Network-centric sensor coverage management

ABSTRACT

Embodiments described herein are directed to employing an aggregation of participant sensor coverage areas to determine if there are missing coverage areas or unwanted overlapping coverage areas. If there are missing coverage areas, then at least one participant is instructed to modify its sensor coverage area to at least partially cover the missing coverage area. Conversely, if at least one participant has a sensor that is providing unwanted overlap of other sensor coverage areas, then that participant may be instructed to stop using that sensor, utilize that sensor for other data transmission purposes, or modify the coverage area to be non- or less-overlapping.

BACKGROUND Technical Field

The present disclosure relates generally to sensor and informationdistribution management and, more particularly, to utilizing aggregatedinformation from multiple sensor of participant devices to reduceoverlapping sensor coverage.

Description of the Related Art

Airplanes typically rely on radar or GPS information to track otherairplanes. Some airplanes, however, may be flying in an area with pooror unreliable radar coverage. Similarly, some airplanes may notbroadcast their current location to other airplanes. As a result, theradar and GPS information may not present a complete picture of all theairplanes in a given area, and thus create a dangerous situation inwhich airplanes may be flying near or towards one another withoutknowing.

At the same time, mobile communication devices, such as smart phones,have become a very integral part in many people's lives. And the numberof mobile communication devices in use, and people's reliance thereon,continues to grow. For example, many people have a need or expect to beable to connect to the Internet in a variety of different locations,including on commercial airlines. Many commercial airlines rely onsatellite communication networks to provide its passengers with Internetaccess. However, these communication networks are often slow and havelimited bandwidth capabilities. It is with respect to these and otherconsiderations that the following disclosure addresses.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

Non-limiting and non-exhaustive embodiments are described with referenceto the following drawings. In the drawings, like reference numeralsrefer to like parts throughout the various figures unless otherwisespecified.

For a better understanding of the present invention, reference will bemade to the following Detailed Description, which is to be read inassociation with the accompanying drawings:

FIG. 1 illustrates a context diagram of an environment for utilizingsensor coverage management in accordance with embodiments describedherein;

FIG. 2 illustrates a block diagram of a communication network betweenparticipants in accordance with embodiments described herein;

FIG. 3 illustrates a context diagram illustrating a use-case example ofemploying sensor coverage management to transmit data in accordance withembodiments described herein;

FIGS. 4A-4B illustrate context diagrams of using directional signalingand scanning to provide directional communication between participantsin accordance with embodiments described herein;

FIG. 5 illustrates a context diagram illustrating a use-case example ofdirectional sensors being employed by a participant in accordance withembodiments described herein;

FIGS. 6A-6E illustrates context diagrams illustrating a use-case exampleof utilizing directional sensors along with sensor coverage managementin accordance with embodiments described herein;

FIG. 7 illustrates a logical flow diagram showing one embodiment of anoverview process for a computing system to provide sensor coveragemanagement in accordance with embodiments described herein; and

FIG. 8 shows a system diagram that describes one implementation ofcomputing systems for implementing embodiments described herein

DETAILED DESCRIPTION

The following description, along with the accompanying drawings, setsforth certain specific details in order to provide a thoroughunderstanding of various disclosed embodiments. However, one skilled inthe relevant art will recognize that the disclosed embodiments may bepracticed in various combinations, without one or more of these specificdetails, or with other methods, components, devices, materials, etc. Inother instances, well-known structures or components that are associatedwith the environment of the present disclosure, including but notlimited to the communication systems and networks, have not been shownor described in order to avoid unnecessarily obscuring descriptions ofthe embodiments. Additionally, the various embodiments may be methods,systems, media, or devices. Accordingly, the various embodiments may beentirely hardware embodiments, entirely software embodiments, orembodiments combining software and hardware aspects.

Throughout the specification, claims, and drawings, the following termstake the meaning explicitly associated herein, unless the contextclearly dictates otherwise. The term “herein” refers to thespecification, claims, and drawings associated with the currentapplication. The phrases “in one embodiment,” “in another embodiment,”“in various embodiments,” “in some embodiments,” “in other embodiments,”and other variations thereof refer to one or more features, structures,functions, limitations, or characteristics of the present disclosure,and are not limited to the same or different embodiments unless thecontext clearly dictates otherwise. As used herein, the term “or” is aninclusive “or” operator, and is equivalent to the phrases “A or B, orboth” or “A or B or C, or any combination thereof,” and lists withadditional elements are similarly treated. The term “based on” is notexclusive and allows for being based on additional features, functions,aspects, or limitations not described, unless the context clearlydictates otherwise. In addition, throughout the specification, themeaning of “a,” “an,” and “the” include singular and plural references.

As referred to herein, an “object” is a physical thing or item. Examplesof objects include, but are not limited to, cars, planes, trains, boats,people, buildings, or other mobile or stationary things. Objects includeparticipant objects and non-participant objects, which can be mobile orstationary. As referred to herein, a “participant” is an object thatincludes a computing device that can communicate specific, predeterminedtypes of information and data to other participant objects vialine-of-sight communications. And as referred to herein, a“non-participant” is an object that does not include a computing devicethat can communicate the same specific, predetermined types ofinformation and data with a participant object. As discussed in moredetail herein, participants can be mobile or stationary and may includecomputing devices of different sizes having different computing ornetworking capabilities. Throughout this disclosure, the term“participant” is used interchangeably with “participant object” and“participant computing device” and other related variations, and theterm “non-participant” is used interchangeably with “non-participantobject” and other related variations.

As referred to herein, “line-of-sight communication” refers to wirelesstransmission of information from a participant to another participantwithout other retransmission devices. Accordingly, line-of-sight is themaximum range one participant can communicate wirelessly with anotherparticipant without significant data lose. Examples of wirelesstransmissions used in line-of-sight communications include Bluetooth,WiFi, ADSB, TCAS, or other protocols now known or developed in thefuture. In some embodiments, all communications between participantsutilize a common protocol.

As referred to herein, “sensor” refers to a participant's utilization ofline-of-sight communications to transmit information to anotherparticipant or to detect another participant or non-participant object.For example, the sensor may include a transmitter that transmitsnotification signals or other data via line-of-sight communications toanother participant. Notification signals are radio signals that arebroadcast or directionally transmitted from a participant to sendinformation to other participants that are within line-of-sight of thetransmitting participant. As one example, notification signals mayinclude the participant's identification information, geolocation,kinematic information, throughput capabilities, frequency capabilities,and other information regarding the participant. The sensor can alsotransmit data signals to other participants. Data signals are radiosignals that are broadcast or directionally transmitted from aparticipant to another participant or computing device to send orforward messages or data packets between participants and computingdevices that are in line-of-sight communication with the transmittingparticipant. The sensor may also include a receiver that receives echosignals of the transmitted notification signals. These echoednotification signals can be utilized to determine a location of anobject, which is described in more detail in U.S. patent applicationSer. No. 15/892,259, filed Feb. 8, 2018, which is herein incorporated byreference.

Sensors also include beam forming techniques and technology that enablethe sensor to transmit data to or detect objects in a specific sensorcoverage area. This specific sensor coverage area is determined based onthe beamwidth of the sensor transmissions and a threshold line-of-sightdistance of such transmissions. The threshold line-of-sight distance maybe determined based on the distance away from the transmission wheredata loss exceeds a predetermined threshold amount, which may be basedon the type of transmitter utilized, power utilization, antennacapabilities, frequency, etc. Sensors may beam form in two dimensionsaway from a participant or in three dimensions away from theparticipant. In this way, sensors can be configured to transmit data ordetect objects in a specific coverage area next to, in front of, behind,above, or below the participant, or a combination thereof.

FIG. 1 illustrates a context diagram of an environment 50 for utilizingsensor coverage management in accordance with embodiments describedherein. Environment 50 includes a plurality of mobile participants, aplurality of stationary participants, and a plurality ofnon-participants (e.g., object 28). As mentioned above, the participantscan communicate specific types of information or data with one another,but cannot communicate the same types of information with thenon-participants.

Briefly, each mobile participant employs one or more sensors tocommunicate with other participants or to detect objects in the vicinityof the participant. A computing device, such as one or more of themobile participants, a stationary participant, or a server computer orsystem may manage which sensors on which mobile participants should beused by that participant and in what direction. In this way,participants can focus their sensors on an area that is not alreadycovered by the sensors on other participants.

The following is a general discussion of the types of participants thatmay be utilized in such an environment and system. Embodiments, however,are not limited to these particular participants and combinations ofparticipants. For example, in some embodiments, only tier 3 mobileparticipants (e.g., airplanes) may utilize the sensor coveragemanagement described herein. In other embodiments, for example, acombination of mobile aerial participants and mobile ground participantsmay be utilized.

The plurality of mobile participants includes tier 1 mobile participants22, tier 2 mobile participants 24, and tier 3 mobile participants 26.The three tiers of mobile participants are generally separated by thecomputing and networking capabilities of the computing devicesassociated with the mobile participant. The computing and networkingcapabilities may be limited or determined by the amount of poweravailable or utilized by a mobile computing device, the amount ofprocessing power available, or the size, type, or accuracy of theantenna utilized, etc.

For example, tier 1 mobile participants 22 typically have the smallestavailable power, lowest processing power, smallest bandwidth, shortestranged antenna, lowest power output, lowest accuracy, and slowest updaterate. Examples of tier 1 mobile participants 22 include, but are notlimited to, mobile phones, laptop computers, tablet computers, wearablecomputing devices, or other smaller, low power, low transmission mobilecomputing or Internet-Of-Things devices. In the example illustrated inFIG. 1, there is only a single tier 1 mobile participant 22, whichhappens to be a mobile phone in this example. However, other numbers andtypes of tier 1 mobile participants 22 may also be employed.

Tier 2 mobile participants 24 typically have medium power constraints, amedium amount of processing power, medium bandwidth, medium rangecapabilities, medium accuracy, and medium update rate. Examples of tier2 mobile participants 24 include, but are not limited to, automobiles,small personal boats, personal aircrafts, or other medium power, mediumtransmission, power regenerating mobile computing devices or objectsthat can support such mobile computing devices. FIG. 1 illustratesexample tier 2 mobile participants 24 as including automobiles 24 a and24 b. However, other numbers and types of tier 2 mobile participants 24may also be employed.

Tier 3 mobile participants 26 typically have the largest availablepower, highest processing power, highest bandwidth, longest transmit andreceive capabilities, highest accuracy, and fastest update rate amongmobile participant computing devices. Example tier 3 mobile participants26 include, but are not limited to, commercial airline planes,semi-trucks, cargo ships, trains, or other objects that can supportlarger, high power, high transmission mobile computing devices orobjects that can support such mobile computing devices. FIG. 1illustrates example tier 3 mobile participants 26 as including boat 26a, train 26 b, and airplanes 26 c and 26 d. However, other numbers andtypes of tier 3 mobile participants 26 may also be employed.

Various embodiments described herein refer to mobile aerial participantsor mobile ground participants. Mobile aerial participants and mobileground participants are mobile participants. Thus, mobile aerialparticipants and mobile ground participants may likewise be separatedinto the three-tiers of participant capabilities.

For example, tier 1 mobile aerial participants may include personalcomputing devices that are onboard an airplane, such as user devices;tier 2 mobile aerial participants may include general aviation aircraft;and tier 3 mobile aerial participants may include cargo aircraft andcommercial aircraft. Tier 1 mobile ground participants may includepersonal computing devices that are on a person walking down the streetor on a car or in a boat; tier 2 mobile ground participants may includeautomobiles or recreational watercraft; and tier 3 mobile groundparticipants may include semi-trucks and cargo ships.

In some embodiments, one or more of these tiers may be further separatedby capabilities or expected utilization. For example, tier 3 mobileaerial participants may include tier 3A mobile aerial participants thatinclude cargo aircraft and tier 3B mobile aerial participants thatinclude commercial aircraft. One situation where this distinction mayoccur is where a commercial aircraft is handling a lot of data requestsfrom user devices onboard the aircraft (e.g., tier 1 mobile aerialparticipants), which may impact that aircraft's throughput forforwarding communications between other participants. Conversely, acargo aircraft is typically not handling a lot of data request from userdevices onboard the aircraft, but is instead primarily being used toforward communications between other participants.

Although some embodiments may be described herein with respect to mobileaerial participants, embodiments are not so limited. Those sameembodiments may instead utilize mobile ground participants or acombination of mobile ground participants and mobile aerialparticipants, unless the context clearly indicates otherwise.

The plurality of stationary participants includes ground entry points14, remote entry points 16, and access nodes 18. In some embodiments,stationary participants may be referred to as ground participants.Similar to the three tiers of mobile participants, the ground entrypoints 14, remote entry points 16, and access nodes 18 are generallyseparated by computing and networking capabilities, and footprint sizein some embodiments.

For example, ground entry points 14 typically have the largest availablepower, highest processing power, highest bandwidth, and longest rangeantenna capabilities. Example locations of ground entry points 14include, but are not limited to, cellular towers, airports, large retailor superstores, or other locations that can support large sized, highpower, high transmission stationary computing devices. FIG. 1Aillustrates example ground entry points 14 as including tower antenna 14a and superstore 14 b. However, other numbers and types of ground entrypoints 14 may also be employed.

Remote entry points 16 typically have medium power constraints, a mediumamount of processing power, medium bandwidth, and medium rangecapabilities. Example locations of remote entry points 16 include, butare not limited to, restaurants and coffee shops, airfields and trainstations, satellites, or other locations that can support medium sized,medium power, medium transmission stationary computing devices. FIG. 1Aillustrates example remote entry points 16 as including store antenna 16a and satellite 16 b. However, other numbers and types of remote entrypoints 16 may also be employed.

Access nodes 18 typically have the smallest available power, lowestprocessing power, lowest bandwidth, and shortest range antennacapabilities of the stationary participants. Example locations of accessnodes 18 include, but are not limited to, road intersections, traincrossings, road signs, mile markers, crosswalks, or other locations thatcan support smaller, low power, low transmission stationary computingdevices. In the example illustrated in FIG. 1A, there is only a singleaccess node 18, which happens to be a road sign in this example.However, other numbers and types of access nodes 18 may also beemployed.

As mentioned herein mobile and stationary participants can communicatewith one another to pass information from one participant to another.

FIG. 2 illustrates a block diagram of a communication network betweenparticipants in accordance with embodiments described herein. FIG. 2illustrates an example 60 of a communications network 33 between aplurality of mobile aerial participants 32 a-32 c. Collectively, themobile aerial participants 32 a-32 c may be referred to as the network.Although FIG. 2 only illustrates three mobile aerial participants ascreating network 33, embodiments are not so limited and one or aplurality of mobile aerial participants may be employed. Similarly, thenetwork 33 may be established from other types of mobile participants,including various combinations of tier 1 mobile participants, tier 2mobile participants, or tier 3 mobile participants, which perform manyof the same functions as the mobile aerial participants.

Each mobile aerial participant 32 a-32 c transmits radio frequencysignals to be received by other mobile aerial participants 32 that arewithin line-of-sight of the sending mobile aerial participant 32. Thesesignals include, but are not limited to (1) data signals that transmitmessages or data to another participant and (2) notification signalsthat provide personalized information regarding the sending mobileparticipant. In some embodiments, the notification signals are referredto as self-reporting messages or self-reporting signals. Thenotification signals can include one or both of notification signals fornetworking and routing among participants and notification signals forsafety and de-confliction of possible threats.

The notification signals serve three primary simultaneous purposes: (1)to notify other participants of the sending participant's identity,position, and kinematic information; (2) to detect and tracknon-participant objects; and (3) to establish routing and networkefficiencies (i.e., to create the participant table identifying whereeach participant is and with who they are in line-of-sightcommunication). In various embodiments, the notification signals provideindividualized information regarding the sending mobile aerialparticipant 32 so that other mobile aerial participants 32 know thatthey are within line-of-sight communication of the sending mobile aerialparticipant 32 within network 33. These notification signals may bereferred to as self-reporting signals, since the mobile aerialparticipant 32 is independently reporting its position and kinematicinformation to any other mobile aerial participants 32 that are withinline-of-sight of the transmitting mobile aerial participant 32 withoutbeing prompted or requested by another mobile (or stationary)participant. The mobile aerial participants 32 utilize the notificationsignals to generate a participant table that is utilized to transmitdata signals between the mobile aerial participants 32.

In various embodiments, the information in the notification signalincludes the mobile aerial participant's 32 identification information,geolocation, kinematic information, throughput capabilities, frequencycapabilities, number and capability of sensors, and other information.In various embodiments, the notification signals also includetransmission time information that allows for Time Distance of Arrival(TDOA) and Time of Flight (TOF) or Round Trip Timing (RTT) calculations.

The geolocation of the mobile aerial participant 32 may be determinedvia traditional methods like GPS sensors or modules, cell tower orstationary participant signal triangulation, or via notificationmessages from other devices or participants that know or estimate theposition or location of the mobile aerial participant 32. This can beaccomplished with extreme accuracy and minimal latency when notificationmessages are echoed and supported by stationary participants. Thegeolocation may also be referred to as the position or location of themobile aerial participant 32.

The kinematic information may be obtained by monitoring the mobileaerial participant's 32 position and identifying changes over time,utilizing various sensors to calculate or determine the kinematicinformation, or obtaining it from another system.

The frequency capabilities of the mobile aerial participant 32 may bepredetermined based on the type of hardware utilized by the mobileaerial participant 32. For example, the hardware of the mobile aerialparticipant 32 may be designed to utilize ACARS, IEEE 802.11 standards,or some other wireless transmission frequencies or standards, whichdefines the frequency capabilities of the mobile aerial participant 32.In other embodiments, the frequency capabilities may be predeterminedbased on government regulations regarding available frequencies. In yetother embodiments, the frequency capabilities may be defined by a useror administrator.

The throughput may be predetermined based on the type of hardwareutilized by the mobile aerial participant 32 or on the currentprocessing capacity or network traffic of the mobile aerial participant32 or a number of other factors. For example, if the mobile aerialparticipant 32 is a Boeing 737-700 then it may have more throughputcapabilities than a Boeing 777-200ER because the Boeing 737-700 may haveless passengers and thus may be supporting fewer data requests from userdevice onboard the airplane, which can allow for more possessing powerto be directed towards forwarding communications between otherparticipants.

The number and capability of sensors may identify the type of sensors,where their particular antennas are attached to the participant, therange/transmission capabilities of the sensors, their beamwidthcharacteristics, or other information regarding the sensors on thecorresponding participant.

Notification signals are transmitted via directional broadcast beams. Invarious embodiments, directional notification signals may be transmittedin a sequential or non-sequential 360-degree pattern, so that thenotification signal is transmitting in all directions surrounding theparticipant. In some embodiments, where there is little to no sensoroverlap, the notification signals may be transmitted using directionalor non-directional broadcast signals. In general, the use of the term“broadcast” herein refers to the transmission of a signal by a sendingparticipant without being requested by another participant and does nothave a specific participant as a destination.

Use of directional transmissions can reduce the amount of power neededto transmit the notification signal or other communication to anotherparticipant, while also providing additional versatility in providingadditional sensor coverage by at least one sensor on at least oneparticipant in an area. Moreover, the use of directional transmissionsenables the sending participant to use just enough power to ensure itgets to its intended target. Additionally, directional transmissions canreduce interference between transmissions in a congested space as wellas make transmissions more secure.

The notification signal may be broadcast periodically, at predeterminedtimes, dynamically selected based on number and proximity of othermobile aerial participants, or at a given dynamically changing updaterate. In some embodiments, the rate at which the mobile aerialparticipant 32 transmits its notification signal may change based on acombination of the distance, closure velocity, and closing anglesbetween the sending mobile aerial participant 32 and other mobile aerialparticipants 32 within line-of-sight of the sending mobile aerialparticipant 32.

The mobile aerial participants 32 a-32 c transmit notification signalsto inform other mobile aerial participants 32 of their position andmovement. For example, mobile aerial participant 32 a transmitsnotification signals with information identifying itself and itsrespective geolocation and kinematic information without regard to thepresence or location of mobile aerial participants 32 b or 32 c. Ifmobile aerial participant 32 c is within line-of-sight of mobile aerialparticipant 32 a, mobile aerial participant 32 c receives thetransmitted notification signals from mobile aerial participant 32 a andutilizes the information in the notification signals, and its ownlocation and kinematic information, to identify the position andmovement of mobile aerial participant 32 a relative to itself.

The mobile aerial participants 32 can utilize the notification signalsto track other participants and non-participants (e.g., by using echosignals of the notification signals to locate objects) and to create andupdate the participant table to identify which participants are innetwork 33, their location, their capabilities, and who they are inline-of-sight communication. The various communications between themobile aerial participants 32 a-32 c creates a communication network 33among each other that enable them to communicate with one anotherwithout the use of another communication backbone, such as a cellulartower network.

The data signals transmitted by one participant to another participantmay be transmitted via directional transmission beams or non-directionaltransmission signals. In various embodiments, the sending mobile aerialparticipant 32 utilizes a participant table to determine a location ofthe recipient participant. The sending mobile aerial participant 32 candirectionally focus the transmitted data signals towards the recipientparticipant based on the position of the sending participant and theposition of the recipient participant. The use of directionaltransmissions can reduce power consumption and increase the range inwhich transmission can be received, while also reducing interferencebetween transmissions in a congested space.

Although not illustrated, other mobile participants and stationaryparticipants may also perform similar actions as described above toidentify and track mobile participants that are in line-of-sight tosupport management of the participant table and to communicate data orinformation amongst themselves to increase accuracy and efficiency ofeach participant.

FIG. 3 illustrates a context diagram illustrating a use-case example ofemploying sensor coverage management to transmit data in accordance withembodiments described herein. Example 100 illustrates a plurality ofmobile aerial participants 104 a-104 c. Each mobile aerial participant104 a-104 c utilizes one or more sensors to transmit notificationsignals and data signals to other participants, such as mobile aerialparticipants 104 a-104 c, or to stationary participants 106 a-106 b, vialine-of-sight communications 102 a-102 e. Similarly, each mobile aerialparticipant 104 a-104 c also tracks the position of the other mobileaerial participant 104 a-104 c and any non-participants 108.

Each mobile aerial participant 104 a-104 c, one or more stationaryparticipants 106 a-106 b, or a network operations center 110 (i.e., oneor more server computing systems) maintains a network database withinformation about each participant. For example, the network databasemay store information for each participant, such as a unique identifierthat has been registered within the network, specific type aircraft,nationality, owner, transmit/receive capabilities (e.g., spectrum,polarity, type and location of antennas or sensors), etc. Thisinformation can be transmitted, along with kinematic or other data, innotification signals or other types of transmission signals, to paint athree-dimensional picture of sensor coverage within the network. As usedherein, a three-dimensional picture of sensor coverage refers to thegeneral physical space in which at least one sensor on at least oneparticipant can detect an object that is located with the physicalspace. A total sensor coverage area would indicate that at least onesensor on at least one participant can detect an object that is locatedwithin a predefined space or geographical area (e.g., from the ground to40,000 feet over the continental United States). A partial sensorcoverage area would indicate that there are areas within the predefinedspace or geographical area where no participant sensor would detect anobject. Partial sensor coverage can occur if participants are too farfrom one another for their sensor coverage areas to touch or overlap,technical restraints (e.g., sensors that have a limited beamwidth orcannot beamform to an area not already covered by another sensor), etc.

The sensor coverage area of one or more of the mobile aerialparticipants 104 a-104 c can be managed locally (i.e., between themobile aerial participants that are within line-of-sight of oneanother), by the stationary participants 106 a-106 b, by a networkoperations center 110, or a combination thereof. The participant thatmaintains the sensor coverage area may be static or dynamic and may beset or changed based on application. For commercial airlines, forexample, where data throughput is a high priority, the stationaryparticipants 106 a-106 b or the network operations center 110 may managesensor coverage due to the desire to preserve bandwidth among the mobileaerial participants 104 a-104 c. In a government or militaryapplication, on the other hand, the mobile aerial participants 104 a-104c may manage sensor coverage within line-of-sight participants due tothe desire for decreased latency—even though it may reduce bandwidth.

Each mobile aerial participant 104 a-104 c has known antenna locationsand maximum coverage areas based on the system configuration that willbe available in the participant database. The known antenna locationsand their maximum coverage area may also be referred to as the sensorlocation and the maximum coverage area for that sensor. As sensorcoverages overlap it brings opportunity to both integrate and deconflictparticipants and non-participants. Deconflict refers to the detectionand tracking of objects (participant and non-participant) such thatactions can be performed to avoid a collision or threat of collision.

Each mobile aerial participant 104 a-104 c, or an area surrounding eachmobile aerial participant 104 a-104 c, or group of mobile aerialparticipants 104 a-140 c, or a total physical area/space includes athreshold coverage area. As one example of such threshold coverage area,each mobile aerial participant 104 a-104 c may have an individualthreshold coverage area that targets a 15 degree wide, 10 kilometer areaoff the front of the mobile aerial participant 104 a-104 c. As anotherexample, a particular air space may have a total threshold coverage areathat is targeted to be fully covered by sensors in a 20 kilometer radiusfrom 10,000 feet to 40,000 feet. In various embodiments, there may be anoverall system or physical space coverage threshold as well asindividual thresholds for each participant.

The system that is managing the coverage area—whether it is one or moreof the mobile aerial participants 104 a-104 c, one or more stationaryparticipants 106 a-106 b, or the network operations center110—determines the current individual sensor coverage area of theparticipants within the desired coverage area based on the location ofthe participants, the number and location of the sensors on theparticipants, the capabilities of the participants, the movement of theparticipants, etc. The managing system aggregates the individualcoverage areas and compares them to one another to determine if thetotal sensor volume coverage threshold has been met, as well as eachindividual participant and non-participant threshold. In someembodiments, the total volume coverage or the individual participant ornon-participant thresholds may be set by a particular customer,organization, or governing body (e.g., FAA, DoD, Airfield, DistributionCenter, etc.).

Once volume coverage thresholds (individual or system-wide) and trackingthresholds are met, the system determines if there are individual sensorcoverage areas that unnecessarily overlap one another, such as based onsome overlap threshold amount or percentage. If so, the systemdetermines which sensor is the least beneficial (e.g., is fullyoverlapped by one or more other sensors) to the coverage area andinstructs its corresponding participant to turnoff or adjust thatparticular sensor. For example, if sensor_A on mobile aerial participant104 b covers a same area as sensor_B on mobile aerial participant 104 cfor the area between the two participants, then mobile aerialparticipant 104 b can stop using sensor_A to detect objects or it canchange the beamform of the sensor to be at a different horizontal areaor elevation or ignore the area between the two participants. In thisway, participant 104 b can save throughput by not having to scan thearea between participant 104 b and 104 c, which can allow theparticipant 104 b to use sensor_A to scan another area where thecoverage area has not been met or to focus additional scans on trackingnon-participant 108. As a result, the aggregate of all sensors of allparticipants in the network can be maximized for efficiency or thenetwork coverage can be modified to maximize coverage area.

In some other embodiments, other characteristics of the participants ortheir sensors may be utilized to determine which sensors to modify toreduce or remove the overlapped coverage area. In at least one suchembodiment, the sensor/system timeline availability of one or moresensors, or of a participant, associated with the overlapped coveragearea may be evaluated to determine which sensors to adjust. Thesensor/system timeline availability may be referred to as the amount ofcomputer processing associated with a given task being performed by asensor or computing system on the participant. For example, sensortimeline availability for a given sensor may be an amount of computerprocessing power utilized to process sensor data for the current refreshrate of the sensor. For example, a full timeline may include morefrequent scans (e.g., a higher refresh rate) that utilize moreprocessing power to process and analyze the scanning data. Conversely,an empty timeline may include less frequent scans (e.g., a lower refreshrate) that utilize less processing power. The sensor/system timelineavailability may also be employed at the participant level, such as howmuch processing power is being utilized by the participant to performactions (e.g., transmitting information to other participants, trackingother participants or objects, performing self diagnostic procedures,etc.).

In various embodiments, participants or their sensors can be loadmanaged or balanced to determine which sensors to adjust to reduce theoverlapping coverage area. For the following examples, assume thecoverage area of sensor_A on participant_A overlaps the coverage area ofsensor_B on participant_B. In some embodiments, if sensor_A has verylittle available timeline (e.g., sensor_A has a higher refresh rate andis utilizing high amounts of processing power) compared to sensor_B(e.g., sensor_B has a lower refresh rate and is utilizing low amounts ofprocessing power), then the coverage area of sensor_A may be reduced toremove the overlap without adjusting the coverage area of sensor_B. Inother embodiments, if both sensors are operating with little availabletimeline, then the reduction in the overlapping coverage area may besplit between both sensors, such that the coverage area of both sensorsis adjusted to remove the overlapped coverage area. This adjustment maybe equal or it may proportional to the sensor/system available timeline.For example, if sensor_A is utilizing 20% more processing power thansensor_B, then the coverage area of sensor_A may be reduced more thanthe coverage area of sensor_B.

In yet another embodiment, the coverage area of the overlapping sensorsmay be reduced and the coverage area of another non-overlapping sensormay be increased. For example, consider the example above with sensor_Aoverlapping sensor_B, but where their overlap is only 20%. If bothsensors are utilizing high amounts of processing power, but sensor_C isutilizing very little processing power, then the coverage areas ofsensor_A and sensor_B may be reduced to create a non-covered area, whichcan then be covered by sensor_C. Therefore, the sensor/system timelinesof sensors or participants can be load managed and balanced against eachother to reduce or remove the overlapping coverage area, while alsoreducing the overall amount of processing being performed by theparticipants.

In various embodiments, one or more different thresholds may be utilizedto determine which sensors to adjust to remove or reduce the overlappingcoverage area. examples of such thresholds may include, but are notlimited to, processing power, total processing capacity, memory usage oravailability, sensor capabilities, current sensor coverage areas, traveldirection, travel speed, etc.

As described herein, the aggregated coverage area of multiple sensorsmay also result in missing coverage areas between the volume coveragethresholds (individual or system-wide) and the tracking thresholds. Invarious embodiments, system can identify those missing coverage areasand modify sensor coverage areas (on the participant or by instructingother participants) to remove or reduce the missing coverage areas. Invarious embodiments, the participants or their sensors can be loadmanaged or balanced to determine which sensors to adjust to reduce themissing coverage area, similar to what is described above for removingan overlapping coverage area. For example, a sensor/system that has alot of available timeline may be adjusted to cover at least a portion ofthe missing coverage area, whereas a sensor that has very littleavailable timeline may not be adjusted (or may be adjusted only a smallamount compared to the other sensor).

In various embodiments, the system that is managing the coverage areamay send periodic updates to the participants indicating the particularcoverage for each sensor on that corresponding participant. In otherembodiments, the system may notify the participants of the location ofnew or moved participants or non-participants in a target coverage area.In other embodiments, the system may provide updates only to thoseparticipants that are to deconflict an object. In at least oneembodiment, a participant can override their sensor coverage provided bythe system and focus their sensors on tracking for collision avoidanceon particular objects that pose a serious threat to the participant.Overall, sensor management at the network level allows participants tomodify their coverage to meet mission needs based on informationprovided by the system that is aggregating sensor coverage from multiplesensors and multiple participants.

In some embodiments, participants communicate their sensor coverage toother participants based on safety, threat avoidance, or overall networkcoverage (e.g., pre-determined area surveillance), which may be based ona priority schema. For example, participants can manage theirsensor/system timeline availability such that its own system safety hasthe highest priority. Once the participant determines that it is safe(e.g., by satisfying one or more safety thresholds that may indicatethat the participant is operating at a satisfactory level and is notcurrently in danger of crashing or having other safety issues), then theparticipant can utilize sensor/system timeline availability to identifypotential threats (e.g., objects that may eventually cross paths withthe participant) to the participant or to other participants. Once theparticipant determines that it has identified and is tracking possiblythreatening objects, then the participant can utilize sensor/systemtimeline availability to support the overall network coverage (e.g.,surveillance volume).

In various embodiments, participants may share their own safety andthreat thresholds, their individual system or sensor capabilities, theircurrent operating capacity (e.g., is the participant solely focused onsafety or is it using some of its processing power for networkcoverage), etc. with other participants. Participants can utilize thisshared information from other participants, along with their ownpriority schema and sensor/system timeline availability, to determine ifand how it can provide support for the total network coverage. Invarious embodiments, if a participant is notified that there is amissing coverage area in which the participant can provide coverage (orthat participant itself identifies the missing coverage area), thatparticipant determines if has sufficient sensor/system timelineavailability given its current priority thresholds.

For example, if the participant is utilizing half of its availabletimeline to process an extremely high safety issue, then thatparticipant may ignore the missing coverage area and not increase itssensor coverage area to reduce the missing coverage area. In at leastone embodiment, the participant may notify other participants that it isunable to help reduce the missing coverage area. The other participantscan then determine if they can help reduce the missing coverage area.

As another example, if a participant is utilizing most of its availabletimeline to process an extremely high safety issue, then thatparticipant may notify other participants that it is decreasing itssensor coverage area. The participant may first decrease sensor coveragewhere there is an overlapping coverage area with another participant;otherwise, the participant may decrease a low-priority coverage area forthe participant. This reduction of sensor coverage may result in amissing coverage area for the overall network coverage. By decreasingits sensor coverage area, the participant allows itself to continue tohave sufficient processing power to deal with the safety issue. Once thesafety issue is resolved, the participant can again provide support forthe overall network coverage. In at least one embodiment, theparticipant may notify other participants that it is reducing itscoverage area. The other participants can then determine how the reducedcoverage impacts the overall network coverage.

In various embodiments, the use of the priority schema may be employedin conjunction or in combination with the load management and balancingdescribed above. The use of priorities, sharing of information, and loadmanagement enables participants to determine which participants andwhich sensors may be utilized to provide individual (or localized)safety and threat coverage, while also contributing to the overallnetwork coverage. In this way, participants work individually andtogether to keep all participants safe, maintain thresholds on allthreats, and provide network-wide surveillance volume.

In various embodiments, the thresholds described herein (e.g., safety orthreat thresholds, individual coverage thresholds, network coveragethresholds or surveillance volume, etc.) can be set during pre-planning,set or adjusted in real-time by operators, or set or adjusted inreal-time by the system based learned information. The pre-planningsetup of thresholds may be based on the goals or parameters of theparticipants. For example, if a goal of the participants is to identifyand track unknown participants in a given geographic area, then total ornear-total network coverage in the given geographic area may beselected. Conversely, if the goal of the participants is to not crash,then the overall network coverage may very limited. The real-time setupor adjustment of thresholds may be employed by an operator based onchanges in the goals or parameters or other current conditions. Forexample, if an operator determines that there are a lot ofnon-participant objects in an area, then the operator may increase itsthreat avoidance threshold. The setup or adjusted of thresholds may alsobe employed by the system based learned information. For example,artificial intelligence or machine learning may be employed to determinehow components of the participant are working or reacting to the currentconditions (e.g., the system may detect that the participant is taking20% longer to slow down and stop), which can allow for the system toautomatically adjust one or more thresholds to account of the changedconditions. The above described examples are for illustrative purposesand should not be construed as exhaustive or limiting.

As discussed above, each participant can employ a priority schema toprioritize their sensor/system timeline usage and availability to ensurethe participant's safety thresholds are met followed by theparticipant's threat thresholds and finally supporting overall networkcoverage. Such a priority schema may also be employed at a networklevel. In various embodiments, the information communicated betweenparticipants (e.g., safety and threat thresholds, individual system orsensor capabilities, participant current operating capacity, participantlocation information, etc.) can be utilized by participants to furtheraggregate and support network-level safety and threat thresholds. Forexample, participants can utilize or aggregate sensor coverages (itssensor coverage, other participant sensor coverages, or a combinationthereof); utilize or modify sensor refresh rates; select or modifyspectrum allocation; or aggregate, monitor, modify, or utilize otherinformation to meet network-level safety and threat thresholds.

As one non-limiting example, if participant_A is experiencing a safetyissue that it cannot resolve itself and participant_B is in proximity toparticipant_A, then participant_B may dedicate sensor/system timelineavailability to help resolve the safety issue to participant_A. However,participant_B may only provide support if that support does notcompromise its individual safety or threat thresholds. This extrasupport from participant_B may include increased refresh rate of itssensors to monitor participant_A or some other object causing the safetyissue, increase data transmissions or throughput to inform otherparticipants of the safety issue, or other types of actions. Afterparticipant_B has supported participant_A (e.g., the safety issue toparticipant_A has been resolved or participant_B has traveled away fromparticipant_A and can no longer help), participant_B can increase itssupport to other, possibly lower priority, tasks (e.g., supporting theoverall network volume coverage.

In various embodiments, the individual priority schemas and the networkpriority schema may be integrated. For example, in some embodiments, theindividual participant safety has the highest priority followed by otherparticipant safety followed by individual participant threat trackingfollowed by other participant threat tracking followed by overallnetwork coverage. In other embodiments, the individual participantsafety has the highest priority followed by individual participantthreat tracking followed by other participant safety followed by otherparticipant threat tracking followed by overall network coverage. Theparticular priority order between the individual priority schema and thenetwork priority schema may be set by an administrator, based on thegoals and purpose of the participants, based on the utilization of theparticipants, based on the type of participants, adjusted based oncurrent operating conditions of the participants throughout the network,or other selected factors.

By having participants implement individual priority schemas, whilesupporting network-level priority schemas, participants are better ableto manage their sensor/system timeline availability, while alsosupporting other participants and overall network health.

Moreover, each separate category of thresholds may also include aninternal priority schema with one or more levels of priority. Forexample, with regards to the safety thresholds for a participant, theparticipant may prioritize a lack of fuel higher than a reduction incabin pressure. Likewise, for the threat thresholds, the participant mayprioritize an object on a projected collision course with theparticipant at a higher priority than an object close to but moving awayfrom the participant. The number and order of priorities may bepre-determined based on the type of safety issue or threat, pre-set byan administrator, modified by an operator based on current conditions,etc.

This type of multiple internal priority levels can also be applied tothe overall network volume coverage threshold. For example, assume theparticipants are mobile aerial participants. Some airspace may be givena higher priority than other airspace. The particular priorities may bedetermined based on location, goals or purpose of the participants, timeof day, or other constraints or conditions, and they may be defined byan administrator, set by an operator, selected based on learnedinformation from previously collected data, etc.

For example, assume a first government agency is focused on generalaviation monitoring and safety. This first government agency mayprioritize the airspace based on air routes that have a traffic volumeor density above a selected threshold. In this example, the altitude andlocations associated with defined air routes may have a higher prioritythan non-route altitudes and locations. This type of prioritizationallows for participants to focus or provide additional coverage for theoverall network coverage in those higher priority areas.

As another example, a second government agency may be focused onmonitoring the movement or capabilities of an enemy. This secondgovernment agency may prioritize the airspace based on the enemy'sgeographic area. In this way, the airspace above the enemy's location isgiven a higher priority than the surrounding areas. Moreover, if thesecond government agency has knowledge of the enemy using a particulartype of aircraft, then the priority of the airspace over the enemy'slocation may be further prioritized based on the profile andcharacteristics of that aircraft. In this example, the altitudeassociated with the aircraft's capabilities may be assigned a higherpriority than other altitudes.

To support higher priority areas, participants may increase the amountof overlapping coverage, increase sensor refresh rates, modify othersensor parameters to provide improved monitoring accuracy, or evenprioritize overall network coverage over low priority individual threatthresholds. Conversely, in lower priority areas, participants maytolerate missing coverage areas, decrease sensor refresh rates, etc.

FIGS. 4A-4B illustrate context diagrams of using directional signalingand scanning to provide directional communication between participantsin accordance with embodiments described herein. FIG. 4A illustrates anexample 70A of first participant 90, such as an airplane, transmittingdirectional notification signals 92 a-92 d. As shown, each notificationsignal 92 is transmitted away from the first participant 90 at aparticular angle with a particular beamwidth. In various embodiments,the first participant 90 waits a predetermined amount of time beforetransmitting the next notification signal 92 at the next angle. In otherembodiments, the first participant 90 may continuously transmit the nextnotification signal at the next angle and utilize phased, frequency, andpolarity shifts to allow for simultaneous transmission and reception ofnotification signals. The beamwidths of the notification signals 92 maynot overlap, e.g., as illustrated in FIG. 4A, or they may partiallyoverlap one another.

In the illustrated example in FIG. 4A, the first participant 90transmits eight notification signals with 45 degree beamwidth to cover360 degrees around the first participant 90. Although FIG. 4Aillustrates the notification signals as two-dimensional transmissions,embodiments are not so limited, and the notification signals may betransmitted as three dimensional signals, such as a cone shape. In someembodiments, the first participant 90 may transmit a first set ofnotification signals at a first elevation, e.g., with a center of thetransmission on a horizontal axis from the first participant, and asecond set of notification signals at a second elevation, e.g., with acenter of the transmission at a 30 degree angle towards the ground. Thefirst participant 90 may continue with additional sets of notificationsignals as different vertical or elevational angles to create athree-dimensional coverage area.

In various embodiments, the first participant 90 transmits thenotification signals 92 in a sequential order. For example, notificationsignal 92 a is transmitted first, followed by notification signal 92 b,which is followed by notification signal 92 c, and so on. A completetransmission cycle occurs when all eight notification signals 92 havebeen transmitted. A complete transmission cycle is used to notify otherparticipants within line-of-sight of the first participant 90 of thefirst participant's 90 location and kinematic information.

Although FIG. 4A illustrates eight notification signals being used for acomplete transmission cycle, other numbers of notification signals atother beamwidths may also be utilized. Moreover, the first participant90 may include one or a plurality of sensors that each performs suchdirectional notification signals, which is illustrated in FIG. 5. In atleast one such embodiment, each sensor may include a completetransmission cycle that is 360 degrees, 90 degrees, or some other totalcoverage area. Moreover, a complete transmission cycle may include oneor more different planes or levels in a 3-dimensional area around thefirst participant 90. For example, a given sensor may have a 90 degreehorizontal beamwidth area to cover, but also include a positive 45degrees and negative 45 degrees vertically with respect to the horizonof the first participant 90—although other coverage areas may beemployed.

In various embodiments, a complete transmission cycle is performed at agiven update rate, which may be predetermined or may dynamically change.For example, in some embodiments, the update rate may be faster whenthere are more participants or non-participant objects near the firstparticipant 90, compared to when there are few or no objects near thefirst participant 90. In other embodiments, the update rate may befaster when the first participant 90 is moving at a higher speedcompared to when the first participant 90 is moving at a slower speed.

In some embodiments, the first participant 90 may also maintainindividualized update rates for each participant that is inline-of-sight of the first participant 90. However, since the firstparticipant 90 does not request the positional information from otherparticipants, it can utilize only the received notification signalsbased on the update rate, while ignoring every other notification signalfrom the other participant. For example, if another participant istransmitting notification signals once every second, but the firstparticipant 90 has an update rate of once every five seconds for theother participant, then it may utilize one of the five notificationsignals that it receives in a five second period while ignoring therest. This individualized update rate may dynamically change based onthe distance and velocity of closure between the first participant 90and the other participant object. In this way, the first participant 90utilizes more notification signal from the first participant 90 when theother participant and the first participant 90 are closer together ortraveling towards each other such that there is a treat of potentialcollision, and ignores superfluous notification signals if they are farapart or traveling away from one another. In other embodiments,participant 90 can use one of its self-reported notification signals tocommunicate to other participants within line of sight to increase itsupdate rate, if needed.

FIG. 4B illustrates an example 70B of a second participant 94 comingwithin line-of-sight of the first participant 90 while the firstparticipant 90 is transmitting directional notification signals 92.

As shown in FIG. 4B, the notification signal 92 d is transmitted awayfrom the first participant 90. The second participant 94 receives thenotification signal 92 d. Based on the information in the notificationsignal 92, the second participant 94 updates the participant table.Likewise, the second participant 94 is also transmitting notificationsignals, not illustrated, that are being received by the firstparticipant 94.

When the first participant 90 has a message or communication to transmitto the second participant 94, the first participant 90 utilizes theparticipant table to determine the location and movement of the secondparticipant 94 relative to the location and movement of the firstparticipant 90. The first participant 90 can then directionally transmita signal, similar to the directional transmission of the notificationsignal 92 d, to the second participant 94 with the message orcommunication. In general, notification signals are not directed towardsa specific participant, but data transmission signals are directedtowards a specific participant. In this way, the transmission power canbe focused on a relatively narrow beamwidth rather than anon-directional broadcasted message, which improves power utilizationand reduces the chance of interception by third parties.

Although not described in detail herein, the first participant 90 canreceive an echo signal of the notification signal off the secondparticipant 94 to determine a position of the second participant object94. The first participant 90 can calculate the approximate distance thesecond participant 94 is away from the first participant 90 based on thetime of flight from the transmission of the notification signal 92 d tothe receipt of the echo signal. This approximate distance is used todetermine an approximate position 98 of the second participant 94.

Utilization of the echo signal from the notification signal can behelpful in identifying and tracking non-participants. Similarly, suchindependent determination of the approximate position of the secondparticipant 94 may be utilized if a participant's equipment ismalfunctioning and not transmitting notification signals or if theinformation in its notification signals is not accurate. Thus, thisapproximated position calculation can be compared to the locationinformation in the notification signals to confirm that the informationin the notification signals is accurate.

FIG. 5 illustrates a context diagram illustrating a use-case example ofdirectional sensors being employed by a participant in accordance withembodiments described herein. Example 120 illustrates a mobile aerialparticipant 126 that includes four sensors 122 a-122 d. Each sensor 122a-122 d provides an independent coverage area 124 a-124 c, respectively.Each sensor 122 is configured to perform beamforming techniques to steerits transmission of notification and data signals away from the mobileaerial participant 126 at a particular direction and in a particularpattern, which creates the corresponding coverage area 124. Although thecoverage areas 124 a-124 d are illustrated in two dimensions,embodiments are not so limited and each coverage area 124 a-124 d mayinclude three dimensional space. Moreover, each coverage area 124 mayinclude a single beamwidth transmission or multiple separate beamwidthtransmissions, such as discussed above in conjunction with FIGS. 4A-4B,which may be focused in specific directions away from the mobile aerialparticipant 126. In some embodiments, sensors 122 a-122 d may beconfigured to only scan a particular area away from the mobile aerialparticipant 126. In the illustrated example, sensors 122 a-122 d do notprovide complete sensor coverage around mobile aerial participant 126,which demonstrates that efficiencies can be gained by integrating ordeconflicting sensor coverage provided by other mobile aerialparticipants, as discussed herein.

FIGS. 6A-6E illustrates context diagrams illustrating a use-case exampleof utilizing directional sensors along with sensor coverage managementin accordance with embodiments described herein. Example 125A in FIG. 6Aillustrates sensor coverage areas 130, 132, and 134 as being provided bysensors on other mobile aerial participants (not illustrated). Althoughnot illustrated, the sensor coverage areas begin at sensors on otherparticipants, but at least partially overlap an area around the mobileaerial participant 126. However, the sensor coverage areas 130, 132, and134 do not provide complete coverage for mobile aerial participant 126,which is illustrated in FIG. 6B.

Example 125B in FIG. 6B illustrates the missing sensor coverage areas140, 142, and 144, such that if these areas can be covered by sensors onthe mobile aerial participant 126 or by other mobile aerial participants(not illustrated), then that coverage, along with the coverage areas130, 132, and 134 would provide complete coverage for mobile aerialparticipant 126 to deconflict nearby objects (e.g., within apredetermined combination of velocity and distance).

Example 125C in FIG. 6C illustrates the missing sensor coverage areas140, 142, and 144 around mobile aerial participant 126. The mobileaerial participant 126 can then modify the transmission beamform ofsensors 122 a, 122 c, and 122 d to provide new coverage areas 150, 152,and 154 that overlap the missing sensor coverage areas 140, 142, and144, which is shown by example 125D in FIG. 6D.

The newly positioned coverage areas 150, 152, and 154 provided by thesensors on the mobile aerial participant 126, along with the coverageareas 130, 132, and 134 provided by other sensors of other participants,provide complete coverage to deconflict nearby objects, which isillustrated by example 125E in FIG. 6E.

As mentioned herein, the coverage area may encompass three-dimensionalairspace. The three-dimensional evaluation of airspace/coverage areas ofsensors on a plurality of participants allows unwanted redundancy andinefficiencies (e.g., too many overlapping sensors) to be reduced, whileimproving total coverage area and redundancy when needed (e.g.,partially overlapping sensor coverage areas to confirm detectedobjects). Thresholds for coverage area, detection, identification, andtracking allow the participants to act as a system-of-systems to worktogether, by passing notification signals, to meet thresholds or todeconflict objects to maximize coverage and network health.

Notification signals may contain transmit angle and beam characteristicsthat allow participants within the network to calculate the coveragearea of each participant. In this way, each participant can locallycalculate and manage their sensors in relation to the coverage areasprovided by other participants within their line-of-sight. Notificationsignals may also be broadcast, transmitted, or forwarded to stationaryparticipants or the network operations center to allow stationaryparticipants to determine the management plan and communicate sensorcoverage area adjustments back to mobile aerial participants.

As one example, a first mobile aerial participant to meet the thresholdrequirements for a given coverage area (for a given area, for thecomplete network, for individual participants, or some combinationthereof) will continue to provide that coverage unless anotherparticipant has more coverage area. If the coverage area provided by thefirst mobile aerial participant does not meet at least one coverage areathreshold for either an individual participant or the network, then oneor more additional mobile aerial participants are instructed to utilizetheir sensors to provide additional coverage. More and more sensors orparticipants will be utilized to provide coverage until the thresholdsare met or a maximum possible coverage area is achieved based on thenumber of participants, location of participants, and technicalcapabilities of the participants.

In various embodiments, the altitude of mobile aerial participants mayalso be utilized to determine how sensor coverage areas of a pluralityof mobile aerial participants are utilized. For examples, mobile aerialparticipants that are flying at a higher altitude may deconflict higheraltitudes, whereas mobile aerial participants that are flying a loweraltitude may deconflict lower altitudes. In this way, if mobile aerialparticipants have overlapping coverage areas, their coverage areas canbe adjusted to different altitudes to provide additional coverage volumethresholds. Both mobile aerial participants can then manage their scanpattern and refresh rate to maximize their data throughput whilemaintaining tracking and coverage thresholds.

Although many embodiments are described herein with respect to mobileaerial participants, embodiments are not so limited. For example,embodiments described herein may be implemented by mobile groundparticipants or a combination of mobile and stationary participants. Thecoverage volumes and thresholds set of each individual participant ornetwork of participants may be set for each given type of participant.For example, cars will have a coverage area that envelopes the roadwayand shoulders of the road they are on. Trains will cover the tracks andcrossing intersections. Planes will cover the area in front of eachplane required to ensure deconfliction as well as surrounding airspacewith thresholds set by FAA, DHS, DoD and NOAA in the form of activeairspaces, NOTAM, TFRs, advisories, etc. Moreover, such thresholds maydynamically change based on the velocity of the participants, thedistance between participants, the number of participants in a givenarea, etc., or a combination thereof.

The operation of certain aspects will now be described with respect toFIG. 7. In at least one of various embodiments, processes 200 describedin conjunction with FIG. 7 may be implemented by or executed on one ormore computing devices, such as mobile participants 36, stationaryparticipants 34, or network operation center 40.

FIG. 7 illustrates a logical flow diagram showing one embodiment of anoverview process for a computing system to provide sensor coveragemanagement in accordance with embodiments described herein. Process 200begins, after a start block, at block 202, where mobile participantinformation is obtained for each of a plurality of participants. Invarious embodiments, the participant information may includeidentification information, owner, type of participant, geolocation,kinematic information, throughput capabilities, frequency capabilities,number and locations of sensors and antennas, maximum sensor coverageareas, etc.

Process 200 proceeds to block 204, where individual coverage thresholdsare determined for each mobile participant. In some embodiments, anindividual threshold for a mobile participant may be identified as anarea in one or more directions surrounding the mobile participant inwhich to monitor for possible threats to the mobile participant or tootherwise provide safety processing and support (e.g., to communicatewith other participants, reduce the likelihood that the mobileparticipant may collide with another participant or object, etc.). Invarious embodiments, each individual coverage threshold may bedetermined based on the location and velocity of the participant, thetype of participant, the maneuverability of the participant, etc.

Process 200 continued at block 206, where an overall network coveragethreshold is determined. In some embodiments, the overall networkcoverage threshold may identify a given airspace/physical location andarea, a plurality of participants, altitude coverage requirements, etc.

Process 200 proceeds next to block 208 to determine the current coveragearea of each participant. In some embodiments, each participant mayreport what their current coverage area is based on its sensors currentconfiguration. In other embodiments, the current coverage areas may bedetermined based on the number of sensors, their capabilities, and theirposition on their corresponding participant to determine what sensorcoverage area is possible or currently being used by each participant.

Process 200 continues next at block 210, where the coverage areas areaggregated to identify overlapping and missing coverage areas.

Process 200 proceeds to decision block 212, where a determination ismade whether the individual and network coverage thresholds are met bythe aggregated coverage area. In some embodiments, this determination isbased on a comparison between each threshold and the aggregated coveragearea. A match between a particular threshold and the aggregated coveragearea indicates that that particular threshold is met. If at least onethreshold is not met, then process 200 flows to block 214; otherwise,process 200 flows to decision block 216.

At block 214, at least one participant is selected and instructed tomodify at least one of its sensors to provide a modified coverage area.This modified coverage area is a coverage area that at least partiallyincludes the coverage area missing from the aggregated coverage area forthe particular unmet threshold.

Process 200 proceeds next at decision block 216, where a determinationis made whether the aggregated coverage area includes unwanted coveragearea. In various embodiments, this determination is based on acomparison between each coverage area in the aggregated coverage area todetermine if there are overlapping coverage areas that may be redundantand inefficient. If there are unwanted coverage areas, then process 200proceeds to block 218; otherwise, process 200 loops to block 204 tocontinue to dynamically update coverage areas to identify missing orunwanted coverage areas.

At block 218, at least one participant is selected and instructed tomodify at least one of its sensors to provide a less coverage area or acoverage area that is different than the unwanted coverage area. Afterblock 218, process 200 loops to block 204 to continue to dynamicallyupdate coverage areas to identify missing or unwanted coverage areas.

FIG. 8 shows a system diagram that describes one implementation ofcomputing systems for implementing embodiments described herein. System300 includes mobile participant computing device(s) 36, stationaryparticipant computing device(s) 34, and network operation center server40.

Mobile participant computing device(s) 36 communicate with one or moreother mobile participant computing devices 36 and stationary participantcomputing devices 34 via line-of-sight communications to transmit dataand other communications among the participants. One or morespecial-purpose computing systems may be used to implement each mobileparticipant computing device 36. Accordingly, various embodimentsdescribed herein may be implemented in software, hardware, firmware, orin some combination thereof. A mobile participant computing device 34may include memory 371, one or more central processing units (CPUs) 384,display 386, I/O interfaces 388, other computer-readable media 390,network connections 392, transceiver 396, and motion sensors or othersensors 398.

Memory 371 may include one or more various types of non-volatile and/orvolatile storage technologies. Examples of memory 371 may include, butare not limited to, flash memory, hard disk drives, optical drives,solid-state drives, various types of random access memory (RAM), varioustypes of read-only memory (ROM), other computer-readable storage media(also referred to as processor-readable storage media), or the like, orany combination thereof. Memory 371 may be utilized to storeinformation, including computer-readable instructions that are utilizedby CPU 384 to perform actions, including embodiments described herein.

Memory 371 may have stored thereon sensor coverage system 372, whichincludes participant communication module 374, and optionally sensorcoverage management module 376. The participant communication module 374may employ embodiments described herein to send notification signals,track participants, track non-participants, and to generate and transferdata and communications to other participants. The sensor coveragemanagement module 376 may employ embodiments described herein to receivesensor information from other participants and to identify a coveragearea of the current sensors of participants in the network or in a givenarea. The sensor coverage management module 376 may also determine whichsensors on which participants can be adjusted to modify their coveragearea to reduce unwanted overlap, increase overlap to provide redundantcoverage areas, or increase total coverage area. The sensor coveragemanagement module 376 may then send information to other participantsinstructing them to modify their sensors accordingly.

The memory 371 may also store other programs 380 and other data 382. Theother programs 380 may include user applications, other tracking orgeo-positioning programs, etc. The other data 382 may includeparticipant and sensor information, data or information regarding one ormore non-participant objects, or other information.

Network connections 392 are configured to communicate with othercomputing devices, such as other mobile participant computing devices 36and stationary participant computing devices 34 via transceiver 396 andline-of-sight communications mechanisms and technologies. Transceiver396 may be a omni-directional transceiver that sends and receives radiosignals independent of direction, or transceiver 396 may be adirectional transceiver that sends or receives, or both sends andreceives, radio signals to or from a particular direction relative tothe positioning of the mobile participant computing device 36.

Location and kinematic sensors 398 include one or more sensors that areused to determine the position of the mobile participant computingdevice 36 and the kinematic information of how the mobile participantcomputing device 36 is moving. Examples of location and kinematic datasensors 398 include, but are not limited to using participant'sself-reported notifications calibrated off of stationary participants,processing the echo of own self-reported notifications, GPS modules,accelerometers, gyroscopes, or other sensors that can be used todetermine the position and kinematic information of the mobileparticipant computing device 36.

Other I/O interfaces 388 may include a keyboard, audio interfaces, videointerfaces, or the like. Other computer-readable media 390 may includeother types of stationary or removable computer-readable media, such asremovable flash drives, external hard drives, or the like. Display 386is a display interface that is configured to output images, content, orinformation to a user. Examples of display 386 include, but are notlimited to, LCD screens, LEDs or other lights, or other types of displaydevices.

Stationary participant computing device(s) 34 communicate with mobileparticipant computing devices 36 via line-of-sight communications andwith other stationary participants either by wired or wirelesscommunications to transmit information or data to other participants orto non-participants. One or more special-purpose computing systems maybe used to implement each stationary participant computing device 34.Accordingly, various embodiments described herein may be implemented insoftware, hardware, firmware, or in some combination thereof. Astationary participant computing device 34 may include memory 302, oneor more central processing units (CPUs) 316, I/O interfaces 322, othercomputer-readable media 314, network connections 318, and transceiver320.

Memory 302 may include one or more various types of non-volatile and/orvolatile storage technologies. Examples of memory 302 may include, butare not limited to, flash memory, hard disk drives, optical drives,solid-state drives, various types of random access memory (RAM), varioustypes of read-only memory (ROM), other computer-readable storage media(also referred to as processor-readable storage media), or the like, orany combination thereof. Memory 302 may be utilized to storeinformation, including computer-readable instructions that are utilizedby CPU 316 to perform actions, including embodiments described herein.

Memory 302 may have stored thereon sensor coverage system 304, whichincludes data-traffic-manager module 306, and optionally sensor coveragemanagement module 308. The data-traffic-manager module 306 may beconfigured to transfer data from one participant to another participantand to manage and provide participant information updates. In variousembodiments, data-traffic-manager module 306 may communicate withnetwork operation center server 40 via communication network 52, such asto provide or receive participant information updates. The sensorcoverage management module 308 may perform embodiments similar to sensorcoverage management module 376 to track and manage sensor coverage areaof the network.

The memory 302 may also store other programs 310 and other data 312. Theother data 312 may include participant data or information, data orinformation regarding one or more tracked objects, or other information.

Network connections 318 are configured to communicate with othercomputing devices, such as other stationary participant computingdevices 34 and mobile participant computing devices 36 via transceiver320 and wired or line-of-sight communications mechanisms andtechnologies. Network connections 318 are also configured to communicatewith the network operation center server 40 via communication network52.

Transceiver 320 may be a omni-directional transceiver that sends andreceives radio signals independent of direction, or transceiver 320 maybe a directional transceiver that sends or receives, or both sends andreceives, radio signals to or from a particular direction relative tothe position of the stationary participant computing device 34.

Other I/O interfaces 314 may include a keyboard, audio interfaces, videointerfaces, or the like. Other computer-readable media 314 may includeother types of stationary or removable computer-readable media, such asremovable flash drives, external hard drives, or the like.

Network operation center server 40 includes one or more computingdevices that store information about the positioning of mobileparticipant computing devices 36 and stationary participant computingdevices 34, such as a master participant table. The network operationcenter server 40 may also store information regarding the sensorcapabilities of each participant, as described herein. The networkoperation center server 40, in some embodiments, performs embodimentssimilar to sensor coverage management module 376. The network operationcenter server 40 also includes memory, one or more processors, networkinterfaces and connections, and other computing components similar tomobile participant computing devices 36 and stationary participantcomputing devices 34, but those components are not shown here for easeof illustration.

Communication network 52 may include one or more wired or wirelesscommunication networks to transmit data between one stationaryparticipant computing device 34 and another stationary participantcomputing device 34 or with the network operation center server 40.

The various embodiments described above can be combined to providefurther embodiments. These and other changes can be made to theembodiments in light of the above-detailed description. Moreover,additional details and use case examples are provided in the U.S.patents, U.S. patent application publications, U.S. patent applications,foreign patents, foreign patent applications and non-patent publicationsreferred to in this specification and/or listed in the Application DataSheet, including but not limited to U.S. patent application Ser. No.15/892,259, filed Feb. 8, 2018, entitled “Object Tracking Using ACognitive Heterogeneous Ad Hoc Mesh Network;” Provisional PatentApplication No. 62/467,572, filed Mar. 6, 2017, entitled “Scatternet: Acognitive heterogeneous ad hoc mesh data/cellular/Wi-Fi networkestablishment/access points/connected devices through utilization ofsoftware applications exploiting existing technologies and frequencyspectrum for data and voice communications through the exploitation ofthe Internet and Internet of Things, resulting in the creation of Datacommunications Adaptive RADAR (DATAR);” and U.S. patent application Ser.No. 15/913,612, filed Mar. 6, 2018, entitled “Cognitive Heterogeneous AdHoc Mesh Network;” which are incorporated herein by reference, in theirentirety.

In general, in the following claims, the terms used should not beconstrued to limit the claims to the specific embodiments disclosed inthe specification and the claims, but should be construed to include allpossible embodiments along with the full scope of equivalents to whichsuch claims are entitled. Accordingly, the claims are not limited by thedisclosure.

The invention claimed is:
 1. A method comprising: determining, by aparticipant computing device, a current individual coverage area for aplurality of mobile participants; aggregating, by the participantcomputing device, the current individual coverage areas of the pluralityof mobile participants; determining, by the participant computingdevice, if the aggregated current coverage area meets an individualcoverage threshold for the plurality of mobile participants and anetwork coverage threshold across the plurality of mobile participants;and in response to the aggregated current coverage area not meeting atleast one individual coverage threshold or the network coveragethreshold: determining, by the participant computing device, a missingcoverage area based on a comparison between the aggregated currentcoverage area and the at least one individual coverage threshold or thenetwork coverage threshold not met by the aggregated current coveragearea; and instructing, by the participant computing device, a targetmobile participant of the plurality of mobile participants to modify thecurrent individual coverage area of the target mobile participant to atleast partially overlap the missing coverage area.
 2. The method ofclaim 1, wherein instructing the target mobile participant to modify thecurrent individual coverage area of the target mobile participantincludes: modifying a sensor coverage area of at least one sensor on thetarget mobile participant.
 3. The method of claim 1, wherein theparticipant computing device is a computing device of one of theplurality mobile participants.
 4. The method of claim 1, wherein theparticipant computing device is a computing device of the target mobileparticipant.
 5. The method of claim 1, wherein determining the currentindividual coverage area for the plurality of mobile participantsincludes: determining, by the participant computing device, a currentsensor coverage area for a plurality of sensors that are mounted on theplurality of mobile participants.
 6. The method of claim 1, whereindetermining the current individual coverage area for the plurality ofmobile participants includes: determining, by the participant computingdevice, a three-dimensional sensor coverage area around each of theplurality of mobile participants.
 7. The method of claim 1, whereininstructing the target mobile participant to modify the currentindividual coverage area of the target mobile participant includes:determining, by the participant computing device, a current processingcapacity of the target mobile participant and; and identifying, by theparticipant computing device, a coverage area that at least partiallyoverlaps the missing coverage area for the target mobile participantbased on the determined current processing capacity.
 8. The method ofclaim 1, wherein instructing the target mobile participant to modify thecurrent individual coverage area of the target mobile participantincludes: instructing, by the participant computing device, the targetmobile participant to modify a transmission beamform of at least onesensor mounted on the target mobile participant to provide a newcoverage area that overlaps a portion of the missing coverage area. 9.The method of claim 1, further comprising: in response to the aggregatedcurrent coverage area including at least one unwanted overlappingcoverage area, instructing, by the participant computing device, anothertarget mobile participant of the plurality of mobile participants tomodify the current coverage area of the other target mobile participantto remove at least a portion of an unwanted overlapping coverage area.10. A computing device, comprising a memory that stores computerinstructions; and a processor that executes the computer instruction to:determine an aggregation of current individual coverage areas for aplurality of mobile aerial participants; determine if the aggregatedcurrent coverage area meets an individual coverage threshold for eachseparate mobile aerial participant of the plurality of mobile aerialparticipants and a network coverage threshold across the plurality ofmobile aerial participants; and in response to the aggregated currentcoverage area not meeting at least one individual coverage threshold orthe network coverage threshold: determine a missing coverage area basedon a comparison between the aggregated current coverage area and the atleast one individual coverage threshold or the network coveragethreshold not met by the aggregated current coverage area; and instructa mobile aerial participant of the plurality of mobile participants tomodify the current individual coverage area of the mobile aerialparticipant to at least partially overlap the missing coverage area. 11.The computing device of claim 10, wherein the processor instructs themobile aerial participant to modify the current individual coverage areaof the mobile aerial participant by further executing the computerinstructions to: modify a sensor coverage area of at least one sensor onthe mobile aerial participant.
 12. The computing device of claim 10,wherein the processor determining the current individual coverage areafor the plurality of mobile aerial participants by further executing thecomputer instructions to: determine a current sensor coverage area for aplurality of sensors that are mounted on the plurality of mobile aerialparticipants.
 13. The computing device of claim 10, wherein theprocessor determining the current individual coverage area for theplurality of mobile aerial participants by further executing thecomputer instructions to: determine a three-dimensional sensor coveragearea around each of the plurality of mobile aerial participants.
 14. Thecomputing device of claim 10, wherein the processor instructing themobile aerial participant to modify the current individual coverage areaof the mobile aerial participant by further executing the computerinstructions to: determine a current processing capacity of the mobileaerial participant and; and identify a coverage area that at leastpartially overlaps the missing coverage area for the mobile aerialparticipant based on the determined current processing capacity.
 15. Thecomputing device of claim 10, wherein the processor instructing themobile aerial participant to modify the current individual coverage areaof the mobile aerial participant by further executing the computerinstructions to: instruct the mobile aerial participant to modify atransmission beamform of at least one sensor mounted on the mobileaerial participant to provide a new coverage area that overlaps aportion of the missing coverage area.
 16. The computing device of claim10, wherein the processor further executes the computer instructions to:in response to the aggregated current coverage area including at leastone unwanted overlapping coverage area, instruct another mobile aerialparticipant of the plurality of mobile aerial participants to modify thecurrent coverage area of the other mobile aerial participant to removeat least a portion of an unwanted overlapping coverage area.
 17. Anon-transitory computer-readable storage medium that stores instructionsthat, when executed by a processor in a computing system, cause theprocessor to perform actions, the actions comprising: determining anindividual coverage area for a plurality of mobile aerial participants;aggregating the individual coverage areas of the plurality of mobileaerial participants; determining if the aggregated coverage area meetsan individual coverage threshold for the plurality of mobile aerialparticipants and a network coverage threshold across the plurality ofmobile aerial participants; and in response to the aggregated coveragearea not meeting at least one individual coverage threshold or thenetwork coverage threshold: determining a missing coverage area based ona comparison between the aggregated coverage area and the at least oneindividual coverage threshold or the network coverage threshold not metby the aggregated coverage area; and instructing a target mobile aerialparticipant of the plurality of mobile participants to modify theindividual coverage area of the target mobile aerial participant to atleast partially overlap the missing coverage area.
 18. Thenon-transitory computer-readable storage medium of claim 17, whereinexecution of the instructions by the processor to instruct the targetmobile aerial participant to modify the individual coverage area of thetarget mobile aerial participant, cause the processor to perform furtheractions, the further actions comprising: determining a processingcapacity of the target mobile aerial participant and; and identifying acoverage area that at least partially overlaps the missing coverage areafor the target mobile aerial participant based on the determinedprocessing capacity.
 19. The non-transitory computer-readable storagemedium of claim 17 wherein execution of the instructions by theprocessor to instruct the target mobile aerial participant to modify theindividual coverage area of the target mobile aerial participant, causethe processor to perform further actions, the further actionscomprising: instructing the target mobile aerial participant to modify atransmission beamform of at least one sensor mounted on the targetmobile aerial participant to provide a new coverage area that overlaps aportion of the missing coverage area.
 20. The non-transitorycomputer-readable storage medium of claim 17, wherein execution of theinstructions by the processor, cause the processor to perform furtheractions, the further actions comprising: in response to the aggregatedcoverage area including at least one unwanted overlapping coverage area,instructing another target mobile aerial participant of the plurality ofmobile aerial participants to modify the coverage area of the othertarget mobile aerial participant to remove at least a portion of anunwanted overlapping coverage area.