/systemic and on the field. Principles of Data Fusion Automation, Artech House Sequential Monte Carlo Methods in Practice A new approach to linear filtering and prediction problems Decentralized Estimation and Control for Multi-Sensor Systems Fuzzy Logic: Theory and Applications A generalization of Bayesian inference A Mathematical Theory of Evidence Advances and Applications of DSmT for Information Fusion Advances and Applications of DSmT for Information Fusion Introduction to multiradar tracking system Russian-Radio I Sviaz-, Moscow, 1993-and in Chinese-China Defense Publishing House Advanced Topics and Applications Target tracking with bearings-only measurements, Signal Process Association between active and passive tracks for airborne sensors Methods for association of active and passive tracks for airborne sensors Choosing a track association method Multisensor Data Fusion, Artech House Mathematical Techniques in Multisensory Data Fusion Network Centric Warfare: Developing and Leveraging Information Superiority The role of modelling and simulation (M and S) in the analysis of integrated systems for homeland protection Defence Against Terrorism: The Evolution of military Surveillance Systems into Effective Counter Terrorism Systems Suitable for Use in Combined Military Civil Environments, Dream or Reality? NATO Panel Systems, Concepts and Integration (SCI) Methods and Technologies for Defence Against Terrorism Environmental Protection Agency: Strategic Plan for Homeland Security Critical Infrastructure: What Makes an Infrastructure Critical? Report for Congress RL31556, The Library of Congress The National Strategy for the Physical Protection of Critical Infrastructure and Key Assets, The White House The need to improve local self-awareness in CIP/CIIP Identifying, understanding and analyzing critical infrastructure interdependencies Archive of International Maritime Bureau Piracy and Armed Robbery Reports Analysis of emerging phenomena in large complex systems Decision making and the vulnerability of interdependent critical infrastructure Critical information infrastructure security Network discovery using wide-area surveillance data Strategies in data fusion-sorting through the tool box A systems engineering approach for implementing data fusion systems A model for data fusion Proceedings of the 3rd NATO/IRIS Conference JDL Level 5 fusion model: user refinement issues and applications in group tracking Level 5: user refinement to aid the fusion process DFIG Level 5: user refinement issues supporting situational assessment reasoning High-Level Data Fusion, Artech House The wisdom hierarchy: representations of the DIKW hierarchy Design and evaluation for situation awareness enhancement Toward a theory of situation awareness in dynamic systems Measurement of situation awareness in dynamic systems Gaming and shared situation awareness A Discourse on Winning and Losing, Unpublished Set of Briefing Slides Intrusion detection systems and multisensor data fusion: creating cyberspace situational awareness The omnibus model: a new architecture for data fusion? Skills, rules and knowledge: signals, signs and symbolism, and other distinctions in human performance models Information Processing and Human Machine Interaction: An Approach to Cognitive Engineering Human Error Air Force Pamphlet 14-210, Intelligence, USAF Intelligence Targeting Guide, Department of Defense ODNI (Office of Director of National Intelligence): How Do We Collect Intelligence? USA Curvature and temperature of complex networks Sensor models and multi-sensor integration Sensor fusion in time-triggered systems Statistical Signal Processing: Detection Theory Cramer-Rao bound for nonlinear filtering with Pd < 1 and its application to target tracking A comparison of two Cramer-Rao bounds for non-linear filtering with Pd < 1 Proceedings of the 7th International Conference on Information Fusion Affordable high-performance radar networks for homeland security applications Affordable avian radar surveillance systems for natural resource management and BASH applications Proceedings of 2nd Workshop on Cognitive Information Processing Energy aware iterative source localization for wireless sensor networks Information-driven dynamic sensor collaboration An information-based approach to sensor management in large dynamic networks Approximate dynamic programming for communicationconstrained sensor network management Conditional posterior Cramér-Rao lower bounds for nonlinear sequential Bayesian estimation Posterior CRLB based sensor selection for target tracking in sensor networks A sensor selection approach for target tracking in sensor networks with quantized measurements Multi-sensor resource deployment using posterior Cramer-Rao bounds Self-organization in sensor networks Modelling bird flight formations using diffusion adaptation Distributed detection over adaptive networks using diffusion adaptation Diffusion least-mean squares over adaptive networks: formulation and performance analysis Diffusion LMS strategies for distributed estimation Diffusion recursive least-squares for distributed estimation over adaptive networks Synchronization -A Universal Concept in Non Linear Sciences Distributed Algorithms Consensus filters for sensor networks and distributed sensor fusion A simple method to reach detection consensus in massively distributed sensor networks Decentralized synchronic protocols with nearest neighbor communication Self-organizing sensor networks with information propagation based on mutual coupling of dynamic systems Decentralized maximum likelihood estimation for sensor networks composed of nonlinearly coupled dynamical systems Distributed decision through self-synchronizing sensor networks in presence of propagation delays and asymmetric channels Achieving consensus in self-organizing wireless sensor networks, the impact of network topology on energy consumption Bio-inspired sensor network design Least squares estimation and Cramér-Rao type lower bounds for relative sensor registration process An exact maximum likelihood registration algorithm for data fusion Joint data association, registration, and fusion using EM-KF A maximum likelihood approach to joint registration, association and fusion for multi-sensor multi-target tracking A quadratically convergent method for linear programming A new polynomial time algorithm in linear programming Applied Iterative Methods A cooperative sensor network: optimal deployment and functioning Voronoi diagrams-a survey of a fundamental geometric data structure Practical Mathematical Optimization: An Introduction to Basic Optimization Theory and Classical and New Gradient-Based Algorithms Spectral Graph Theory Maximum mutual information principle for dynamic sensor query problems Information-driven dynamic sensor collaboration for tracking applications The State of the Art and the State of the Practice: Transferring Insights from Complex Biological Systems to the Exploitation of Netted Sensors in Command and Control Enterprises, MITRE Technical Papers, MITRE Corporation An epidemic model for information diffusion in MANETs An epidemic theoretic framework for evaluating broadcast protocols in wireless sensor networks Predicting the progress and the peak of an epidemics Topological issues in sensor networks Epidemiology and wireless communication: tight analogy or loose metaphor? Models for integrated pest management with chemicals in atmospheric surface layers Networks of chemical sensors: a simple mathematical model for optimisation study Parameter estimation of a continuous chemical plume source Recherches mathématiques sur la loi d'accroissement de la population Logistic Equation, MathWorld-A Wolfram Web Resource The effect of correlation of chemical tracers on chemical sensor network performance Modelling and performance analysis of a network of chemical sensors with dynamic collaboration A decentralized dynamic sensor activation protocol for chemical sensor networks A distributed e-research tool for evaluating source backtracking algorithms Distributed sensor networks for detection of mobile radioactive sources Radioactive source detection by sensor networks Efficient strategies for low-level nuclear searches Distributed detection of a nuclear radioactive source using fusion of correlated decisions Radiological source detection and localisation using Bayesian techniques Measurement and Detection of Radiation Smart radiation sensor management Information driven search for point sources of gamma radiation, Signal Process An Introduction to Radiation Protection AN/PDR-77 User's Guide LCAARS radiological field trial and validation of source localisation algorithms, DSTO Tech Experimental verification of algorithms for detection and estimation of radioactive sources Sequential Monte Carlo methods in Practice Beyond the Kalman Filter, Artech House Van Trees, Detection, Estimation, and Modulation Theory (Part I) Comparison of two approaches for detection and estimation of radioactive sources Statistical Multi-Source Multi-Target Information Fusion, Artech House Radiation field estimation using a Gaussian mixture Optimal territorial placement for multi-purpose wireless service using genetic algorithms Genetic Algorithms Special Issue on Collaborative Processing Decision fusion in a wireless sensor network with a large number of sensors Surveillance by means of a random sensor network: a heterogeneous sensor approach Graph Theory, Graduate Texts in Mathematics Modern Graph Theory An Introduction to Copulas Fonctions de répartition à n dimensions et leurs marges A parametric copula-based framework for hypothesis testing using heterogeneous data The virual fence's long good-bye Low-Angle Radar Land Clutter SAR Foliage Penetration Phenomenology of Tropical Rain Forest and Northern US Forest Low frequency radar phenomenology study in equatorial vegetation -preliminary results Developments in foliage penetration radar Radio wave propagation through rain forests of India Foliage Penetration Radar: Detection and Characterization of Objects Under Trees Proceeding of CIE International Conference on Radar The fusion of different resolution radar images: a new formalism invited paper Application of multi-scale estimation algorithm to SAR images fusion Radar image fusion by multiscale Kalman filter Multifrequency and multiresolution fusion of SAR images for remote sensing applications Image fusion techniques for remote sensing applications Estimation and Tracking: Principles, Techniques, and Software, Artech House Design and Analysis of Modern Tracking Systems, Artech House Estimation with Applications to Tracking and Navigation IMMJPDA vs., MHT and Kalman filter with NN correlation performance comparison Use of multiple hypothesis in radar tracking, Presented at Radar '92 Performance measure and MHT for tracking move-stop-move targets with MTI sensors Constrained tracking filters for A-SMGCS Track-plot correlation in A-SMGCS using the target images by a surface movement radar Bi-dimensional analysis of simulated herm (helicopter rotor modulation) and jem (jet engine modulation) radar signals for target recognition Classification techniques of radar signals backscattered by helicopter blades A matched subspace approach to CFAR detection of hovering helicopters Automatic target recognition of aircraft models based on ISAR images Multi-feature based automatic recognition of ship targets in ISAR images Multi-frame data fusion techniques for ATR of ship targets from multiple ISAR images Naval target classification based on the confusion matrix Estimating time and size of bioterror attack Statistical Methods in Counterterrorism: Aame Theory, Modelling, Syndromic Surveillance, and Biometric Authentication Infodemiology: tracking flu-related searches on the web for syndromic surveillance Using search engine query data to track pharmaceutical utilization: a study of statin Detecting influenza outbreaks by analyzing twitter messages Detecting influenza epidemics using search engine query data Using the Kalman filter and dynamic models to assess the changing HIV/AIDS epidemic Data driven computing by the morphing fast Fourier transform ensemble Kalman filter in epidemic spread simulations Early detection and assessment of epidemics by particle filtering Real-time epidemic monitoring and forecasting of H1N1-2009 using influenza-like illness from general practice and family doctor clinics in Singapore Predicting the progress and the peak of an epidemic Predicting an epidemic based on syndromic surveillance Semiempirical power-law scaling of new infection rate to model epidemic dynamics with inhomogeneous mixing On the spread of epidemics in a closed heterogeneous population Population biology of infectious diseases: Part 1 Epidemic Modelling Integrating stochasticity and network structure into an epidemic model Stochastic epidemics: major outbreaks and the duration of the endemic period Monitoring and prediction of an epidemic outbreak using syndromic observations Stochastic Processes and Filtering Theory Bayesian estimation with imprecise likelihoods: random set approach A tutorial on particle filters for nonlinear/non-Gaussian Bayesian tracking Epidemic modelling: validation of agent based simulation by using simple mathematical models Epidemic spread modelling: alignment of agent-based simulation with a simple mathematical model Progressive correction for regularized particle filters The first two authors wish to warmly thank Prof F. Zirilli (Univ. of Rome) for his contribution to Section 2.22.6.1, Dr. S. Gallone (SELEX Sistemi Integrati) for contributing to Section 2.22.8.2 and Dr. A. Graziano (SELEX Sistemi Integrati) for the continuous and fruitful cooperation on the many topics described in the Chapter for years.