3D Mapping Can Locate Survivors In Burning Buildings

Engineers from two universities, Ruhr-Universität Bochum and University of Duisburg-Essen, have developed novel signal processing methods for imaging and material characterisation with the aid of radar. 

Their long-term objective is to use these techniques in combination with radar-based localisation of objects. Their vision is a flying platform capable of generating a three-dimensional representation of its surroundings. 

The technology might be, for example, useful for finding out what firefighters might encounter behind clouds of smoke in a burning building. In principal, the same measurement technique should be suitable for material characterisation as well as localisation.

According to phys.org, the researchers have joined forces with other institutions under the umbrella of the collaborative research centre/transregio 196 “Marie,” short for “Mobile Material Characterisation and Localisation by Electromagnetic Sensing.” 

The measurement principle is as follows: a radar emits electromagnetic waves that are reflected by objects. Broadly speaking, it is possible to calculate how far away an object is located based on the delay between the transmitted and returning signals.

Additionally, the returning waves provide even more information. The strength of the reflected signal is determined by the size of the object, by its shape, and by its material properties. Converting a radar signal into an informative image requires huge computational cost. 

The recorded data can be compared to those of a camera that lacks a lens for focusing. Focusing is subsequently carried out at the computer, using algorithms developed by the researchers for this process that care of focusing, but also eliminate systemic measurement errors from the data.

Under controlled lab conditions, the current system is able to determine the position of an object and that it is made of a different material than, for example, the surface on which it lies. In the next step, the engineers intend to enable the system to recognise what the object actually is. 

I-HLS:

You Might Also Read:

Cloud Video Architecture Improves Emergency Services Response:

US Police Real-Time Mapping Of Terrorist Attacks:
 

« Russia Is Building Killer Robots
GDPR Will Impact Data Management In The USA »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

iStorage

iStorage

iStorage is the leading global provider of PIN Activated, hardware encrypted, portable data storage solutions.

CERT.GOV.AZ

CERT.GOV.AZ

Azerbaijan Government Computer Incident Response Team

Ethio-CERT

Ethio-CERT

National Cyber Emergency Readiness and Response Team of Ethiopia.

Luxar Tech

Luxar Tech

Luxar's network visibility products enable enterprises and service providers to monitor network traffic, improve security and optimize efficiency.

National Cybersecurity and Communications Integration Center (NCCIC)

National Cybersecurity and Communications Integration Center (NCCIC)

NCCIC is a cyber situational awareness, incident response, and management center for the US Government, intelligence community, and law enforcement.

Cienaga Systems

Cienaga Systems

Cienaga Systems is a leader in autonomous cyber threat hunting technology.

Blockchain Firm

Blockchain Firm

Blockchain Firm is a leading Blockchain based software solutions and service provider with our roots of expertise running deep into the technology.

Cyber Command - Estonian Defence Forces

Cyber Command - Estonian Defence Forces

The main mission of the Cyber Command is to carry out operations in cyberspace in order to provide command support for Ministry of Defence’s area of responsibility.

Meriplex

Meriplex

Meriplex is a Managed Services provider specializing in Intelligent Networks, Cybersecurity and Cloud Communications.

Hudson Cybertec

Hudson Cybertec

Hudson Cybertec are an internationally recognized Subject Matter Expert for cyber security in the Industrial Automation & Control Systems (IACS) domain.

Sunartek Labs

Sunartek Labs

Sunartek are equipped with expert resources and advanced technology to identify cyber threats and prevent any breach, bypassing the security network of your organization.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

Cyberani Solutions

Cyberani Solutions

Cyberani Solutions was created to fulfill the cybersecurity needs of industry and government in Saudi Arabia, and across the Middle East and North Africa regions.

VENZA

VENZA

VENZA is a data protection company that can help organisations mitigate their vulnerabilities and ensure compliance, keeping guests and their data safe from breaches.

SECTA5

SECTA5

SECTA5 is a cybersecurity company building a next-generation Continuous Threat and Exposure Management platform, leveraging the expertise of offensively trained cyber defenders.

Black Belt Secure

Black Belt Secure

We provide critical cybersecurity services such as managed security, ransomware mitigation, penetration testing, system auditing and compliance services to your organization.