3D Mapping Can Locate Survivors In Burning Buildings

Engineers from two universities, Ruhr-Universität Bochum and University of Duisburg-Essen, have developed novel signal processing methods for imaging and material characterisation with the aid of radar. 

Their long-term objective is to use these techniques in combination with radar-based localisation of objects. Their vision is a flying platform capable of generating a three-dimensional representation of its surroundings. 

The technology might be, for example, useful for finding out what firefighters might encounter behind clouds of smoke in a burning building. In principal, the same measurement technique should be suitable for material characterisation as well as localisation.

According to phys.org, the researchers have joined forces with other institutions under the umbrella of the collaborative research centre/transregio 196 “Marie,” short for “Mobile Material Characterisation and Localisation by Electromagnetic Sensing.” 

The measurement principle is as follows: a radar emits electromagnetic waves that are reflected by objects. Broadly speaking, it is possible to calculate how far away an object is located based on the delay between the transmitted and returning signals.

Additionally, the returning waves provide even more information. The strength of the reflected signal is determined by the size of the object, by its shape, and by its material properties. Converting a radar signal into an informative image requires huge computational cost. 

The recorded data can be compared to those of a camera that lacks a lens for focusing. Focusing is subsequently carried out at the computer, using algorithms developed by the researchers for this process that care of focusing, but also eliminate systemic measurement errors from the data.

Under controlled lab conditions, the current system is able to determine the position of an object and that it is made of a different material than, for example, the surface on which it lies. In the next step, the engineers intend to enable the system to recognise what the object actually is. 

I-HLS:

You Might Also Read:

Cloud Video Architecture Improves Emergency Services Response:

US Police Real-Time Mapping Of Terrorist Attacks:
 

« Russia Is Building Killer Robots
GDPR Will Impact Data Management In The USA »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

April 4, 2024 | 11:00 AM PT: Join this webinar to find out about six emerging trends dominating the cloud cybersecurity landscape.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Solarflare

Solarflare

Solarflare is a leading provider of intelligent networking I/O software and hardware platforms that accelerate, monitor and secure network data.

herdProtect

herdProtect

herdProtect is a second line of defense malware scanning platform powered by 68 anti-malware engines in the cloud.

Secure Recruitment

Secure Recruitment

Secure Recruitment is a specialist Executive Search business that focuses its efforts on attracting specific exceptional talent in Cyber Security.

Agio

Agio

Agio is a hybrid managed IT and cybersecurity provider servicing the financial services, health care and payments industries.

Securden

Securden

Securden provide an all-in-one Platform for Next-Gen Privileged Access Governance, helping you to prevent identity thefts, malware propagation, cyber attacks, and insider exploitation.

Futurae Technologies

Futurae Technologies

Futurae - enabling trust and invisible security for your users on all devices and applications. Strong customer authentication (SCA) made easy.

Force Majeure

Force Majeure

Force Majeure specializes in cybersecurity, incident response, and digital forensics, with experience spanning more than a decade.

Assure IT

Assure IT

Assure IT is a Singapore company specialising in technology governance, risk and compliance.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators provides services and information about financial fraud, fraud investigation and fraud prevention.

Dimension Data

Dimension Data

Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including intelligent security solutions.

Digital Catapult

Digital Catapult

Digital Catapult is the UK authority on advanced digital technology. We bring out the best in business by accelerating new possibilities with advanced digital technologies.

Nortal

Nortal

Nortal is a strategic digital transformation partner for leading companies and governments around the world.

ReachOut Technology

ReachOut Technology

ReachOut is a transformative approach to IT Security, Support, and Guidance. But we’re more than that. We’re passionate IT experts driven to make solutions to your problems.

Multipoint Group

Multipoint Group

Multipoint is an information security and protection solutions company operating in the South EMEA region through value-added distribution channels.

Piiano

Piiano

Piiano offers developer-friendly privacy and security products. Reduce risk and protect your data by using our specialized security and privacy SaaS tools.