3D Mapping Can Locate Survivors In Burning Buildings

Engineers from two universities, Ruhr-Universität Bochum and University of Duisburg-Essen, have developed novel signal processing methods for imaging and material characterisation with the aid of radar. 

Their long-term objective is to use these techniques in combination with radar-based localisation of objects. Their vision is a flying platform capable of generating a three-dimensional representation of its surroundings. 

The technology might be, for example, useful for finding out what firefighters might encounter behind clouds of smoke in a burning building. In principal, the same measurement technique should be suitable for material characterisation as well as localisation.

According to phys.org, the researchers have joined forces with other institutions under the umbrella of the collaborative research centre/transregio 196 “Marie,” short for “Mobile Material Characterisation and Localisation by Electromagnetic Sensing.” 

The measurement principle is as follows: a radar emits electromagnetic waves that are reflected by objects. Broadly speaking, it is possible to calculate how far away an object is located based on the delay between the transmitted and returning signals.

Additionally, the returning waves provide even more information. The strength of the reflected signal is determined by the size of the object, by its shape, and by its material properties. Converting a radar signal into an informative image requires huge computational cost. 

The recorded data can be compared to those of a camera that lacks a lens for focusing. Focusing is subsequently carried out at the computer, using algorithms developed by the researchers for this process that care of focusing, but also eliminate systemic measurement errors from the data.

Under controlled lab conditions, the current system is able to determine the position of an object and that it is made of a different material than, for example, the surface on which it lies. In the next step, the engineers intend to enable the system to recognise what the object actually is. 

I-HLS:

You Might Also Read:

Cloud Video Architecture Improves Emergency Services Response:

US Police Real-Time Mapping Of Terrorist Attacks:
 

« Russia Is Building Killer Robots
GDPR Will Impact Data Management In The USA »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Seric Systems

Seric Systems

Seric is a technology business specialising in security, infrastructure and data management.

ALTR

ALTR

ALTR provide software-embedded solutions for data security and privacy.

Global EPIC

Global EPIC

Global EPIC is an international cybersecurity initiative designed to combat growing world challenges by facilitating global collaboration in the field of cyber security.

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange is an intellectual hub and community of researchers with the common goal of advancing academic and industrial efforts in the science and engineering of quantum information.

RapidScale

RapidScale

RapidScale’s managed cloud solutions provide reliable, innovative, and secure services, all complete with white-glove service and full management options.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC) is an information security company providing website vulnerability scanning and monitoring services.

Defscope

Defscope

Defscope is an Azerbaijani company entirely focused on cybersecurity offering training, security consulting, and other professional services.

Norma Inc.

Norma Inc.

Norma provides the secured wireless environment (WiFi and Bluetooth) with the unauthorized AP detection, and secures your IoT assets from various threats.

Internet Crime Complaint Center (IC3)

Internet Crime Complaint Center (IC3)

The Internet Crime Complaint Center provide the public with a reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity.

Prevasio

Prevasio

Prevasio is a next-gen Cloud Security Posture Management (CSPM) with a built-in Vulnerability and Anti-Malware Scan for Containers.

WhiteJar

WhiteJar

WhiteJar offers an innovative approach to modern cybersecurity needs, empowering Ethical Hackers within its unique crowd platform.

Artjoker

Artjoker

Artjoker is a full cycle software development partner specialized in Blockchain projects and smart contract development including full cycle information security of all projects.

NexGen Cyber

NexGen Cyber

NexGen Cyber helps customers in commercial SMB markets with IT security, security integration, service management, outsourced service transition, and transformative security solutions.

FluidOne

FluidOne

FluidOne are an award-winning Connected Cloud Solutions provider. We design tailored solutions to help customers and partners digitally transform their IT and communications.

PDI Technologies

PDI Technologies

PDI Technologies helps convenience retail and petroleum wholesale businesses around the globe increase efficiency and profitability by securely connecting their data and operations.