Peter V. Czipott
General Electric
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Peter V. Czipott.
Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IV | 2005
Hoke S. Trammell; Alexander R. Perry; Sankaran Kumar; Peter V. Czipott; Brian R. Whitecotton; Tobin McManus; David O. Walsh
Magnetic sensors configured as a tensor magnetic gradiometer not only detect magnetic targets, but also determine their location and their magnetic moment. Magnetic moment information can be used to characterize and classify objects. Unexploded ordnance (UXO) and thus many types of improvised explosive device (IED) contain steel, and thus can be detected magnetically. Suitable unmanned aerial vehicle (UAV) platforms, both gliders and powered craft, can enable coverage of a search area much more rapidly than surveys using, for instance, total-field magnetometers. We present data from gradiometer passes over different shells using a gradiometer mounted on a moving cart. We also provide detection range and speed estimates for aerial detection by a UAV.
Sensors, and command, control, communications, and intelligence technologies for homeland defense and law enforcement. Conference | 2003
Alexander R. Perry; Peter V. Czipott; Simon Peter Beevor; Gerard Andrew Hanley
Conventional concealed weapons detection portals, deployed worlwide at airports, governent buildings, courthouses, and other security critical facilities, are challenged by todays need for stringent and effective entry point screening. Modern threats, like exotic lightweight handguns, are becoming increasingly difficult to detect. Conventional portals do little, if anything, to assist security personnel in resolving the true nature of a potential threat. Systems that rely on blind operator intervention for alarm resolution invite too much human error so security is ultimately compromised. These systems do not instill confidence in the operator or the general public and thus do not present the necessary deterrent to those with sinister intent. Increased detection and improved discrimination do not adequately advance the utility of these security tools. High precision alarm object location information presented to the operator will result in the rapid resolution of the potential threat. Providing this information to the person under scrutiny via a static or streaming video image can enable self-divesting of the offending item without the need for security personnel intervention. Robust detection, effective discrimination, and precise object location information will result in superior entry point screening operations.
Unattended Ground Sensor Technologies and Applications V | 2003
Alexander R. Perry; Yacine Dalichaouch; Peter V. Czipott
Magnetic sensors are unaffected by rolling terrain, by vegetation and by weather phenomena, so provide a consistent and predictable performance. Most magnetic tracking algorithms work best for a limited span of closest approach distances between the target and any sensor array node and have specific requirements in terms of the relative node placement. Unlike demonstration fields, where the nodes are carefully manually placed, proposed field deployment methods cannot reliably achieve specific spacings. We propose a novel algorithm that is insensitive to variations in spacing, thereby eliminating the limit on closest approach distances, so that the sensor array can locally adapt the algorithm to the array configuration. This local adaptation also enables scalability for whole-array tracking.
Acquisition, tracking, and pointing. Conference | 2003
Alexander R. Perry; Sankaran Kumar; Peter V. Czipott
Passive magnetic measurements may be used to determine the azimuth, bearing and range to the target in real time using suitable signal processing without illuminating the target. Collision and even close approach must be avoided for classes of targets such as proximity fuzed mines. This paper describes a simple safety algorithm that monitors data from such a tensor magnetometer system and overrides the normal autopilot to ensure a minimum radius is always maintained from all magnetic targets encountered.
Archive | 2003
Peter V. Czipott; Sankaran Kumar; Stephen Wolff; Lowell J. Burnett
Archive | 2001
William F. Avrin; Sankaran Kumar; Peter V. Czipott; Walter N. Freeman; Hoke S. Trammell
Archive | 2003
Peter V. Czipott; Sankaran Kumar; Stephen Wolff; Lowell J. Burnett; Richard J. McClure; R. Massengill; William F. Avrin
Archive | 2001
William F. Avrin; Sankaran Kumar; Peter V. Czipott; Richard J. McClure; R. Kemp Massengill
Archive | 2003
Peter V. Czipott; Sankaran Kumar; Stephen Wolff; Lowell J. Burnett; Richard J. McClure; R. Kemp Massengill; William J. Avrin
Archive | 2007
Sarah Christine Maas Stotz; Peter Henry Tu; Hoke Smith Trammell; Peter V. Czipott; Yotam Margalit