- Research Article
- Open Access

# Detection and localization of harmful atmospheric releases via support vector machines

- Ronald Taylor Locke
^{1}Email author and - Ioannis Ch Paschalidis
^{1}

**4**:2

https://doi.org/10.1186/s40068-015-0028-z

© Locke and Paschalidis; licensee Springer. 2015

**Received:**5 September 2014**Accepted:**7 January 2015**Published:**5 February 2015

## Abstract

### Background

We present a Support Vector Machine (SVM) approach to the localization of hazardous particulate releases in an urban area using features constructed only from measurements obtained from a network of sensors.

### Results

We find high levels of localization accuracy when a reasonable number of noisy sensors are deployed within the environment. We also compare SVM source localization performance to an existing stochastic localization technique over varying degrees of sensor noise and find it favorable for areas prone to urban canyon turbulence effects.

### Conclusions

This approach is in contrast to earlier works which either use solutions to inverse dispersion problems for localization or apply maximum likelihood techniques. By using established SVM results, we also tackle the problems of release detection and optimal sensor placement.

## Keywords

- Environmental monitoring
- Urban monitoring
- Tracking
- Simulation
- Machine learning

## Background

Modern cities face a multitude of atmospheric pollution threats from a plethora of sources, including large industrial plants in the outskirts of the city, smaller production or processing units in industrial parks or even within the city, warehouses and storage facilities, and large underground networks of gas pipes that are particularly leaky and can release methane.

In addition to the accidental release of some harmful pollutant in the atmosphere, an increasing concern are terrorist threats involving the deliberate release of some *Chemical, Biological, Radiological, or Nuclear (CBRN)* material.

With either accidental or deliberate releases, it is critical to not only provide a reliable indication of the presence of hazardous particles within the atmosphere (*release detection*) but to also indicate where the event originated (*release localization*). Understanding the source’s point in time and space can guide emergency responders and enable fast corrective actions to be more precisely targeted. In the case of a CBRN attack, for example, antidotal medications which are potentially already in short supply can be administered only to people who were exposed and in danger of succumbing to attack related illness or injury. Similarly, in the case of an accidental release, source localization can guide forensics and enable the prevention of future releases.

Prior work in the literature has tackled source localization by tracing, through dispersion modeling, observed particle concentrations back in time and space to the presumed origin (Atalla and Jeremic 2008; Ortner et al. 2007; Ortner and Nehorai 2008). The alternative presented in (Locke and Paschalidis 2012, 2013), as well as the alternative presented in this article, differ in that they depend only on *sensor measurements* and therefore do not require solution to complicated inverse dispersion problems. Additionally, and quite importantly, these source localization techniques provide insight to the related problem of placing sensors.

This work, as well as the work in (Locke and Paschalidis 2012, 2013), does require some a priori computation in lieu of the design of an analytical dispersion model. Specifically, knowledge of particulate dispersion behavior is needed in order to make sense of sequences of particulate concentration observations. Considering that large scale, physical simulant releases in urban areas is prohibitively costly in both time and money, we employ accurate numerical simulations of particulate dispersions in a Monte Carlo fashion to develop a mathematical characterization of sensor measurements under a variety of scenarios. A technique that we have found useful, and adapt for our purposes, which is described in greater detail in the Results and discussion Section, is the *Lattice Boltzmann Method (LBM)*. This numerical dispersion model is advantageous to the problem at hand because it handles complex geometries and changing phenomena typical of urban areas quite naturally. Also, LBM is easily parallelizable for use on a computational grid. This allows us to perform the numerous dispersion simulations required for enhanced accuracy of the presented localization methodology and enables large deployments of our methodology.

- 1.
a new, deterministic localization methodology that does not rely on solving any sophisticated inverse dispersion problem and is an alternative to the stochastic localization methodology presented in (Locke and Paschalidis 2013);

- 2.
a novel sensor placement methodology that stems from a machine learning feature selection procedure; and

- 3.
and a novel procedure inspired by machine learning techniques for the detection of hazardous atmospheric releases.

To our knowledge, no other machine learning hazardous release localization approaches have been presented in the relevant literature. The work contained in (Vujadinovic et al. 2008; Wawrzynczak et al. 2014) could be considered similar, however the localization processes presented therein employ Bayesian statistics as opposed to SVMs. A component that separates this work from (Vujadinovic et al. 2008; Wawrzynczak et al. 2014) is the development of feature vectors that could be applied to any machine learning technique. Also, our approach is not reliant on a forward propagation model.

The work presented here extends dispersion model-free localization into the realm of data-science and opens the door for application of continually evolving swath of machine learning algorithms to the problems of release detection and release localization.

While the focus of this work is urban environments, other environments, at all scales, are also amenable to the presented localization and detection techniques. For instance, downstream river contamination monitoring and underground chemical seepage are tangible problems. Indoor environments, such as nuclear power plants and chemical processing plants, also present potential monitoring applications.

### Related work

Existing source localization approaches (Atalla and Jeremic 2008; Ortner et al. 2007; Ortner and Nehorai 2008) observe particulate concentrations and solve the inverse problem of tracing dispersion backward in time and space to the source of the release. Limitations of this methodology stem from the irregular and dynamic phenomena typically found in urban areas. For instance, buildings within a city tend to have irregular geometries and a plethora of external surface textures. Additionally, the micro-climate effects of urban canyon turbulence under generally uncertain weather conditions are challenging to model. All of these characteristics of urban environments work in unison to make source localization via solving inverse dispersion problems difficult. In (Ortner et al. 2007) the presence of challenging geographies and wind turbulence is accommodated by incorporating Monte Carlo simulation of fluid dispersion. However, all of these works suffer from the difficulty of determining, without a detection process, the point in time in which the release began. Barring this information, these inverse problem approaches can lead to erroneous localizations.

The work presented here provides a deterministic accompaniment to the stochastic localization approach presented in (Locke and Paschalidis 2013). There, considering that under a release, large (small) particulate concentrations observed at one time instance by a sensor are likely to be followed by similarly large (small) particulate concentrations, environmental sensor observations are modeled as a first-order Markov chain. This construct is made tenable by first encoding real-valued sensor concentration observations into a finite set of concentration states. Through the use of Monte Carlo simulation, marginal and transition probabilities of the concentration states are derived empirically to construct probability laws for concentration state evolution under a plethora of release scenarios. Localization is then performed through hypothesis tests that compare current empirical concentration state distributions to the previously derived probability laws. This approach is completely sensor measurement based and therefore does not fall victim to the inherent challenges of producing and then solving an inverse dispersion model.

The SVM-based localization technique presented in this article is similar to the stochastic approach in (Locke and Paschalidis 2013) in that it relies on previously conducted Monte Carlo simulation of release scenarios to build *training sets*. It is also entirely sensor measurement based, which brings the added benefit of not relying on solving an inverse problem. It differs, however, in that the training data is used to build *deterministic* decision boundaries that indicate the location of a detected release.

## Results and discussion

To demonstrate the performance of the sensor placement approach and the localization methodology, we simulated several point release scenarios in an illustrative environment. We simulated CBRN releases in the *Quick Urban & Industrial Complex (QUIC)* Dispersion Modeling System (Paryak and Brown 2007) developed at the Los Alamos National Laboratory. QUIC first solves the fluid dynamics problem of determining local wind eddies throughout a modeled three-dimensional, outdoor setting using the methods of Röckle (1990). Using the fluid flow solution, QUIC simulates the travel of CBRN particulates via a Lagrangian random walk. Previously, the QUIC codes have been tested and validated for real-world situations (Paryak and Brown 2007).

Additionally, we simulated CBRN releases using the *Lattice Boltzmann Method (LBM)*. LBM evolved from the numerical fluid modeling technique *Lattice Gas Automata (LGA)*, in which parcels of air adhere to microscopic laws which dictate their movement. Macroscopic values of flow velocities and densities are then derived by the underlying microscopic properties propagated by the algorithm (Frisch et al. 1986). Unfortunately, LGA often falls victim to instability in the face of statistical noise (Lallemand and Luo 2000). LBM extends LGA by considering air parcel movement more notionally by modeling microscopic air parcel velocities as distributions in the *Lattice Boltzmann Equation (LBE)*. It has been shown that under reasonable starting conditions LBM provides accurate approximations to fluid flows. The presented work continues the precedent set in(Locke and Paschalidis 2012) by using LBM in Monte Carlo simulation for analysis of CBRN events. It is not hard to imagine that it will be of use to future analysts as well. The macroscopic Navier-Stokes equations can be recovered from the microscopic LBE and LBM is easily adapted to parallel computation (Chen and Doolen 1998). This last characteristic is of particular interest, as large-scale real-world applications have the potential to require large amounts of computation.

QUIC is selected for testing purposes as it is representative of popular and traditional dispersion simulation approaches. LBM serves as a contrast to QUIC in modeling as well as in emerging atmospheric modeling trends that are intended to be scalable through parallelized computation. But it is important to note, the purpose of the presented work is hazardous atmospheric release detection and localization. The requisite data simulation process is simulator agnostic. We present results obtained by using training data generated from both simulators as a means to empirically demonstrate that assertion.

We consider 40 unique CBRN event scenarios, each containing a single point release of the same mass, spanning the five different release locations within the grid with wind blowing at 1 m/s or 5 m/s and originating from the four cardinal directions. A large set of training data was constructed via Monte Carlo simulation over each combination of wind direction, wind speed, and release location (data is available at ionia.bu.edu http://ionia.bu.edu/Research/Env_Loc_Data.html).

where *C* is the actual concentration of particulate present at the sensor’s location, *N*(0,*σ*
_{
ε
}) denotes a normally distributed random variable with mean 0 and standard deviation *σ*
_{
ε
}, and *Ĉ* denotes the sensor’s reported concentration observation. First, in what will be referred to as the *mild noise case*, we use a value of *σ*
_{
ε
} which produces an equivalent false alarm rate of 0.125. Also, in what will be referred to as the *large noise case*, we replace the normal random variate in (1) with *N*(0,10*σ*
_{
ε
}). The error term is intended to model both measurement error in the sensor and random perturbations in release concentration realizations. If a higher fidelity sensor is used, then the low-noise sensor data is a better model. Likewise, low-fidelity sensors correspond to the high-noise case.

### SVM CBRN localization evaluation

We construct a test set for localization and placement performance evaluation for each release location by first selecting a wind direction and speed according to a “wind rose” which describes the likelihood of each unique wind speed and direction pair. Once a test simulation was run, we add sensor noise according to the sensor model in (1) for both the mild and large noise cases.

Localization performed using the maximum concentration feature space and data generated using QUIC requires only four, in the case of mild-noise, or five, for the large-noise case, sensors to observe perfect localization on the data in the test set. When LBM data with large sensor noise is used for analysis, a performance plateau appears once five sensors are placed in the environment that is not overcome until 13 sensors are employed for localization. This is the result of many different sensor locations being selected an equal number of times in the iterative SVM feature selection process. The 13th-most commonly selected features provide the sensor location that produces the discernible information for a large portion of the data in the test set.

Features consisting of a time-series average of observed concentrations produce localization accuracy similar to when maximum concentration features are used. However, weaker performance on the QUIC generated data sets suggests the averaged concentration features have a greater sensitivity to noisy data.

The placement solutions produced adhere to an intuitive strategy. The features selected most frequently among all binary SVMs lie either directly on top of or adjacent to the five release locations. Thus, by the time five sensors are deployed, the city grid is covered by sensors that are not more than one block away from a release location. As is demonstrated in the bottom plot of Figure 3, placing five sensors according to this strategy is not always enough to produce acceptable localization accuracy.

### One-class SVM CBRN detection evaluation

By and large, in most real-world CBRN detection applications, the cost of a false alarm is prohibitively expensive. Emergency response when it is not necessary could mean that commercial or governmental buildings are closed to human access during critical times. Additionally, otherwise healthy people may be administered antidotal medicines which could lead to hazardous and undue side-effects. These facts, coupled with the extreme rarity of a CBRN event, cause extremely low probabilities of false alarm to be the governing factor in performance analysis and implementation. In other applications, such as pollution monitoring, where false alarms do not accrue the same level of costs, the probabilities of detection reported here could be increased by increasing the allowable false alarm rate. This is accommodated in the presented methodology by a tunable parameter which defines the detection procedure’s false alarm rate.

### Comparison to stochastic CBRN localization

*σ*

_{ ε }, we construct training and test sets. The empirical probabilities of correct localization, as computed by localization performance on the test sets, appear in the Figure 5.

Clearly, as noise increases, both methodologies’ localization accuracies deteriorate. However, it is evident that the SVM localization procedure is more robust to added noise than the stochastic localization procedure. To be fair, this may be a result of differences in fidelity. SVM features are based on real-valued concentration observations while the stochastic approaches rely on a discretization of concentration measurements. Adding fidelity to the stochastic approaches by expanding the alphabet depicting concentration samples would close the gap shown in Figure 5, albeit at the cost of added computational overhead.

What this translates to in real-world application is a robustness to urban canyon turbulence. In cities where avenues and streets are dwarfed by the tall, densely-packed buildings that line them, turbulence from these urban walls could play a greater role in sporadic particle concentration samplings and should be considered when selecting a localization methodology.

In terms of computational workload, while both methodologies suffer from requiring copious amounts of simulated dispersion data from the gambit of release conditions expected within the environment under surveillance, the SVM training procedure requires much more work than that of the virtually nonexistent training required by the stochastic methodology. However, SVMs in general are an ongoing research topic in an already well developed community. It is likely that advances in SVM training procedures and the development of new “off the shelf” SVM software packages could deaden this computational constraint.

## Conclusions

This work is a step away from the inherently challenging approach of solving inverse dispersion problems in highly dynamic urban environments. At the same time, it is a deterministic compliment to the previously established stochastic localization technique in (Locke and Paschalidis 2013).

Numerical evaluation of SVM CBRN localization shows promising accuracy in most situations with even a small number of sensors. We also found that this deterministic strategy is more robust to applications where either sensor measurement noise or chaotic urban canyon turbulence is to be expected as compared to stochastic CBRN localization.

The detection methodology presented is robust to multiple release cases since it is based on determining simply whether a hazardous element is present in the atmosphere. In theory, a multiple release event would be easier to detect than a single release event due to the increased levels of particulate. Localization, on the other hand, is not. To locate the origin of multiple simultaneous releases requires either a fusion of several single-source localizers or sufficient simulation of multiple release events to use the localization approach we have presented. Considering the impact on computational load to the latter option, it would be wise to employ a computational grid when obtaining localizer training data via simulation.

However, one-class SVM release detection performance still has some room for improvement. While dependable concentration observations, as represented by our LBM dispersion simulations with mild sensor noise in this evaluation, leads to ideal performance characteristics, the probability of detection at reasonable numbers of deployed sensors needs to be higher. In the event that false alarm performance demands are less stringent than those imposed on CBRN attacks, such as in pollution monitoring applications, probability of detection using a one-class SVM is likely to improve dramatically.

While the focus on this work has been on urban environments, this need not be the only application. Any problems where detection and localization of the source of dispersed target particles are within the scope of application for our methods. These include finding a spurious pollution generating plant, downstream pollution monitoring, underground pollutant seepage tracing, and nuclear power plant monitoring, provided an accurate simulator is available for data set generation.

## Methods

An SVM is a well established machine learning technique for binary classification problems (Cortes and Vapnik 1995). The premise is to

*decision function*

We classify a test data point \(\mathbf {x}\in \mathbb {R}^{n}\), by assigning it a label equal to the value of sgn(*f*(**x**)). We review the aspects of SVMs pertinent to source localization in the remainder of this section.

The values *y*
^{
i
} and **x**
^{
i
}, *i*=1,…,*m*, come from a *training set*. The parameters *α*
_{
i
}, *i*=1,…,*m*, and *b* are found via a training procedure.

The function *K*(·,·) denotes any of a set of *kernel functions*. Common choices include the Gaussian kernel, \(K(\mathbf {u}, \mathbf {v}) = \text {exp}\left (-\frac {\text {u}-\text {v}^{\mathit {T}}(\text {u}-\text {v})}{\sigma }\right)\), and the polynomial kernel of degree *d*, *K*(**u**,**v**)=(**u**
^{
T
}
**v**+1)^{
d
}, where (·)^{
T
} denotes transpose.

By labeling a pattern **x** by the sign of the decision function (2), we are classifying it according to which side of a hyperplane it falls on. The use of kernel functions effectively augments the decision making space, thus allowing for accurate classification even in cases where two classes of data are not linearly separable.

### Feature selection for SVMs

Feature selection can be seen as a technique for dimension reduction. The objective is to choose a subset of the existing features by excluding those that provide little benefit in differentiating between two classes of data. Features selected in this way (i.e., features that were not excluded) remain intact. This is in opposition to techniques like principal component analysis in which the resulting features are linear combinations of the original features.

^{ n }whose positive elements indicate selection of

*k*features. For a given σ, a modified kernel,

**u**corresponding to the elements of σ which are equal to one.

*radius*of a modified kernel,

*R*

^{2}, is the radius of the smallest sphere that includes the training patterns in after translation into the modified feature space. That is,

*R*is the minimum non-negative value such that

**a**denotes the center of the sphere. Lagrange duality produces a QP which defines the radius of a modified kernel,

A useful theorem, found in (Weston et al. 2000) but proven, in effect, in (Vapnik 1998) relates the likelihood of erroneous classification to the radius found by (3).

###
**Error Rate Theorem**.

*E*[

*P*

_{ err }] denote the expected probability of erroneous classification of an SVM trained on a data set of

*m*elements. If the data in \({\mathcal X}=\{{\mathbf x}^{1},\dots,{\mathbf x}^{m}\}\) with radius

*R*are separable with a corresponding margin of

*ρ*,

*W*

^{2}(α

^{∗}) denotes the optimal value of the SVM soft margin objective function.

subject to \(\sum _{i=1}^{n}{\boldsymbol \sigma }_{i}=k\), where *W*
^{2}(α
^{∗},*C*;σ) represents the optimal objective function of the soft margin maximization problem with a kernel modified by σ, and *R*
^{2}(β
^{∗};σ) is the radius of kernel *K*
_{
σ
}(·,·). By minimizing (4), features are selected according to excluding features that contribute least to discerning between two classes of data.

Ordinarily, optimization of the function (4) would prove to be a computationally intense search through the large number of possible feature combinations. Fortunately, derivative information for (4) is provided in (Weston et al. 2000). Relaxing σ to be a real-valued vector on the unit hyper-square, one can iteratively minimize (4) using an efficient gradient based solver. After each iteration the features whose corresponding elements of σ are sufficiently close to zero or one are excluded or included, respectively. This process continues until the desired number of features remain.

### Source localization

Source localization is the problem of locating the origin of a hazardous atmospheric release in an urban environment with SVMs that operate solely on information obtained from a network of sensors deployed throughout the city under surveillance. These sensors are assumed to provide sequences of measured concentrations of a target particle. We assume for the time being that sensors have already been placed at *K* locations from a discrete set of locations \(\mathcal {B}=\{B_{1},\dots,B_{M}\}\). We defer to the problem of selecting which locations from
will provide better localization performance to a later section. Our goal is then to, upon observing sequences of sampled particulate concentrations, determine which location from the set \(\mathcal {L}=\{L_{1},\dots,L_{N}\}\) the particles originated.

### Feature representation

*B*

_{ k }as a sequence

where \({c_{t}^{k}}\) denotes the real-valued sampled concentration at location *B*
_{
k
} at discrete time step *t*.

*n*samples in

*c*(

*k*), producing patterns of dimension

*nK*of the form

*k*

_{1},…,

*k*

_{ K }depict the

*K*location indices where sensors are deployed. A potentially smaller feature vector is the quantization of concentration observations made by taking aggregate mean concentrations over several consecutive elements of

*c*(

*k*). If these means are taken over, say,

*m*elements, the resulting patterns of dimension \(\lceil \frac {n}{m}\rceil K\), where ⌈·⌉ denotes rounding up to the next integer, take the form

*m*=

*n*, these features are

*K*dimensional and take the form

*c*(

*k*) and its time step index. This feature contains only two elements per sensor, but still contains a differentiating feature (maximum concentration) as well as a temporal measure (time index), thus making it adequate for detecting differences in release scenarios. Patterns produced under this paradigm take the form

### SVM localization

A question of how to adapt a binary classifier to select one of *N* release locations remains. For localization, we look to methods that repeatedly call upon the outcomes of binary SVM evaluations to select, based on the feature spaces described by any of the feature representations above, a release location. In effect, we are constructing an *N*-class classifier out of several binary classifiers. Popular approaches revolve around the idea of setting up some sort of tournament of several binary classifiers. Each match within the tournament prevents a test pattern from being labeled as a particular class. The class remaining at the conclusion of the tournament is assigned to the test pattern.

In (Hsu and Lin 2002), a comparison of the so-called “one-against-all”, “one-against-one”, and Directed Acyclic Graph (DAGSVM) methods for multi-class SVMs is conducted. In the “one-against-all” approach, *N* classifiers of the form (2) are found, where *N* is the number of classes. For classifier *i*, an SVM is trained with patterns belonging to class *i* labeled as 1 and those patterns belonging to all other classes as −1. When evaluating a test pattern **x**, the class whose SVM achieves the maximum value of (2) is assigned.

In the “one-against-one” approach, \(\frac {N(N-1)}{2}\) SVMs are trained. For each class combination (*i*,*j*), *i*<*j*, a binary SVM is trained on data belonging only to classes *i* and *j*. A test pattern **x** is assigned the class that was assigned the most number of times out of all of the binary classifications. DAGSVM is similar to the “one-against-one” approach, but instead of considering each of the \(\frac {N(N-1)}{2}\) binary SVMs, it assigns labels by starting with the decision made on a particular class pair. Based on the results of the first classification, binary classification between the previously selected class and another particular class is performed. This process continues until no more prescribed comparisons remain.

Based on the results in (Hsu and Lin 2002) and ease of implementation, we use the “one-against-one” multi-class method for source localization throughout the following. From a large set of sensor concentration sequences
, obtained from a particulate dispersion simulator, we form feature vectors according to one of the paradigms listed in Section Feature representation to produce a training set
. Out of
we build \(\frac {N(N-1)}{2}\) training sets denoted \(\mathcal {X}_{1,2},\mathcal {X}_{1,3},\dots,\mathcal {X}_{N-2,N},\mathcal {X}_{N-1,N}\), where \(\mathcal {X}_{i,j}\) represents the subset of
that consists only of training patterns obtained through simulation under release locations *L*
_{
i
} and *L*
_{
j
}. Then, for *i*,*j*=1,…,*N* and *i*<*j*, we use \(\mathcal {X}_{i,j}\) to train a binary classifier of the form (2), denoted as *f*
_{
i,j
}(**x**). For a new test vector **x**, produced from newly observed concentration sequences, we select either location *L*
_{
i
} or *L*
_{
j
} according to the sign of *f*
_{
i,j
}(**x**) for all *i* and *j*, with *i*<*j*. The location out of
that was selected the most number of times out of all of the \(\frac {N(N-1)}{2}\) selections is chosen as the release location.

### Sensor placement

The question remains, if we are allowed to place sensors anywhere within the set of possible sensor locations
, which sensor locations should be selected? A straightforward extension of the SVM localization method provides a guideline for placement of available sensors. Using the feature selection methods previously discussed, we can select *K* of the *M* sensor locations.

*M*features of dimension

*d*, with all potential sensor locations’ associated features included. That is, a pattern is originally of the form

**x**=(

**x**

_{1},…,

**x**

_{ M }) where

**x**

_{ i }=(

*x*

_{ i,1},…,

*x*

_{ i,d }) is a

*d*-dimensional feature of one of the forms discussed in Section Feature representation or some other form. We select sensor locations by following the feature selection procedure of minimizing (4) with respect to σ=(σ

_{1},…,σ

_{ M }), where σ

_{ i }∈{0,1}

^{ d }for

*i*=1,…,

*M*. More specifically, allowing the notation σ

_{ i }=(

*σ*

_{ i,1},…,

*σ*

_{ i,d }), we minimize

*R*

^{2}is the radius of the modified kernel

*K*

_{ σ }(·,·) and is the optimal solution to

*W*

^{2}is the optimal solution to

*C*. In both (7) and (8) we use the convention introduced previously, where

**u**∙σ returns a vector whose elements are those of

**u**that correspond to the elements of σ that are equal to one. The minimizer σ

^{∗}of (6) becomes the vector indicating which

*K*out of the

*M*present

*d*-dimensional features are to be used in localization. Thus, σ

^{∗}effectively selects which

*K*locations sensors should be placed.

This process is replicated for each of the \(\frac {N(N-1)}{2}\) binary SVMs used in the “one-against-one” localization technique. Sensors are placed at the *K* locations that are selected most frequently among these replications.

### Release detection

An important component to locating the origin of a particulate release by concentration sampling is the amount of time between subsequent observations. It is hard to construct a feature space that does not rely on the starting time of the release. What is needed is a trigger mechanism that alarms immediately upon detecting a hazardous atmospheric dispersion.

Detection problems involving noisy observations have long been an area of research. When hazardous particulates are not present, sensor observations are purely due to sensor noise. If we make the assumption that sensor noise is independent and identically distributed (iid) and behaves according to a known distribution, an elementary approach is to set, through analysis of the noise distribution and a tolerable false alarm rate, a concentration threshold. Whenever any sensor observes a value greater than this threshold, the time of the alarm can be used as the originating time of the release.

An SVM approach to release detection is the so-called “one-class SVM” method of novelty detection (Schölkopf et al. 2001). One-class SVM is similar to the binary SVM in its form and training, except that only representative training elements from a single set are available for analysis. The premise is, in the absence of one class’s training patterns, to treat the origin of the higher dimensional space identified through the choice of a kernel function as the only member of the opposite class. Then, a hyperplane that separates all but a controlled number of training patterns from the origin effectively becomes an anomaly detector.

In the case of release detection, we train a one-class SVM using only features of the form described in Section Feature representation that represent sensor observations when no release is present. These patterns would therefore represent the perturbations in concentration observations that result from sensor noise or routine false alarming due to the presence of some non-target particulate. When any of the sensor observations are declared anomalous by the one-class SVM, we would presume that this is because a sensor’s observations depart too largely from the usual behavior and declare a release.

## Declarations

### Acknowledgements

This work is sponsored by the United States Air Force under Air Force Contract #FA8721-05-C-0002. Opinions, interpretations, recommendations and conclusions are those of the authors and are not necessarily endorsed by the United States Government.

Research partially supported by the NSF under grants CNS-1239021 and IIS-1237022, by the ARO under grants W911NF-11-1-0227 and W911NF-12-1-0390, and by the ONR under grant N00014-10-1-0952.

## Authors’ Affiliations

## References

- Atalla, A, Jeremic A (2008) Localization of chemical sources using stochastic differential equations In: Acoustics, speech and signal processing, 2008. ICASSP 2008, 2573–2576.. IEEE international conference on.Google Scholar
- Chen, S, Doolen GD (1998) Lattice Boltzmann method for fluid flows. Ann Rev Fluid Mech 30(1): 329–364.View ArticleGoogle Scholar
- Cortes, C, Vapnik V (1995) Support-vector networks. Mach Learn 20: 273–297.Google Scholar
- Frisch, U, Hasslacher B, Pomeau Y (1986) Lattice-gas automata for the Navier-Stokes equation. Phys Rev Lett 56: 1505–1508.View ArticleGoogle Scholar
- Hsu, C-W, Lin C-J (2002) A comparison of methods for multi-class support vector machines. IEEE Trans Neural Netw 13: 415–425.View ArticleGoogle Scholar
- Lallemand, P, Luo L-S (2000) Theory of the lattice Boltzmann method: Dispersion, dissipation, isotropy, galilean invariance, and stability. Phys Rev E 61: 6546–6562.View ArticleGoogle Scholar
- Locke, RT, Paschalidis IC (2012) Stochastic localization of cbrn releases In: Acoustics, speech and signal processing, 2012. ICASSP 2008. IEEE international conference on.Google Scholar
- Locke, R T, Paschalidis IC (2013) Model-free stochastic localization of cbrn releases. Signal Process IEEE Trans 61(17): 4246–4258.View ArticleGoogle Scholar
- Ortner, M, Nehorai A, Jeremic A (2007) Biochemical transport modeling and bayesian source estimation in realistic environments. Signal Process IEEE Trans 55(6): 2520–2532.View ArticleGoogle Scholar
- Ortner, M, Nehorai A (2008) Biochemical transport modeling, estimation and detection in realistic environments In: Acoustics, speech and signal processing, 2008. ICASSP 2008. IEEE international conference on, 5169–5172.Google Scholar
- Paryak, ER, Brown MJ (2007) QUIC-URB v.1.1:theory and users guide. Technical report, Los Alamos National Laboratory. https://www.lanl.gov/projects/quic/open_files/QUICURB_UsersGuide.pdf.
- Röckle (1990) Bestimmung der strömungsverhlltnisse im bereich komplexer bebauungsstrukturen. PhD thesis, Technischen Hochschule, Darmstadt, Germany.Google Scholar
- Schölkopf, B, Platt JC, Shawe-Taylor JC, Smola AJ, Williamson RC (2001) Estimating the support of a high-dimensional distribution. MIT Press, Cambridge, MA, USA. http://dx.doi.org/10.1162/089976601750264965.Google Scholar
- Vapnik, VN (1998) Statistical learning theory. John Wiley & Sons, Inc., New York, NY, USA.Google Scholar
- Vujadinovic, M, Rajkovic B, Grisc Z (2008) Locating a source of air pollution using inverse modelling and pre-computed scenarios In: iEMSs 2008: International congress on environmental modelling and software.Google Scholar
- Wawrzynczak, A, Jaroszynski M, Borysiewicz M (2014) Data-driven genetic algorithm in bayesian estimation of the abrupt atmospheric contamination source In: Computer science and information systems (FedCSIS), 2014 IEEE federated conference on, 519–527.Google Scholar
- Weston, J, Mukherjee S, Chapelle O, Pontil M, Poggio T, Vapnik V (2000) Feature selection for svms In: Neural Information Processing Systems, 2000, 668–674.Google Scholar

## Copyright

This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.