EP1496484A1 - Gefahrenerkennungs-und-abwehrsystem - Google Patents
Gefahrenerkennungs-und-abwehrsystem Download PDFInfo
- Publication number
- EP1496484A1 EP1496484A1 EP04016018A EP04016018A EP1496484A1 EP 1496484 A1 EP1496484 A1 EP 1496484A1 EP 04016018 A EP04016018 A EP 04016018A EP 04016018 A EP04016018 A EP 04016018A EP 1496484 A1 EP1496484 A1 EP 1496484A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- danger
- hazard
- repellent
- repellents
- missile
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/14—Central alarm receiver or annunciator arrangements
Definitions
- the present invention relates to a hazard detection and defense system and a hazard detection and defense procedure.
- the present invention is based on the recognition that This defect is essentially due to the fact that Although the detection and sometimes the defense of as automates such recognized dangers in individual areas But that is currently the evaluation of hazards of Individuals on site must be provided. In extraordinary Situations like the ones described above are but these persons neither willing nor able, nor in In any case, authorizes quick, far-reaching decisions To take consequences; instead it tries to by contacting other people first a distribution of responsibility to several people too to reach. In many cases, such time-consuming processes are even compulsory; in other cases it is up to Entry of the danger completely unclear to which persons which responsibility, so then the responsibilities have to be agreed first.
- the present invention assumes that the effective Preventing danger especially the number of human Decisions must be minimized. For this the beats Invention ago that in particular the evaluation of the danger automatically follows the detection of danger. Furthermore, will According to the invention of several available security devices that or the hazard rating too Sequence most suitable automatically selected and activated or suggested to a user for activation.
- the system and method according to the invention is directed primarily to the detection and defense of such dangers for the general public like: heavy ABC accidents; Natural disasters, Epidemics and epidemics; particularly bad accidents, in particular terrorist attacks; Disturbances of the government and / or economic functions; and the defense or self-defense and military operations.
- the system can also be designed to be automatic ascertain any possible continuation of the danger and thereby the effect of the security measures used to verify; In this case, the evaluation instance can also be used informed of the proposed system Repellents were inadequate and comparable Situations will respond more appropriately in the future should be.
- the system according to the invention trainable.
- the flood protection system that could System on the basis of forecast and actually occurred Evolution of water levels, if necessary find that based on development projections automatically flooded polder surfaces too small or exaggeratedly large, and these empirical values provide the hazard assessment instance.
- the system may be designed in the event an insufficiently maintained defense with activatable repellents to propose to a user, on the one hand the activatable repellents to supplement further options, or / and to build or remove passive protective equipment in order to protect better prepared for future dangerous situations.
- an insufficiently maintained defense with activatable repellents to propose to a user
- the activatable repellents to supplement further options, or / and to build or remove passive protective equipment in order to protect better prepared for future dangerous situations.
- Can a system for flood control a register include available polder areas and sandbag reserves, and in case of one with these repellents not manageable flood event the user, so for example the state government suggest more Identify polder areas and / or larger or / and different set up distributed sandbag storage. That way the system is supplemented by a prevention component.
- Data processing can be done from a computer, in particular one or more computer clusters each several computers networked together be in whose or their data storage in particular a presetting of the selected at certain degrees of danger Repellent is stored.
- Known Examples of such computer clusters are "Beowulf" clusters. This preset can, as mentioned, on the hand of as ineffective verified security situations automatically can be changed.
- To cope with the upcoming Data processing tasks can be a massive be provided parallel computer structure, in the even individual processors can be logically shared, or / and data storage for parallel processing different parts of the same data word.
- detectors preferably a variety of such. It makes sense, several, especially different detectors to provide as complete a picture as possible of one to get into the dangerous situation; as well the detectors are designed to be bidirectional with each other or to communicate unidirectionally, from which a structure of the detection subsystem with detectors and Detector node results. Multidetectors of several Single detectors, but with a common signal output can also be used.
- a “detector node” is a device that adapted to receive signals from one or more detectors to receive and / or forward and preferably to send self-generated signals.
- a “Base station” is a device designed to do so is from one or more detectors and / or detector nodes Receive signals, process them yourself and / or for further processing to a detection subsystem to transfer.
- the detector types capture different parameters, for example, temperature, humidity, images, Movement, light conditions, pressure, soil condition, Noises, mechanical stress, and / or speed, Direction of movement, size, presence / absence of objects or substances.
- detectors are: residual light amplifiers, IR cameras, laser rangefinders, photoelectric sensors, radar, but also smoke detectors, levels, substance-specific sensors, Thermometer, barometer, hygrometer and calorimeter.
- Cube corner retroreflectors can be used for communication (CCR), the normal position ein fallendes Reflect light in the direction of origin. But one of the three mirrors of the CCR can be mobile and be modulated in his position; so that too be sent back modulated light, since it is only the Starting point reached again when the movable mirror just goes through its normal position.
- detectors are deployed, for example the existing data situation no clear risk assessment allows.
- detectors can wirelessly, for example be optically linked to a detector network, as well as beside the actual sensor its own energy supply, a separate communication device and if necessary have its own microprocessor; a Variety of such "Motes” called micro devices then form a self-organizing, "Smart Dust” called detector network.
- automatic Launching and / or ejection devices provided be, for example, miniature aircraft and / or drones. It would be possible in this way, on a nationwide Disable permanent installation of detectors and only in Case of danger warning the respectively needed Sensors in a manageable number in the danger area too bring. Of miniature aircraft deployed in this way "Motes" could then be the most accurate Assess the risk needed to provide data.
- the system can be designed to vary depending on the rating the danger selects another user whom the possibly proposed to be activated repellent become.
- the eligible users belong to different levels of political organization, so that, for example, at less serious dangers local authorities, in case of severe danger but directly supraregional Institutions are alerted. That would be too Subsidiarity of the system, ie the responsibility of each Ensured sufferers, while maintaining the ability to respond to general hazards.
- a parent of all other systems System in the immediate vicinity of a seat of government be installed; this subordinate systems would then preferably the provincial or state governments subordinate systems to the district governments, and the lowest systems of the hierarchy finally the municipalities and / or individual protection objects, e.g. Airports, nuclear power plants and / or sports stadiums.
- the components of a system may be spatially grouped, depending by volume in a room, building or / and building complex.
- the valuation means so for example the or the computer or computer cluster, can do it centrally located, preferably in two separate Rooms or buildings, each one in the one room or building arranged computer or computer cluster if necessary, the function of the other room or building take over arranged computer or computer cluster can.
- Around this central area can be peripheral Devices, such as display devices, client computers, as well as supply rooms, meeting rooms, premises the function monitoring and premises for the connection to neighboring and / or too superordinate and / or subordinate Be arranged systems.
- the repellents may include such mobile forces count like police, fire departments, technical relief organizations or / and units of the armed forces, but also permanently installed Facilities such as barrages and / or sprinkler systems.
- Missile in particular supersonic missile to install, their effect preferably on the principle of the balancing projectile.
- Such missiles would be quite able to do extremely fast, namely in less than one minute, preferably less than 10 seconds, comparatively to target small goals and effectively to meet.
- Such missiles may be designed to To reach 5 times the speed of sound and / or through Laser guidance control to be maneuvered.
- Such missiles thereby be adapted to their high Final velocity to achieve a solid fuel in its combustion chamber has a large surface and therefore burns particularly fast. This big surface may be provided by star-shaped and / or branched voids in the fuel packing are provided.
- the process begins with the response of the detectors whose Output signal simultaneously the input signal for the detection subsystem NC1 represents.
- This subsystem assesses e.g. by comparing the input signals with predetermined Thresholds, whether the input signals in their entirety a deviation from a given standard range represent. If this is the case, the danger situation applies as identified and automatically sent to the next instance, the hazard assessment subsystem NC2 output.
- This subsystem independently assesses the dangerous situation as to which of their further developments with what probabilities to expect are what damage would be associated with each, which Repellents are available, and whether by type of danger and prospects of successful defense the notification the next higher instance, not shown here, So the parent system within a System complex, should be done.
- the calculation of the event probabilities and damage levels can be on hand from presets based on empirical values based. If the hazard assessment subsystem NC2 has a most likely further development calculates the notification the next higher instance is not required makes, so some of the native defense against are sufficiently found, these repellents of the Selection subsystem NC3 selected and either, if so on the basis of a calculated urgent need of the defense measure and the selection subsystem NC3 for automatic triggering of this defense measure authorized is activated by the NC4 Defense Subsystem, or otherwise one of the selection subsystem NC3 is independent selected user for activation.
- This information is automatically sent to the selection subsystem NC3 transmits which affected Select and activate sprinkler systems, or if necessary the nearest fire brigade alerted.
- the hazard assessment subsystem NC2 predicts the verification subsystem NC5 or a special learning module LM this Discrepancy and corrects the default setting of the former. Is this not possible because, for example actually required sprinkler systems not installed or did not work, the verification subsystem creates NC5 or the learning module LM a list required Measures, in case of recurrence that ensure system-appropriate functioning. This list automatically becomes the municipal council as responsible political authority.
- water level and rain gauge can in a system according to the invention for flood warning and -behimmpfung be provided, with the repellent in such case, for example, releasable polder surfaces and sandbag warehouse together with THW, Bundesvid and include other provided transport capacities. Also Controlled water draining from dams may occur be effective repellent if triggered in time and the affected population in time of this Defensive measure is notified. In such a System can auto-evaluate the hazard assessment subsystem rely on weather forecasts of meteorological institutes.
- the second embodiment shown schematically in FIG 3, illustrates the linking of systems of the above Kind to a system complex: A central, the another superordinate system D is the complex level A1 here with 16 further, subordinate systems SN, P, MD, B, ER, DD, WI, M, S, MZ, SB, DÜ, H, HB, HH and KI of Complex level A2 connected, which in this case the federal states assigned to the Federal Republic of Germany (3a).
- the example selected subordinate System M is similar to systems UF, MF, OF, OP, NB, OB, SW superordinate to the complex level A3 (Fig.3b), ie the systems of the level of (in this case: Bavarian) Mausbezirke.
- a kind of link 4 shows the evaluation subsystem NC2 of the A2 system M In this example, it is capable of sending a message to the Output recognition subsystem NC1 of the A1 system D; vice versa
- the selection subsystem NC3 of the A1 system D authorized, directly, thus bypassing the selection subsystem NC3 of the A2 system M, its repellent too activate or the defense subsystem NC4 of the A2 system M to instruct you to do this.
- One Advantage of such an embodiment of the system is in that only locally significant, albeit cross-border Hazardous situations not unnecessary on one higher complex level can be edited without the danger situation in terms of their spatial extent is undervalued.
- the invention is not on the described structuring on the basis of political units limited; also other, in particular natural space units are possible.
- a flood detection and defense system based on natural watersheds be structured; a forest fire detection and Fighting system on the basis of natural and artificial Streams and forest areas; a disease detection and defense system on the basis of settlements or, insofar Animal diseases are detected and to be repelled, on hand the animal population distribution, e.g. the spatial distribution from fattening farms.
- Cluster is an example of an arrangement of 14 single computers with one or two 3 GHz processors linked to GB Ethernet, 2-8 GB SDRAM main memory and one or two 80 GB hard disk drives.
- Clusters are peripheral computers that, for example, provide the connection to users. systems cluster clients ⁇ Cluster ⁇ Clients Level A1 1 14 120 14 120 Level A2 16 4 40 64 640 Level A3 40 2 20 80 800 Level A4 440 1 15 440 6600
- the complex level A3 stands for governmental districts, the A4 level for counties and county-level cities; A5 would be in this hierarchy for communities and individual Protection objects. Even the latter can with clusters be equipped, for example, by several (e.g. 4) municipalities and / or protective objects each one Share clusters. Larger objects of protection, their own require system complexes according to the invention would be For example, to assign the complex level A3, ie Subordinate government districts.
- Level A1 Repellents count in this embodiment the Bundesvid leadership, the Federal Border Police, the Federal Intelligence Service, the Federal criminal police Office and the Federal Office for constitution protection
- Level A2 includes the Land criminal police Offices, the state offices for protection of the constitution as well as Divisions of the Farbsch; to level A3 Heilmann Brigades; for level A4 of civil protection, the technical Relief organization, police forces and emergency services; to level A5 local fire departments.
- FIG.5a An embodiment (Fig.5a) of the system according to the invention
- individual detectors 201 also includes detector networks from a plurality of individual detectors 201 ', 201 ", with these wirelessly linked detector nodes 203 ' or conductively linked detector node 203 "and a lower Number of base stations 205 'and 205 ", which in turn communicate with the detector nodes 203 'and 203 ", respectively
- multisensors 207 are also made up of several parallel connected similar sensors used.
- active detectors have detector nodes own laser light sources 23a, 23b via mirror systems with two degrees of freedom the emitted laser beam over can scan a certain solid angle range.
- An adjacent one Photodetector 21 registers the from passive detectors modulated back-reflected light, and a signal processing unit 25 evaluates direction and modulation of the signal.
- To communicate with one Base station serves a network unit 31 and a radio module 33.
- the exemplary linking of these components is shown schematically in Fig.5b.
- the microprocessors 29 of the detector nodes can clock rates of 4 MHz, 8kB flash memory, 512B RAM and 512B EEPROM.
- the Power supply can in this example by the Voltage source 35 can be provided.
- the method and system according to the invention provides a human decision or a decision-making body not necessarily before; but it is advantageous, at least one, preferably a plurality of users via the Status and activities of the system and / or its Subsystems to inform and thus a function monitoring to allow what is also the number of clients in Table 1 explained.
- An example is an arrangement of a Level A2 cluster and connected clients in Figure 6 shown: Central are the actual computer cluster 61 together with supply 63 and the information center 65 for the User arranged. Around this core are the clients, i.e.
- steerable supersonic missiles are used according to the invention in order to achieve the minimum deployment times required in such cases.
- Such a missile as shown schematically in Figure 7 reaches about Mach5 at a range of about 4 km, and achieves its effect by transferring its at a residual mass of about 40 kg considerable kinetic energy (namely about 1 ⁇ 2 ⁇ 40kg ⁇ (1500m / s) 2 , about 45 MJ).
- the missile carries instead of an explosive warhead a conical heavy metal block 11.
- a heavy metal for example, depleted uranium can be used, which has a high density.
- the steering takes place by means of a laser guidance control 9 by rotating the lattice rasters 5 about their longitudinal axis perpendicular to the direction of flight, the mirrors 7 maintaining communication with a control center (not shown).
- the required propulsion is generated by the combustion chamber 1 and the nozzle 3 by a solid fuel with extremely large surface after ignition quasi-instantaneous, namely burned in the single-digit millisecond range.
- the large surface is, as illustrated in Figure 8, achieved by in cross-section star-shaped or / and multi-branched free spaces 13 ', 13 ", 15 in the fuel 17.
- warhead described here is based on the principle based on energy transfer, other warheads, especially those are used, releasing substances in the target area that recognized one Hindering or paralyzing aggressors, e.g. Fog substances.
- the missile invention unfolds its advantage namely the fast effect, especially in combination with the hazard detection and defense method according to the invention and system, which is also on speed of hazard detection and defense are designed. So far this combination is particularly preferred, although both the Method and the system can be used without the missile are as well as the missile without the procedure and that System. If the missile is used together with the system, it is advantageous to use at least one camera as a detector provided.
- missiles are, in view of Range of the missile and considering the range possible weapons of an aggressor, about six missile launchers needed, for example, in two Three rows on both sides of the runway can be arranged.
- the optional learning module LM can be divided into several submodules To be arranged.
- a Simulationssubmodul are in particular four blocks provided, the a) the Recording the topography including litho and atmosphere, b) the preselection of relevant hazard aspects at all, c) the selection of concrete to be recognized and defended Danger types, and d) the provision of particular numerical parameters are assigned for the simulation.
- a learning module constructed in this way can do so self-directed learning process iteratively, therefore, points in the actual meaning "artificial intellect" on. This is it is able to self-simulate on the basis of simulations Proposals are also available for avoiding danger without actually creating a dangerous situation would have occurred.
Landscapes
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Alarm Systems (AREA)
Abstract
Description
- Fig.1
- zeigt einen erfindungsgemäßen Verfahrensablauf;
- Fign.2a,b
- zeigen Strukturen erfindungsgemäßer Systeme;
- Fign.3a-c
- zeigen den Aufbau eines erfindungsgemäßen Systemkomplexes;
- Fig.4
- zeigt die Verbindungen zwischen aufeinander folgenden Hierarchieebenen des erfindungsgemäßen Systemkomplexes;
- Fig.5a,b
- zeigt Komponenten eines Detektornetzes bzw. eines Detektorknotens in einer Ausführungsform des erfindungsgemäßen Systems;
- Fig.6
- zeigt eine räumliche Anordnung eines Computer-Clusters und seiner Clients in einer Ausführungsform des erfindungsgemäßen Systems;
- Fig.7
- zeigt einen erfindungsgemäßen Flugkörper zur Abwehr eines Terrorangriffs in teilweise aufgebrochener Darstellung;
- Fig.8a,b
- zeigen zwei Querschnitte durch Brennstoffpackungen erfindungsgemäßer Flugkörper.
Systeme | Cluster | Clients | ΣCluster | ΣClients | |
Ebene A1 | 1 | 14 | 120 | 14 | 120 |
Ebene A2 | 16 | 4 | 40 | 64 | 640 |
Ebene A3 | 40 | 2 | 20 | 80 | 800 |
Ebene A4 | 440 | 1 | 15 | 440 | 6600 |
Claims (30)
- Gefahrenerkennungs- und -abwehrsystem, umfassend:wenigstens einen Detektor zum Erkennen einer Gefahr;wenigstens ein Bewertungsmittel zum Bewerten der Gefahr;wenigstens zwei Abwehrmittel zum Abwehren der Gefahr;wenigstens ein Auswahlmittel zum Auswählen wenigstens eines der wenigstens zwei Abwehrmittel entsprechend der Bewertung der Gefahr;wenigstens einen Aktuator zum Aktivieren des wenigstens einen ausgewählten Abwehrmittels.
- System nach Anspruch 1, wobei die Gefahr einen ABC-Unfall, eine Naturkatastrophe, Seuche oder Epidemie, einen Terrorangriff oder einen Verteidigungsfall umfasst.
- System nach Anspruch 1 oder 2, ferner umfassend:Darstellungsmittel zum Darstellen der Gefahren-Bewertung oder/und des wenigstens einen ausgewählten Abwehrmittels; undAuslösemittel zum Auslösen der Aktivierung eines der ausgewählten Abwehrmittel durch einen Benutzer.
- System nach einem der vorhergehenden Ansprüche, ferner umfassend Verifikationsmittel zum Bewerten des Erfolgs der Gefahrenabwehr und zum Ausgeben eines Ergebnisses der Erfolgs-Bewertung.
- System nach Anspruch 4, ferner umfassend Optimierungsmittel zum Ändern einer Voreinstellung der Bewertungsmittel entsprechend der Ausgabe der Verifikationsmittel.
- System nach Anspruch 5, wobei die Optimierungsmittel außerdem ausgebildet sind, eine Ausgabe für einen Benutzer bereitzustellen, wobei die Ausgabe der Optimierungsmittel in Abhängigkeit von der Ausgabe der Verifikationsmittel den Benutzer anweist, weitere Abwehrmittel oder/und Schutzmittel bereitzustellen, insbesondere falls die Erfolgs-Bewertung wenigstens teilweise negativ ist.
- System nach einem der vorhergehenden Ansprüche, wobei die Bewertungsmittel wenigstens einen Computer mit wenigstens einem Prozessor und wenigstens einem Datenspeicher, insbesondere wenigstens einen Computer-Cluster umfassen.
- System nach Anspruch 5 und 7, wobei die Voreinstellung in dem Datenspeicher gespeichert ist.
- System nach einem der vorhergehenden Ansprüche, umfassend mehrere verschiedenartige Detektoren, wobei insbesondere eine Detektorart dazu ausgebildet ist, an eine andere Detektorart Informationen zu übertragen.
- System nach einem der vorhergehenden Ansprüche, ferner umfassend eine Ausbringungsvorrichtung zum Ausbringen weiterer Detektoren, insbesondere in Abhängigkeit von einer Ausgabe der Gefahren-Bewertung.
- System nach einem der vorhergehenden Ansprüche, wobei der wenigstens eine Detektor zum Ausgeben eines Identifizierungssignals ausgebildet ist.
- System nach einem der vorhergehenden Ansprüche, wobei das wenigstens eine Bewertungsmittel zum Bewerten der identifizierten Gefahr und zum Ausgeben eines Benachrichtigungssignals ausgebildet ist, und das wenigstens eine Auswahlmittel zum Auswählen wenigstens eines der wenigstens zwei Abwehrmittel entsprechend dem Benachrichtigungssignal ausgebildet ist.
- System nach einem der vorhergehenden Ansprüche, ferner umfassend zweite Auswahlmittel, wobei mehrere Darstellungsmittel und Auslösemittel vorgesehen sind, und wobei die zweiten Auswahlmittel entsprechend der Gefahren-Bewertung eines der Darstellungsmittel und eines der Auslösemittel auswählen, wobei die mehreren Darstellungs- und Auslösemittel jeweils verschiedenen Benutzern zugeordnet sind.
- System nach Anspruch 13, wobei die verschiedenen Benutzer jeweils verschiedenen Ebenen einer politischen Gliederung zugeordnet sind.
- Verfahren der automatisierten Erkennung und Abwehr einer Gefahr, insbesondere einer Gefahr für die Allgemeinheit, umfassend die Schritte:Erkennen der Gefahr;Bewerten der Gefahr;Auswählen wenigstens eines von wenigstens zwei Abwehrmitteln entsprechend der Gefahren-Bewertung;Aktivieren des wenigstens einen ausgewählten Abwehrmittels;Abwehren der Gefahr mit dem aktivierten Abwehrmittel.
- Verfahren nach Anspruch 15, ferner umfassend einen Schritt des Auslösens der Aktivierung des wenigstens einen ausgewählten Abwehrmittels durch einen Benutzer.
- Verfahren nach Anspruch 15 oder 16, ferner umfassend einen Schritt des Verifizierens eines Erfolgs der Gefahrenabwehr und einen Schritt des Ausgebens eines Ergebnisses der Erfolgs-Bewertung.
- Verfahren nach Anspruch 17, ferner umfassend einen Schritt des Änderns einer Voreinstellung der Bewertungsmittel entsprechend der Ausgabe der Verifikationsmittel.
- Verfahren nach Anspruch 17 oder 18, ferner umfassend einen Schritt des Ausgebens einer Anweisung an einen Benutzer, weitere Abwehrmittel oder/und Schutzmittel bereitzustellen.
- Verfahren nach einem der Ansprüche 15 bis 19, ferner umfassend einen Schritt der zweiten Auswahl eines von mehreren Darstellungsmitteln und eines von mehreren Auslösemitteln entsprechend der Gefahren-Bewertung, wobei die mehreren Darstellungs- und Auslösemittel jeweils verschiedenen Benutzern zugeordnet sind.
- Verfahren nach einem der Ansprüche 15 bis 20, ferner umfassend einen Schritt der Ausbringung von weiteren Detektoren, insbesondere in Abhängigkeit von der Gefahren-Bewertung.
- Verfahren nach einem der Ansprüche 15 bis 21, ferner umfassend den Schritt des Ausgebens eines Identifizierungssignals.
- Verfahren nach einem der Ansprüche 15 bis 21, ferner umfassend die Schritte:Ausgeben eines Benachrichtigungssignals, undAuswählen des wenigstens einen Abwehrmittels entsprechend dem Benachrichtigungssignal.
- System nach einem der Ansprüche 1 bis 14 in Verbindung mit Anspruch 2, insbesondere zur Abwehr der Gefahr eines Terrorangriffs oder eines Verteidigungsfalls, wobei die Gefahrenabwehrmittel wenigstens einen lenkbaren Flugkörper mit einem Überschall-Antrieb umfassen, der insbesondere dazu ausgebildet ist, den Flugkörper auf ein wenigstens Fünffaches einer Schallgeschwindigkeit in Luft zu beschleunigen.
- System nach Anspruch 24, ferner umfassend eine Lenkvorrichtung zum Lenken des Flugkörpers im Wesentlichen auf eine Ursache der Gefahr.
- System nach Anspruch 25, wobei die Lenkvorrichtung Mittel zum Aussenden und zum Empfang von Lichtstrahlen, insbesondere Laserlichtstrahlen umfasst.
- System nach einem der Ansprüche 24 bis 26, wobei der Flugkörper an einem in Flugrichtung vorderen Ende einen insbesondere konischen Block zum wesentlichen Übertragen einer kinetischen Energie des Flugkörpers auf die Ursache der Gefahr aufweist.
- System nach Anspruch 27, wobei der Block im Wesentlichen aus einem Metall, insbesondere einem Schwermetall besteht.
- Systemkomplex umfassend wenigstens ein niederes System nach Anspruch 13 oder 14 sowie wenigstens ein höheres System nach einem der Ansprüche 1 bis 14, wobei die zweiten Auswahlmittel des niederen Systems dazu ausgebildet sind, im Falle einer als besonders hoch bewerteten Gefahr das Ergebnis der Gefahren-Bewertung an das Bewertungsmittel des höheren Systems auszugeben.
- Systemkomplex nach Anspruch 29, wobei die Auswahlmittel des höheren Systems dazu ausgebildet sind, die Gefahrenabwehrmittel oder/und die Ausbringungsvorrichtung des niederen Systems auszuwählen und zu aktivieren.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE2003131523 DE10331523A1 (de) | 2003-07-11 | 2003-07-11 | Gefahrenerkennungs- und -abwehrsystem |
DE10331523 | 2003-07-11 |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1496484A1 true EP1496484A1 (de) | 2005-01-12 |
Family
ID=33441740
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP04016018A Withdrawn EP1496484A1 (de) | 2003-07-11 | 2004-07-07 | Gefahrenerkennungs-und-abwehrsystem |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP1496484A1 (de) |
DE (1) | DE10331523A1 (de) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9505494B1 (en) | 2015-04-30 | 2016-11-29 | Allstate Insurance Company | Enhanced unmanned aerial vehicles for damage inspection |
EP3312811A1 (de) * | 2016-10-20 | 2018-04-25 | Deutsche Post AG | Abwehren einer gefährdung |
CN107968929A (zh) * | 2016-10-20 | 2018-04-27 | 德国邮政股份公司 | 避免危险 |
US10102586B1 (en) | 2015-04-30 | 2018-10-16 | Allstate Insurance Company | Enhanced unmanned aerial vehicles for damage inspection |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102007018507B4 (de) * | 2007-04-19 | 2012-05-03 | Krauss-Maffei Wegmann Gmbh & Co. Kg | Verfahren und Vorrichtung zur Bekämpfung einer Angriffsmunitionskörper-Abschussvorrichtung |
DE102008023520C5 (de) * | 2008-05-15 | 2016-12-29 | Airbus Defence and Space GmbH | Verfahren zur Klassifikation von RAM-Geschossen |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0940787A2 (de) * | 1993-03-25 | 1999-09-08 | Nohmi Bosai Ltd. | Empfangsstation in Feueralarmsystem |
US20010011946A1 (en) * | 1998-05-15 | 2001-08-09 | Horon Daniel J. | Fire protection and security monitoring system |
US6281790B1 (en) * | 1999-09-01 | 2001-08-28 | Net Talon Security Systems, Inc. | Method and apparatus for remotely monitoring a site |
EP1239434A2 (de) * | 2001-03-07 | 2002-09-11 | L'air Liquide, S.A. à Directoire et Conseil de Surveillance pour l'Etude et l'Exploitation des Procédés Georges Claude | System und verfahren zur fernverwaltung von einrichtungs-betriebsparametern |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE4016051C2 (de) * | 1990-05-18 | 1994-10-06 | Rheinmetall Gmbh | Mantelpenetrator |
JP3726277B2 (ja) * | 1997-01-30 | 2005-12-14 | マツダ株式会社 | 車両用エアバックシステム |
-
2003
- 2003-07-11 DE DE2003131523 patent/DE10331523A1/de not_active Ceased
-
2004
- 2004-07-07 EP EP04016018A patent/EP1496484A1/de not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0940787A2 (de) * | 1993-03-25 | 1999-09-08 | Nohmi Bosai Ltd. | Empfangsstation in Feueralarmsystem |
US20010011946A1 (en) * | 1998-05-15 | 2001-08-09 | Horon Daniel J. | Fire protection and security monitoring system |
US6281790B1 (en) * | 1999-09-01 | 2001-08-28 | Net Talon Security Systems, Inc. | Method and apparatus for remotely monitoring a site |
EP1239434A2 (de) * | 2001-03-07 | 2002-09-11 | L'air Liquide, S.A. à Directoire et Conseil de Surveillance pour l'Etude et l'Exploitation des Procédés Georges Claude | System und verfahren zur fernverwaltung von einrichtungs-betriebsparametern |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9505494B1 (en) | 2015-04-30 | 2016-11-29 | Allstate Insurance Company | Enhanced unmanned aerial vehicles for damage inspection |
US10102586B1 (en) | 2015-04-30 | 2018-10-16 | Allstate Insurance Company | Enhanced unmanned aerial vehicles for damage inspection |
US10223753B1 (en) | 2015-04-30 | 2019-03-05 | Allstate Insurance Company | Enhanced unmanned aerial vehicles for damage inspection |
US10636099B1 (en) | 2015-04-30 | 2020-04-28 | Allstate Insurance Company | Enhanced unmanned aerial vehicles for damage inspection |
US11010837B1 (en) | 2015-04-30 | 2021-05-18 | Allstate Insurance Company | Enhanced unmanned aerial vehicles for damage inspection |
US11869090B1 (en) | 2015-04-30 | 2024-01-09 | Allstate Insurance Company | Enhanced unmanned aerial vehicles for damage inspection |
EP3312811A1 (de) * | 2016-10-20 | 2018-04-25 | Deutsche Post AG | Abwehren einer gefährdung |
CN107968929A (zh) * | 2016-10-20 | 2018-04-27 | 德国邮政股份公司 | 避免危险 |
CN107979742A (zh) * | 2016-10-20 | 2018-05-01 | 德国邮政股份公司 | 避免危险 |
US11809182B2 (en) | 2016-10-20 | 2023-11-07 | Deutsche Post Ag | Averting a danger |
Also Published As
Publication number | Publication date |
---|---|
DE10331523A1 (de) | 2005-02-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tatham | An investigation into the suitability of the use of unmanned aerial vehicle systems (UAVS) to support the initial needs assessment process in rapid onset humanitarian disasters | |
Whitlock | Remote US base at core of secret operations | |
Beagle | Effects-Based Targeting: Another Empty Promise? | |
EP1496484A1 (de) | Gefahrenerkennungs-und-abwehrsystem | |
Demos | The agency of fire: Burning aesthetics | |
DE102022200996A1 (de) | Umgebungsbranddetektionsanordnung zur Überwachung von einem Überwachungsbereich, Verfahren, Computerprogramm und Speichermedium | |
Clarke | Drs. Pangloss and Strangelove meet organizational theory: High reliability organizations and nuclear weapons accidents | |
Zraket | Strategic command, control, communications, and intelligence | |
McIninch | The Oxcart Story | |
Paradis et al. | A Grounded Theory of UAS Reported Accidents | |
Oguro | Ensuring Japan's Future Air Security: Recommendations for Enhancing the JASDF's Readiness to Confront Emerging Threats | |
Eftychidis et al. | UAVs and their use in servicing the community | |
Deeney et al. | Finding, fixing, and finishing the guideline: the development of the United States Air Force Surface-to-Air Missile Suppression force during Operation Rolling Thunder | |
Larsen | Responding to catastrophic events: consequence management and policies | |
Kaur et al. | Practices of Unmanned Aerial Vehicle (UAV) for Security Intelligence | |
Fitzgerald | Improving volcanic ballistic hazard assessment through field and laboratory approaches | |
Chandler | 5,000 Feet is the Best: Re-viewing the Politics of Unmanned Aerial Systems | |
Krasiński | Unmanned Aircraft Systems in Crisis Management in Poland After 2007 | |
Stoffler | The Evolution of Environmental Data Analytics in Military Operations | |
Caldwell et al. | CASE COMMENTS | |
Charvat et al. | Intelligent Integration of UAV Systems for Wildland Fire Management: Towards Concept Demonstration | |
Parczewski | Use of unmanned aviation by State Fire Service (PSP) | |
EP1256013A1 (de) | Vorrichtung und verfahren zur detektion von flugkörpern | |
Ramesh | Escalating Crisis and Lagged Response: Perspectives from the Mumbai Terrorist Attack. | |
Barazzotto | Thoughts on betting your beast of burden and winning |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL HR LT LV MK |
|
17P | Request for examination filed |
Effective date: 20050629 |
|
AKX | Designation fees paid |
Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR |
|
AXX | Extension fees paid |
Extension state: MK Payment date: 20050629 Extension state: LV Payment date: 20050629 Extension state: LT Payment date: 20050629 Extension state: HR Payment date: 20050629 Extension state: AL Payment date: 20050629 |
|
17Q | First examination report despatched |
Effective date: 20070726 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20071207 |