The invention relates notably to a method and a system for detecting and/or locating mobile objects present in a detection space, for example, inside a building, a room, etc.
It applies, notably, to the locating of persons present in buildings, or even in stores.
More generally, it applies to the detecting and/or locating of any human being.
Hereinafter in the description, the expression “mobile object” will be used to designate an individual or human being or a robot equipped with a device for exchanging signals with the rings and, where appropriate, with the other mobile objects.
Locating individuals inside buildings relies conventionally on the existence of an infrastructure consisting of terminals, which does not come without many installation problems. For example, locating involves triangulation with position terminals; this method is known by the term ABL (Anchor-based location). An example thereof is given in
One of the problems of locating inside buildings lies in the radio range in the presence of obstacles. In complicated structures like towers, the superstructure and the lift cages are elements that strongly reduce radio propagation, which means there is a need for a greater density of terminals and makes deployment significantly more complex.
To implement individual location by ABL technique according to the prior art is therefore a complex approach given the number of terminals necessary and the infrastructure to be deployed to power them and interlink them.
Another method commonly used is a method that involves independence from any infrastructure and deducing the position of the nodes by a different means. This method is known by the name AFL (Anchor-Free Location).
We start from the assumption that the various nodes of the group are capable of measuring, by any radio technique but preferably with spread spectrum, the distance separating them from the neighbors with which they are in radio range. All the measurements made are processed in real time by a central station (one of the nodes of the group, for example). The processing mainly relies on solving M equations with N variables, with M greater than, even very much greater than, N.
The performance characteristics of the AFL method are conditioned by the total number of nodes in the group concerned and the density of these nodes. In practice, the greater the density of nodes, the greater the number of links between nodes and, consequently, the greater the location accuracy.
In some configurations (group too small, insufficient density or even excessively large obstacles thus reducing propagation between the nodes), the AFL techniques cannot operate correctly. In particular, on an attempt to enter or withdraw individuals, the results are too uncertain (insufficient accuracy, for example) or ambiguous.
The positioning of firemen or first-aiders to within 1 m in buildings is not obtained in all environment and deployment cases.
In an enclosed space (building, commercial center, tower), locating the elements of an intervention group is an increasing need in the modern world to deal with natural accidents or terrorist incidents.
The most mature locating techniques in terms of robustness involve cooperative procedures between the individuals of the group and an infrastructure (active location). It consists in the transmission, by the individuals of the group, of a wave or of information in response to the interrogation sent by an interrogating terminal of the infrastructure (ABL technique), or vice-versa.
The method and the system according to the invention make it possible in particular to overcome the drawbacks mentioned hereinabove.
The invention relates to a method for detecting and/or locating one or more mobile objects in a detection space wherein are used a network of mobile objects in a communication network, an AFL technique and measurements between the mobile objects, comprising at least the following steps:
on each or most of the mobile objects
It comprises, for example, a distance and angle measuring step between the mobile objects present in the detection space, a step for inhibiting distance and angle measurement aberrations between two nodes over time and a step wherein all the distance and angle information between nodes is combined and the triangulation is performed.
Detection terminals can be used as transponders.
The detection terminals are, for example, linked to a communication network.
The invention also relates to a system for detecting and/or locating one or more mobile objects in a detection space comprising a network of mobile objects in a communication network implementing the AFL technique, the system comprising at least one transponder, and each mobile object is, for example, equipped with transmitter and receiver modules adapted to operate either in interrogating mode or in answering mode, the mobile objects being able to interrogate and answer each other and are adapted to interrogate the transponders.
A mobile object can comprise:
The transponder is, for example, a detection terminal.
The terminal can be linked to a communication network R.
A detection terminal is adapted, for example, to detect smoke and comprises, for example, a ring comprising one or more sectoral antennas (A1, A2, A3, A4), an antenna selecting device, a transmitting interrogating module and a receiving interrogating module, a management module for the interrogator linked to the network interface and an energy module, and a mobile object to be detected is, for example, equipped with a transponder.
A detection terminal comprises, for example, a ring including one or more sectoral antennas (A1, A2, A3, A4), an antenna selecting device, a transmitter module that can operate either in interrogating mode or in answering mode, and a receiver module that can operate either in interrogating mode or in answering mode, a management module for the interrogator linked to the network interface and an energy module, and the mobile object to be detected is equipped with transmitter and receiver modules operating either in interrogating mode or in answering mode, one or more antennas, energy, management, and, where appropriate, display modules.
A detection terminal may comprise a ring consisting of one or more sectoral antennas (A1, A2, A3, A4), an antenna selecting device, a transmitting-answering module and a receiving-answering module, a management module for the answerer linked to the network interface and an energy module, and the mobile object to be detected is equipped with receiving and transmitting interrogating modules.
The mobile objects are equipped, for example, with RFID transponders and the terminals are equipped with transmitting interrogating and receiving interrogating modules for interrogating the mobile objects.
The terminals can be equipped with RFID transponders and the mobile objects are equipped with transmitter and receiver modules that can operate either in interrogating mode or in answering mode, the mobile objects being able to interrogate and answer each other and also being able to interrogate the terminals equipped with RFID transponders.
A detection terminal comprises, for example, a communication and/or information storage device.
The mobile objects can be UWB radio “add-on” modules connected to cell phones (UMEX method: Uwb Mobile object EXtension) for performing radio transmissions or distance measurements with other equipment of the same type.
The mobile objects are, for example, UWB radio “add-on” modules connected to cell phones (UMEX method) for performing radio transmissions or distance measurements with other equipment of the same type or with terminals of the infrastructure.
Other characteristics and advantages of the present invention will become more apparent on reading the description that follows of an example given by way of illustration and in no way limiting, with appended figures which represent:
a and 3b, an exemplary locating device according to the invention,
a represents an exemplary locating and detection device according to the invention. The device 1 comprises, for example, a ring 2 arranged around a detector/sprinkler 3. The ring 2 is, for example, installed on an existing structure. It can also be incorporated while the detectors/sprinklers are being manufactured. The ring 2 is offset relative to the cells 3i that have to allow water to pass or smoke to be detected in case of fire or of the start of a fire. The detector/sprinkler 3 is, for example, linked to a communication network R according to principles well known to those skilled in the art and which will not be detailed. The network makes it possible notably to link the terminals to monitoring and control devices. This example corresponds to the ABL technique.
The antenna of the ring is separated both from any flow of water and from the ceiling and from any related metallic accessories.
The ring 2 can be derived, according to the deployment types, in a number of versions, namely interrogator only, or transponder only, or interrogator-transponder. For this, it is equipped with suitable means detailed in
A ring is, for example, supplied with electricity at low voltage (12/24 or 48 V). If the building has a low voltage power supply network, it is used. Otherwise, the building contains a network consisting, for example, of small diameter conductors, the necessary power being low. Another solution involves using batteries incorporated in the ring to overcome any cuts to the main electricity network (a solution that is more favorable than the transponder ring version because it is provided with a standby mode with wake-up for response triggered only on an interrogation sent by a mobile object).
b diagrammatically represents a ring consisting of an antenna comprising a number of sectors Ai, A1, A2, etc. Such a structure provides, notably, for a greater selectivity of the multiple paths, possibly an angle measurement associated with the distance measurements. The benefit of such antennas is firstly that they improve the link budget and allow for longer distance measurements. The angle measurements can subsequently be analysed, complementing the distance measurements, to improve the locating accuracy.
The ring can operate as a black box, that is, it can back up the history of the latest exchanges (communications but also positioning information) after a fire. In this case, the ring is provided with a storage device in which the information backup duration is preprogrammed by the security network operator. Beyond the maximum backup duration, the information is lost (for example after 24 h).
In its “interrogator” version, diagrammatically represented in
In the description, the expression transmitting interrogator means: the transmission part of the interrogator, and the expression receiving interrogator designates the reception part of the interrogator. When interrogating, the first step is to transmit and then await the answer, by switching to reception mode.
The connection between a number of rings deployed to create the locating system according to the invention can be all wireless or partially wireless according to the volume of the location, therefore the number of rings installed. A partially wireless solution is based on a wired backbone, better known simply as “backbone”, for connecting to the Intranet-Internet network of the place where all the detection system is installed.
A second version of the so-called “interrogating-transponder” ring consists in allowing the possibility, in addition to the first mode in which the ring terminals are “interrogators” and the mobile objects “answerers”, to make the ring terminals function as “answerer” or transponder and the mobile objects as “interrogator”. The mobile objects represent the individuals, the robots equipped with a transmitting-receiving transponder.
When the rings operate in interrogator mode (the mobile objects are then in transponder mode), a ring uses its transmitting interrogator function to interrogate a mobile object equipped with a receiver, the mobile object then using its receiving transponder function. On receipt of the interrogation signal, the mobile object switches to transmitting transponder mode in order to transmit the response to the ring which, for its part, had switched to receiving interrogator function to await the answer from the answering mobile object.
If the rings operate in transponder mode (interrogator mode for the mobile objects), the ring is basically in receiving transponder function. It awaits an interrogation from a mobile object then using the transmitting interrogator function. Immediately it receives the interrogation from the mobile object, the ring switches to transmitting transponder function to transmit the response to the mobile object which, for its part, had switched to receiving interrogator function to await the answer from the transponder.
In transponder mode, the ring retransmits, on interrogation from a mobile object equipped with the interrogator, its identity, its location (according to a pre-established reference) and other available information (sector having made the detection, and so on). In interrogator mode on the ring, the mobile object returns an answer consisting of its identity and available additional information (mission to be carried out, objective to be reached, etc.).
The interrogator system—either the ring in interrogator mode associated with the mobile object in transponder mode, or the mobile object in interrogator mode associated with the ring in transponder mode—has to deduce from this a distance measurement between it and the transponder, that is, in all cases, the distance between the ring and the mobile object. Thus, therefore, this measurement is available on the mobile object when the mobile object is in interrogator mode and the ring is in transponder mode. This measurement is available on the ring when the ring is in interrogator mode and the mobile object is in transponder mode. It transmits this information to the central or off-site system which is responsible for taking account of all the measurements (e.g. all the measurements between a mobile object and all the rings in its radio range) and performing the triangulation and, if necessary, retransmits to the mobile objects the positioning information. The two modes (interrogator ring/transponder mobile object on the one hand and transponder ring/interrogator mobile object on the other hand) are exclusive but possible on the same hardware structure of the ring. The modes are triggered either by a “central intelligence” or are preprogrammed.
A third so-called “transponder” version represented in
The device can even be more economic if operating without transmission, only in backscatter mode as exists in the radiofrequency identification devices (RFIDs). There is no network interface (no network interface obligation). In this case, there is no longer a transmitter, the device according to the invention returns an overmodulation on the RF energy received following an interrogation (obtained either from the ring if the interrogator is on the ring, or from the mobile object in the reverse case) (like microwave badges). Of course, by eliminating the transmitter, the system consumes only very little. However, the range is reduced; the link budget is 1/R4 instead of 1/R2.
A fourth version is that enabling the mobile objects to be both in interrogator mode and in transponder mode according to their requirements for distance measurements between them (between the mobile objects as in the AFL method). The mobile objects can be cell phones for example. The particular feature of this version is that it enables the mobile objects, in addition to the AFL locating method, to interrogate rings equipped simply with RFID “transponders” (
The set of these rings forms the enhanced AFL system. The infrastructure to be installed between the rings is reduced to nothing at all (the ring is simply placed around the detector/sprinkler).
The communication and locating module, being placed at height, can be used to obtain the best possible radio range.
In the case of an installation on detectors/sprinklers, the distance between the latter being limited to 6 m according to international safety regulations, the radio coverage is excellent and the nodes to be located are covered redundantly.
The description hereinabove presents two systems which are complementary and which address two different needs. The ABL system provides locating accuracy, a networking of the information, and delivers a situation awareness generated centrally at the place to be protected. The application potential is maximized (centralized log, use of this new medium for other purposes, and so on).
The enhanced AFL system is an essentially mobile device (see
Depending on the policy of the town and the number of places to be protected, the appropriate response will be the first or the second system.
The method according to the invention implements certain data processing steps described, for example, in relation to
Take the various measurements over time between a terminal X and a mobile object k within its radio range: dXk(t1)dXk(t2)dXk(t3) . . . dXk(tn) . . . , the basic principle of time consistency processing is based on the rejection of samples that are not compatible with an acceptable variation. This means having to consider the speed and maximum acceleration of the mobile object and to take into account any direct path losses.
Thus, in the following example, the samples are retained as long as they are within the confidence window, represented in
The steps implemented for the AFL technique are identical to the steps described in relation to
The system according to the invention is applicable to numerous applications, some of which are given hereinbelow for illustration purposes, but not exhaustively.
Coupling a smoke or fire detector/water sprinkler makes it possible to recover this information on the communication-location system.
The ABL communication system can be used to convey this information to a central collection system but recover it also on the firemen (mobile objects) so that they know the point where the fire started if the nodes are provided with these communication means.
Recovery of the fire detection information enables the fire-fighting forces to know the critical point of intervention and accordingly devise a strategy for attacking the fire (ABL).
Altogether, the modules implement a modified ABL technique, taking account of the overabundance of terminals.
The set of detectors provided with the ABL module constitutes a network of wirelessly-interconnected sensors. These various sensors, in addition to measuring the ambient temperature, can be provided with presence detection modules thus making it possible to add to the number of known parameters of the situation.
This knowledge makes it possible to generate a complete report: scale of the fires at the various points, number and position of the means and resources, so leading to knowledge of the optimal fire-fighting or catastrophe strategies.
This situation awareness, already known at a central point of the fire or catastrophe fighting device, can be transmitted to each of the people involved, via a wrist unit, or projected by collimation onto the fireman's visor.
At the same time, with the communication and display means available to the nodes on the firemen, it is possible to radioguide the latter to particular points according to an overall strategy.
By this same strategy, it is possible to optimize the resources to be implemented by dosing, for example, the actions of the sprinklers (volume and type of mist to be applied, limiting of the water volumes if not necessary, and so on) thanks to the ABL technique network.
Over and above the locating of the firefighters or first-aiders, it is possible to provide the same people with a function for communicating with each other or with the infrastructure according to the invention with the ABL technique to reach the staging area.
This goes beyond the terminal intercommunication means, to transmit step by step the location results from each of them but also to enable voice or data interchanges by this radio channel.
In as much as the radio means for locating make it possible to convey voice, data and possibly video wireless transmissions, it becomes possible to use the wireless network not only to locate firemen, emergency doctors, but also to:
Thus, the wireless network becomes useful in the daily life of the occupants of a company building and becomes assigned as a priority to the deployment of the intervention forces in the event of fire or serious problems.
It is also possible, by extension, to complement this approach by providing the people involved or third parties (people working in the buildings, maintenance teams, etc.) with “add-on” modules on their cell phones (UMEX method: Uwb Mobile object Extension).
This “add-on” module can ultimately be incorporated directly in the cell phone.
Number | Date | Country | Kind |
---|---|---|---|
05 09218 | Sep 2005 | FR | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP06/66175 | 9/6/2006 | WO | 00 | 11/2/2009 |