Risk mapping system

ABSTRACT

A risk mapping system ( 1 ) for use in crises management comprises a database ( 2 ) having a plurality of risk maps and hazard data associated with each risk map stored thereon. The database is accessible by one or more of personal computers ( 3 ), laptops ( 4 ) and hand held devices ( 5 ) by way of communication channels ( 6 ). The risk maps stored on the database comprise three dimensional graphical representations of specific locations and for each specific location having a three dimensional graphical representation there are provided a plurality of three dimensional, graphical representations from different aspects of that location. The hazard data is represented by way of a hazard icon superimposed on the risk map.

The present invention relates to a risk mapping system and in particularto a risk mapping system for use by the emergency services in crisismanagement.

One of the major problems experienced by emergency services personnel,and in particular members of the fire services, is that there is oftengreat difficulty in accessing emergency data such as blast radius,neighbouring sites and hazards, location of people and essentialequipment such as fire hydrants, hose reels, valves and the like whenarriving at the scene of an emergency. Valuable time may be lost in thesearch for such equipment which is unacceptable.

Another problem experienced by fire service personnel is that often theyare not-aware of the dangers awaiting them inside a building. Forinstance, whether or not there are certain chemicals or explosivesinside the building that would affect the equipment used by the fireservices as well as the strategy to be adopted for fighting the blaze.An unwary fireman may be entering a potential death trap equipped withinappropriate equipment and may cause more harm than good in his effortsto control the blaze putting both his own life and those of hiscolleagues at risk.

The European Union has attempted to address these problems byintroducing the Directives known as Seveso 1 and Seveso 2. Thesedirectives require manufacturers and other plant owners to supply localfire services with detailed drawings of their buildings, as well asoutlining any dangerous substances that are kept on the premises.

This introduces its own set of problems, in that the drawings submittedare often architectural plans or “blueprints” that contain a lot ofunnecessary information on the drawings. These drawings are often verydifficult to interpret and many serve only to confuse matters further.The emergency personnel attending the scene still do not know thewhereabouts of the hazardous materials in the building, which wouldaffect their strategy.

Various attempts have been made to provide a risk mapping system for usein crisis management that overcomes at least some of these difficulties.These systems largely comprise databases upon which there are storedblueprints or two-dimensional site plants of specific locations that maybe accessed by emergency personnel when required. In this way, theemergency personnel will have access to the drawings, if and when theyare needed.

There are, however, some disadvantages associated with these riskmapping systems. First of all, each of the drawings that may be viewedis a two-dimensional drawing. Although relatively simple to generate,these drawings are in many cases insufficient for the emergency servicesneeds. Two-dimensional drawings are, by their very nature, difficult tointerpret in a quick and efficient manner. In many instances, fireservice personnel will be directed through a building in which there isvery low visibility due to smoke and a third person with access to therisk mapping system will be directing them via radio contact. Theindividual issuing directions to the fire service personnel must be ableto easily interpret the drawings before them and give correct directionswithin a matter of moments. This is often impossible when viewing atwo-dimensional sitemap or blueprint. Any delay in providing directionscan have potentially disastrous consequences.

Another difficulty associated with two-dimensional risk mapping systemsis that they cannot give any indication of the relative height ofbuildings or objects stored in those buildings. This is often of greatimportance, in particular to the fire service personnel who may requirespecial equipment such as ladders, lengthier hose or additionalpersonnel when a building is above a certain height. This informationcannot be obtained from the present risk mapping systems in a quick andefficient way.

Another problem with the known types of risk mapping systems is that byhaving a two-dimensional plan of the building or other location, theemergency personnel will not be able to visualise the physicalappearance of a structure which can delay the response time in anemergency. A two-dimensional drawing will not give any indication as tothe external appearance of a structure and will thus cause emergencypersonnel to have to obtain more discrete identifiers of the particularlocations. Often, when an emergency distress call is made from anindustrial estate or refinery or the like, the response time can besignificantly reduced if the emergency personnel could identify thelocation of the emergency in a quicker manner.

One other problem that has been experienced by the emergency servicespersonnel with the existing risk mapping systems is that before enteringthe location of the emergency, it was difficult to quickly orientatethemselves once they had entered the building. This was mainly due tothe fact that the objects on a 2-D plan were not familiar to them oncethey had entered the building.

One further problem with the two-dimensional site plans and blueprintsis that these drawings are often cluttered with writing and unnecessaryinformation that is not needed by the emergency services and onlycluttered up the drawing and further inhibit the ability of emergencyservices personnel to interpret the drawings simply and quickly. Veryoften, symbols to indicate items within the building would change fromdrawing to drawing and due to the non-uniform nature of the drawings,the information provided by the drawings was difficult to decipher andcould not be fully relied upon.

Furthermore, there is at present no way of quickly accessing datarelating to buildings adjacent to the building in which there is anemergency. One of the lessons taught by Seveso is that it may in fact bean adjoining building that may cause the greatest risk. This too willhave some bearing on how the emergency is actually handled by theattending emergency services. Therefore, it is an object of the presentinvention to provide a risk mapping system that will overcome at leastsome of the problems mentioned above.

STATEMENTS OF INVENTION

According to the invention there is provided a risk mapping system foruse in crisis management comprising:

-   -   a database having a plurality of risk maps stored thereon;    -   hazard data associated with each risk map stored on the        database;    -   means to access the database and select a particular risk map        and associated hazard data;    -   means to display said selected risk map and associated hazard        data;    -   characterised in that a plurality of the risk maps stored in the        database are three-dimensional graphical representations of        specific locations and in which, for each location having a        three-dimensional risk map, there are provided a plurality of        three dimensional risk maps from different aspects of that        location.

By having such a risk mapping system emergency services dealing with acrisis will be able to display the relevant risk map and form a strategyfor handling the crisis based on the risk map and its associated hazarddata. Such information will enable them to be more thoroughly preparedwhen dealing with a crisis. By being able to display such a risk map andits associated hazard data, the emergency services will be able tosurvey the area in which the crisis is taking place and locate thepositions of various hazard data before arriving at the site inquestion. By knowing the positions of the various fire hydrants, valvesand the like, a crisis management strategy may be formulated in advanceof their arrival.

By having three-dimensional risk maps, it will be easier for the personviewing the map to visualise the actual area in which the emergency istaking place. In this way, the directions given to the emergencypersonnel on site will be more accurate and easier to determine than waspreviously possible with the known types of risk mapping systems. If theemergency personnel in attendance have access to the three dimensionalrisk maps, then they will have a clear picture of the layout of thestructure prior to entry into the structure and this may be used to planadvance routes to the most important areas in the location.

Furthermore, the three dimensional graphical representation will allowthe maximum amount of information to be transferred to the operator ofthe system in the shortest time possible. The time taken to transferthis information is of the utmost importance. Valuable time will not bewasted in the interpretation of a two dimensional blueprint, as a clearand easily decipherable graphical representation of a location isprovided. The three-dimensional risk maps will allow operators to becomefamiliar with the layout of the location within a matter of seconds andvaluable time will be saved during an emergency.

The physical appearance of a structure may also be ascertained quicklyfrom the three dimensional risk map which will further reduce delay inthe location of the site where the emergency is taking place. Onefurther advantage of having the three dimensional risk maps is that theperson viewing the risk map will be able to determine, at a glance,whether additional equipment, such as truck mounted ladders, will berequired. The system will allow emergency personnel to become familiarwith a particular area or location by running simulations of the scenein advance of having to attend an emergency situation at that location.

In another embodiment of the invention, the means to display theselected risk map and associated hazard data further comprises means toselect a particular three dimensional aspect view of a specific locationhaving a plurality of three dimensional risk maps. In this way, anoperator will be able to view a particular location, for example, abuilding, from a number of different aspects so that any informationcontained in the risk maps will not be overlooked by the operator. Firehydrants, emergency shut-off valves, and the like, that are obscuredfrom one particular aspect view, will be clearly visible in one or moreof the other aspect views. Furthermore, by having a number of differentaspect views, the operator will be allowed to orient the threedimensional risk map in the same orientation that the building is beingapproached by the emergency service personnel which will furtherfacilitate the operator giving directions to the emergency servicepersonnel.

In a further embodiment of the invention, there are additionallyprovided two dimensional risk maps of specific locations. By furtherhaving two dimensional risk maps of specific locations, directions by anoperator to emergency service personnel travelling by road may be given.Furthermore, an overall view of a location may be obtained from the twodimensional representation showing an entire site with a number ofdifferent buildings in view.

In one embodiment of the invention, for each specific location, there isprovided an internal view risk map and an external view risk map. Byhaving both internal and external view risk maps, not only may theemergency services personnel be directed through the interior of abuilding in a quick and efficient manner, they may also be able toascertain valuable information relating to the building from externalviews such as the height of the building and the physical appearance ofthe structure which may contain very important information that couldsave considerable time.

In one embodiment of the invention, the external view risk map furthercomprises hazard data relating to other locations within a predeterminedradius of the selected location. This is seen as particularly beneficialas any dangerous materials or hazardous contents of adjacent buildingswithin a predetermined radius will be indicated to the fire servicespersonnel or other emergency personnel that will be alerted to thedangers. As previously stated, the most serious dangers may often be inadjacent buildings and not the building in which the emergency is takingplace.

In another embodiment of the invention there is provided a risk mappingsystem, in which the hazard data associated with each risk map comprisesa hazard icon superimposed on the risk map. By representing hazard datawith hazard icons on the risk map the individual surveying the risk mapwill be able to obtain vital information with only a cursory inspectionof the map. For instance, the positions of fire hydrants or theexistence of dangerous substances can be ascertained in a matter ofmoments. Such a system will significantly speed up the time it will taketo interpret a risk map. Although the term hazard icon is usedthroughout the specification it must be understood that these hazardicons may represent emergency symbols such as those indicatingevacuation points, assembly areas and the like, fire symbols indicatinghydrants, hose reels and other such fire fighting equipment and hazardsymbols indicating the location of flammable substances or explosives.The term hazard icon has been used for convenience to identify any oneof emergency, fire or hazard symbols. Similarly hazard data may be datarelating to emergency, fire or hazard symbols.

In another embodiment still of the invention each hazard iconrepresenting hazard data may have further accessible data associatedtherewith. It may be desirable to have additional data associated withthe particular icon. For instance, if the hazard icon represents avolatile chemical, then it would be advantageous to have further dataidentifying the particular chemical and data relevant to the propertiesor handling requirements of that chemical.

In a further embodiment still of the invention there is provided a riskmapping system in which there are a plurality of different views of aparticular location. By having a number of different views of aparticular location the viewer will be able to see various objects thatwould otherwise normally be obscured if only one view were given.Furthermore, if a person not at the site is directing others at thesite, it would facilitate giving directions if the person givingdirections is able to have the same viewpoint as individuals that he isdirecting.

In one embodiment of the invention there is provided a default view ofeach location from a predetermined direction. For instance, eachlocation may be provided with a default view showing each location froma southerly direction. This will provide the viewer with a consistentstarting viewpoint.

In another embodiment still of the invention there is provided a riskmapping system in which there are a plurality of risk maps for each viewof a particular location taken from different distances. Such a systemwill allow the viewer to scroll inwards to and outwards from aparticular location. By zooming in and out the viewer can change from adistant overview of an area showing surrounding locations to a moredetailed view of that location. One of the outermost views may comprisea surrounding area map showing access routes to and from a particularlocation. There may also be provided a perimeter zone map detailing aperimeter at a predetermined distance around a desired location. It isfurther envisaged that there may be provided a neighbour area map inwhich nearby buildings are shown. Indeed, these maps may be combined sothat, for instance, a map showing a perimeter zone and all neighbouringbuildings may be provided. This perimeter zone may be at a set distance,for instance, two hundred metres. Preferably these maps are all linkedto the original selected risk map so that the viewer may switch from mapto map in an efficient and orderly manner. The perimeter zone mayindicate a blast radius, the blast radius being shown as an expandingred ‘ripple effect’ circle.

In another embodiment of the invention a neighbouring building havinghazardous materials therein are given a hazard icon. This is seen asparticularly useful as the greatest potential threat may be in abuilding adjoining a burning building. Such a system will make theviewer aware of any surrounding dangers.

In a particularly preferred embodiment of the Invention there isprovided an internal layout map of the building with hazard iconssuperimposed onto the internal layout maps linked to each risk map. Forbuildings having more than one floor there will preferably be providedan internal layout map for each floor. These internal layout maps areseen as highly beneficial as hazard data for the inside of the buildingcan be displayed and in particular the precise location of doorways,stairwells and fire fighting equipment is clearly shown. This willenable a person to either plan their own route in a building beforeentering or to direct others that may be in radio contact and alreadyinside the building towards a stairway or the like. This will often beinvaluable to enable fire fighters working in a low visibility smokefilled building to find their way around. It is envisaged that inmulti-storey buildings each floor may be selected at random orsequentially.

In one embodiment of the invention, the individual accessing the riskmap is diverted sequentially through a series of linked risk maps fromthe outermost view to the innermost view. By bringing the user from theoutermost view to the innermost view in a sequential manner the user isless likely to miss essential data contained in risk maps taken fromfurther away from the building that may not be contained in an internallayout map.

In a particularly preferred embodiment the specific location comprises abuilding such as a factory or warehouse. Alternatively the specificlocation may be a sailing vessel or other such site that may requireattendance of the emergency services from time to time. In oneembodiment each building or vessel on a risk map may be colour coded toindicate types of materials contained therein. By colour coded it willbe understood to include pattern coded or indeed identified by aparticular icon. The risk mapping system may be connected to ageographical information system (GIS). The risk mapping system may bealso connected to a Global Positioning System (GPS). This would enableemergency services, such as the fire service to utilise the benefits ofthe risk mapping system with their existing legacy GIS systems. Thiswould cause significant saving in time transferring similar data.Alternatively, the risk mapping system could be connected to otherdatabases containing information relating to chemicals and the like.Indeed, this information could be stored on the database of the riskmapping system itself. The system may also provide access to other mapsof 2D site plans, photographs or autocad drawings of a particular siteor building as well as company logos or local landmarks that may assistin navigation.

In one embodiment of the invention there is provided contact details forthe location, building or site in view. These contact details may be fora designated site safety officer or other relevant personnel.Photographs of these individuals may additionally be accessible throughthe system. Access thereto may be provided on the risk map itself.

In another particularly preferred embodiment of the invention, there isprovided a risk mapping system in which the risk maps and the associatedhazard data and the means to access and select a particular risk map andassociated hazard data are stored as a computer program. The computerprogram may be stored on a carrier signal or a record medium such as aCD ROM, DVD, floppy disk, or the like. It is envisaged that the databasemay be accessed over the internet or intranet.

In another embodiment of the invention, there is provided a threedimensional risk map for use with the risk mapping system.

In one embodiment of the invention, this three dimensional risk map isstored as a computer program. The computer program may be stored on acarrier signal or a record medium such as the CD ROM, DVD, floppy disk,or the like.

In a further embodiment of the invention a risk map may be divided upinto a plurality of smaller risk maps, this is seen as beneficial wherea site is large and sub-division into a number of smaller areas willallow better detail of the overall area to be shown. These may bereferenced using a grid reference system.

In another embodiment of the invention the means to display the risk mapis a personal computer. Alternatively the means to display the risk mapcomprises a laptop or a hand held palm pilot (Trademark) or similardevice. By having a laptop or hand held device the person viewing therisk map may be at the scene of the crises viewing the risk map on theportable device.

In a further embodiment of the invention there is provided a method ofgenerating a risk mapping system comprising the steps:

-   -   converting the architectural plans of a specific location into        computer readable format;    -   forming a 3-D schematic representation of the specific location;    -   collecting hazard data for the specific location;    -   generating hazard icons for each piece of hazard data and        further generating hazard control information associated with        each hazard icon;    -   superimposing the hazard icons generated from the hazard data of        the specific location onto the 3-D schematic representation of        the specific location;    -   storing said schematic representation with hazard icon        superimposed thereon in a database.

Such a method is seen as particularly efficient and cost-effective forgenerating a risk mapping system. Of course, it is understood that thehazard data collected for the specific location includes collecting andcollating hazard, fire and emergency data for the specific location andsurrounding site. The specific location could be a building, ship orother structure.

In another embodiment of the invention, the method further comprises thesteps of storing any further generated hazard control information in thedatabase. This further generated hazard control information couldcomprise the contact details of responsible persons in the particularbuilding or structure or further information relating to the types ofchemicals and the treatment methods for those chemicals.

In a further embodiment of the invention, the step of forming a threedimensional schematic representation of the specific location furthercomprises generating at least one internal view risk map and at leastone external view risk map. This is seen as particularly beneficial asthis will provide a more complete system for the emergency services thatwill enable them to obtain a complete visual image of the building orother structure prior to being on location.

In one embodiment of the invention, an internal view risk map isgenerated for each level in the specific location. This will provide acomplete risk mapping system that will provide emergency servicespersonnel with all the information necessary to handle the particularemergency.

In another embodiment of the invention, the method further comprisesforming a plurality of 3-D schematic representations of the specificlocation from a plurality of different aspect views of the location.Again, this will provide sufficient information relating to a specificlocation to the emergency services so that an emergency may be handledin a simple, quick and efficient manner. The emergency service personnelwill be able to access all of the data relating to a particularlocation.

In a further embodiment of the invention, the method further comprisesthe step of gathering contact details for individuals responsible forsafety of a specific location and storing the contact details of thatindividual in the database. By having the contact details always athand, coordination of an emergency is greatly facilitated.

In another embodiment of the invention the method includes the step ofprogramming links from the system to associated external databases suchas a Geographical Information System.

In another embodiment of the invention the method provides means toupdate hazard icons and provide new hazard icons with associated datatherewith.

DETAILED DESCRIPTION OF THE INVENTION

The invention will now be more clearly understood from the followingdescription of some embodiments thereof given by way of example onlywith reference to the accompanying drawings in which:—

FIG. 1 is a diagrammatic view of a network incorporating the system;

FIG. 2 is a screen shot showing a local area risk map;

FIG. 3 is the screen shot shown in FIG. 2 with display lists shown;

FIG. 4 is a screen shot of a site risk map;

FIG. 5 is a screen shot of a building risk map and surrounds within a 3Dsite risk map;

FIG. 6 is a screen shot of a building risk map with surroundingbuildings removed from view;

FIG. 7 is a screen shot showing the ground floor of the building shownin FIG. 6;

FIG. 8 is a screen shot showing the first floor of the building shown inFIG. 6; and

FIG. 9 is a screen shot showing the second floor of the building shownin FIG. 6.

Referring now to the drawings and initially to FIG. 1 thereof there isshown a risk mapping system for use in crisis management indicatedgenerally by the reference numeral 1, comprising a database 2 having aplurality of risk maps and hazard data associated with each risk mapstored thereon. The system further comprises means to access thedatabase and select a particular risk map and associated hazard data aswell as means to display the selected risk map and data, these areprovided individually by personal computers (PC) 3, laptops 4 and handheld devices 5. PC 3, laptop 4 and hand held device 5 are all connectedto database 2 by communication channels 6. Referring now to FIGS. 2 to 9inclusive, there are shown various screen shots showing two dimensionaland three dimensional risk maps, starting with a local area risk map ofLittle Island Industrial Estate in County Cork, Ireland with severaldifferent sites shown thereon (FIGS. 2 & 3) progressing through closer,more detailed views of a particular site from the local area risk map,in this case Interactive Chemicals site (FIGS. 4 & 5). Finally, threedimensional risk maps of a particular building from the chosen site, inthis case Process Building One, including internal view risk maps of thebuilding (FIGS. 6-9 inclusive) are shown. For reasons of clarity andunderstanding it is felt best to begin by describing the risk map shownin FIG. 4 of the drawings.

In FIG. 4 of the drawings there is shown a three dimensional risk map10, and in particular a site risk map, showing a typical layout of achemical plant incorporating several buildings 11. Hazard data isindicated in the form of hazard icons 12. Further hazard icons areindicated by the numerals 12 a, 12 b and 12 c. The hazard icons mayrepresent the location of fire hydrants, emergency exits, dangerouschemicals, toxic substances and the like. Hazard icons 12 a, 12 b and 12c are an emergency symbol indicating the location of an assembly area, afire symbol indicating the location of a fire hydrant and a hazardsymbol denoting the position of flammable material respectively. Variousfunctions are available to the user of the risk map to allow him tomanipulate the view of the risk map shown. A pan panel 13 allows theuser to manipulate the map up or down and from side to side in thescreen area by clicking on the arrows in the pan panel in the knownmanner should the operator wish to view parts of the map currently outof shot.

A view panel 14 is provided that may be operated in either zoom mode oraspect mode. When in zoom mode the user may zoom in and out of the imagedepending on the level of data required and in rotate mode the user isgiven the option of viewing the risk map in a northerly, southerly,easterly or westerly facing direction. The view panel 14 may be toggledbetween either zoom mode or rotate mode by clicking on the zoom button15 or the rotate button 16, depending on which mode the user wishes touse.

A tool panel 17 further allows the user to manipulate the data shown onthe risk map as well as accessing relevant data from legacy GeographicalInformation Systems (GIS) or other relevant data from database 2. Backbutton 18 will allow the user to return to the previous screen viewed.Emergency button 19, fire button 20 and hazard button 21 allow the userto toggle these icons that may be appearing on a risk map on or off,bringing the relevant icons in and out of view in the process. This maybe particularly advantageous as the risk map may be cleared of anyunnecessary information to prevent clutter and confusion.

Access to existing GIS and other data may be obtained by operatingcontact details button 22 and special note button 23. Contact detailsbutton 22 will cause the relevant details of security personnel for thesite or other relevant individual to be retrieved from memory anddisplayed on the screen. Special note button 23 may be used by theoperator to display information relevant to a hazard icon on the riskmap or the site itself including the toxic chemicals stored there, howto treat those toxic chemicals, the prevailing weather conditions, thefire plan of the plant and the like that may be necessary in any crisissituation.

Site list button 24 and building list button 25 are also connected to aGIS. Operation of the site list button will cause all sites in theparticular locality to be displayed allowing the user to select aparticular site of interest. If a site has already been selected then abuilding list may be displayed by depressing the building list button25. From this a particular building on a site may be selected. Thecurrent map being observed is shown in Route-list button 25 a. Finally,quit and print buttons 26 and 27 respectively are provided, their usebeing self-explanatory.

Referring now once again to FIGS. 2-9 inclusive of the drawings, likeparts are given the same reference numerals. In use, the operator willactivate the system which may offer access to a number of differentlocal area maps. The operator selects one such local area map from aselection in a pull down menu, in this case Little Island IndustrialEstate in County Cork, Ireland. The two dimensional local area risk map,as shown in FIG. 2, is displayed along with all major access roads 30and secondary roads 31 in the area. This is often very important asdirections may be being sent to the drivers of emergency vehicles enroute to the scene of the emergency by call centre personnel who may ormay not have knowledge of the area. Once a local area map is displayedthe user depresses the site list button 24, which causes a list of theregistered sites in that area to be displayed. A site list 28 ofregistered sites is shown in FIG. 3. The user may click on one of thesites, which is identified on the map by a flashing red dot. Anexpanding red ‘ripple effect’ circle (not shown) further highlights theselected site and denotes the blast radius. The user may then decide toclick on the highlighted site for a view of the actual three dimensionalsite risk map, as shown in FIG. 4. Alternatively, if the user isfamiliar with the whereabouts on the local area risk map of the site inquestion, he may click directly on that site in the known manner. Thiswill select the site and a further click on the site will bring up thesite risk map as shown in FIG. 4. If the user wishes to do so, he mayaccess the building list 29 directly from the site list 28 shown in FIG.3. By selecting a building from the building list 29 by clicking on thatbuilding the user will be taken immediately to a view of that building.Further options, such as internal views of buildings, may also beoffered.

Once the user has selected a site, the entire site is shown from adefault aspect, in this case a north facing aspect. If the operator sowishes he may view this site from a different aspect by toggling theview panel 14 to rotate mode by clicking on rotate button 16 andthereafter clicking on one of the aspect options in the view panel. Bylooking at the various aspects the user may view objects that may beobscured from view in other aspects.

The user may now select a building from the site chosen. This can bedone by clicking on one of the actual buildings itself or by clickingthe building list button 25. By clicking on the building list button 25a list of all the buildings on the site is shown to the user and he mayselect one from the list by clicking on that building name. This willadvance the user to the next screen, namely a three dimensional buildingrisk map showing the selected buildings and the nearby buildings. Thethree dimensional building risk map is shown in FIG. 5 of the drawings.In this case the user has requested Process Building One. This buildingalong with nearby buildings and hazard icons is brought on screen. Fromthis the user may determine whether the hazards other than those to beencountered in the selected building are present in the surroundingbuildings as this may affect the approach taken by the fire personnel.If the user requires further information on the hazards identified by ahazard icon 12, he may click on the hazard icon itself or alternativelyhe may click on the special note button 23. These will give furtherinformation on the hazards shown.

From the building hazard map the user may click on any of the buildingsto have a view of that building shown in isolation from the othersurrounding buildings. One such view is shown in FIG. 6 of the drawings.From this view various internal views of the building may be called frominternal view panel 33. By clicking on an appropriate floor button 34,the user may access an internal risk map view of that floor asdemonstrated in FIGS. 7-9 inclusive.

It can be seen from the drawings that other data such as water pipes 35and the like can be enlarged and shown at ground level which may be ofbenefit in fighting a blaze in a crisis situation. Again, as was thecase before, the hazard icons, emergency exit icons and the waterhydrant icons may be toggled on or off to avoid confusing the viewerwith clutter and to ensure that only the information requested by theviewer is displayed at any one time.

It has been found that in some instances obscured objects may bepartially revealed by cutting away a portion of a wall, for instance, orby giving the icon a different colour than its normal colour to indicatethat it is being viewed through a wall. This is particularlyadvantageous as important information is always visible.

Of course it will be understood that the communications channel may be adedicated cable, fixed line telephony link, mobile telephony link orradio communication link and the like and it is not restricted to apermanent link. The system could be accessed by a password protectedsite on the internet. Indeed, the system may be on an intranet of acompany for use in fire safety awareness among their personnel or on thefire department's databases in the regional headquarters.

It is seen as particularly efficient to have a mobile communicationslink to the device as a fire service officer may have access to the riskmaps when he is on site. It is normal fire service procedure to send adistrict officer to administer all the fire personnel when there hasbeen more than one fire truck sent to any incident. By allowing adistrict officer access to the risk maps he may direct operations basedon the information given to him in a much more efficient manner. Thiswould allow him to direct fire service personnel under his charge beforethey go into a building, or indeed if he is in radio contact with fireservice personnel inside a building he may be able to direct them oncethere are inside where visibility due to smoke may be low. Of coursethis could also be achieved directly from headquarters if they were inradio contact with the person on the scene. Alternatively, the system orpart thereof may be located in each fire truck.

It is envisaged that the risk maps of a particular area or site may bestored on disk and only accessed when necessary. For instance, adistrict officer may have a number of disks for his area ofresponsibility and he may choose only to use one disk at a time,depending on where the emergency is taking place. This may save on theactual storage requirements of the individual device that he iscarrying. Indeed, instead of a disk the risk maps could be stored incomputer readable format on a CD-Rom, DVD or any such device. It isenvisaged that the computer readable format could also be stored on acarrier signal. This carrier signal may be any transmissible carriersuch as an electrical, optical or radio signal, which may be conveyed byan electrical or optical cable or other means. Indeed, the carrier maybe constituted by such means. Due to the very nature of the invention itwill be understood that various parts of the system may be locatedremote from other parts of the system. By remote it is meant that notonly could the parts be physically separate but individual parts may belocated in other jurisdictions. For example the database having aplurality of risk maps thereon may be stored remote from the means toselect and means to display the selected risk map and vice versa. Thedatabase could in fact be located in one jurisdiction and accessed bythe means to select a particular risk map in another jurisdiction. Inthis way the database could be accessed over the internet or a privatenetwork.

The system may also be adapted to display 3D Risk Maps of variousaircraft, rail coaches, locomotives and other vehicles. New controlbuttons may be added to the system application to provide access tospecialised data found in aircraft, ships or other vehicles. Emergencydata such as the location of batteries, isolators, fuel valves, firesuppression systems such as Halogen Sprayers may be shown.

The application can be modified to allow emergency services personnel toaccess operational manuals, Standard Operating Procedure (SOP), and GoodManagement Procedure (GMP) documentation. Diagrams, schematics and otherinstructions could be made available through the system givinginformation on for example how to operate the fire control panel, turnoff machinery, open secured areas such as airlocks, watertight bulkheaddoors and the like. The system can also be used to call up emergencyservices training manuals and other related documentation. For example,data, on the correct equipment and attire for fighting an ammonia leakmay be obtained on request.

The system application can also contain an audio facility. This functionwould allow emergency services personnel to hear samples of alarms,claxons and other audio signals and messages that may be broadcast on asite. Each audio sample would be accompanied by a description, forexample, an ascending pulse tone=Evacuation. The audio instructionscould also comprise pre-recorded audio instructions for that specificsite.

It is envisaged that further advantages and uses may arise from theimplementation of the risk mapping system described. For instance, thesystem could be used by the emergency services for crowd management inand around stadiums, concerts and town centres and the like. The systemcould be used in the simulation of disaster scenarios, allowing theemergency services to visualise emergency situations, to familiarisethemselves with the layout of major sites and to prepare contingencyplans. The system could furthermore be put to use by the corporateindustrial sector. It is envisaged that access to particular companies3D risk maps may be made available via the internet or an intranet toassist in staff training and further planning and development decisionsfor a site. Graphics of internal processes and procedures of a sitecould be incorporated into the 3D risk map to allow management tovisualise activities in the site and to plan accordingly.

It is envisaged that various further features could be added to the riskmapping system to enhance the usefulness of the system. One such featurewould be a blackout icon. The blackout icon appears automatically on therisk map wherever there are areas that are subject to communicationsblackouts such as deep valleys, tunnels & other areas with poorreception. Clicking on the Blackout icon superimposes a semi transparentlayer over the maps, plans or three dimensional risk maps indicating theaffected areas. An additional text box also appears under the Blackouticon providing the user with additional information such as whichmethods of communications are affected, namely, radio, mobile phone orother such methods of communication.

Another additional feature is the electrical prohibition icon. Theelectrical prohibition icon appears automatically on screen whereverthere are areas on site where electronic devices liable to causeignition are prohibited. When clicked, the Electrical Prohibition toolsuperimposes a semi transparent layer over the plans, maps or threedimensional-risk maps indicating the affected areas. An additional textbox appears under the Electrical Prohibition icon providing the userwith additional information such as which type of electronic devices areprohibited.

Another still feature of the invention is the dangerous noise levelicon. The dangerous noise level icon appears automatically on screenwherever there are areas that are subject to loud noise that may damagehearing and/or make audio communications difficult. By clicking on theDangerous Noise Level icon a semi transparent layer is superimposed overthe maps, plans or three dimensional risk maps indicating the affectedareas. An additional text box also appears under the Dangerous NoiseLevel icon providing the user with additional information such asdecibel levels or ear protection requirements. As loud noise may disruptaudio communications the Blackout icon may also appear in dangerousnoise level areas.

One feature of particular benefit is the recorder feature. The recorderis activated automatically once the user accesses the risk mappingsystem by entering a valid password. The Recorder saves a digital recordof the date, start time, operational duration and which functions theuser accessed while the system was in use, into a password encryptedfolder on the PC hard drive. This digital recording can be accessed byan authorised person and used in evidence in subsequent legal actions,coroners court cases, insurance claims, internal and public enquiriesand as a valuable source of real-time information for post incidentanalysis, response analysis and pre-fire planning & training. TheRecorder is deactivated once the system is switched off.

The system may also have a stopwatch feature which is activatedautomatically once the user accesses the system by entering a validpassword. The stopwatch function keeps a record of the date & timeduring which the systems application is active. This information, savedby the system Recorder will allow post-incident analysts to measureemergency services response times and the amount of time the system useraccessed elements of the risk mapping application. The stopwatch isdeactivated once the system is switched off.

A language tool may be provided to allow the user to select the languagethe system is to be displayed in. The selected language is shown on thetop toolbar as the national flag or the written name of the chosenlanguage. By clicking on the language icon a pull down menu of theavailable alternative languages appears. By selecting an availablelanguage from this pull down menu the user can then change the languagedisplayed by the system.

A scale measurement in meters may be shown on all maps, plans & threedimensional risk maps displayed on the maps viewed by an operator. Somethree dimensional risk maps shown in perspective are unsuited to thedisplay of absolute measures in which case an area on the threedimensional risk map is selected, for example a road, usually in theimmediate foreground, and an example horizontal distance is displayed.Similarly, a prominent building on the three dimensional risk map may beselected and a sample vertical height measurement is displayed on orbeside it. Scale measurements may also be shown on or beside individualbuildings or specific areas.

One particularly useful feature is the range tool. This allows the userto touch the touch-screen at any point on the three dimensional risk mapand drag a finger or stylus across the screen. The user may also berequired to hold down a range button while dragging their finger orstylus across the screen. The application draws a line from the initialcontact point to the point where the user breaks contact with thetouch-screen. Once contact is broken the range line remains displayed onscreen and a text box appears in the middle of the range line displayingthe line length in meters. Clicking on the range icon in the ControlPanel clears the range line & text from the screen. The range tool isdesigned to allow the user to measure distances on plans, maps or threedimensional risk maps, for example the user can determine the distancefrom a hydrant to a selected building thus helping the user to selectappropriate hose lengths, spray ranges and safe personnel/equipmentlocations.

Another available feature of the invention is the camera tool. Thecamera tool provides the user with access to a range of photographic orfilm images of the site. After selecting the Camera tool from theControl Panel, the user is provided with a pull down menu of availablecamera types including Still, Movie, CCTV, Satellite, Aerial & VehicleMounted. By clicking on these camera Icons the system displays theselected Camera icons in the correct position wherever they occur onmaps, plans or 3D risk maps. Each camera icon has a directional arrow,in the case of still images; or a directional scope, in the case of filmor movies, that indicates the direction that the associated photographor film was taken from. Clicking on a Camera icon opens the associatedphotograph or film in an on-screen window. Information such as the nameof the buildings in the photo, the date it was taken and the compassdirection it was taken from appears on the image. A Camera icon with aRed Dot in the top left hand corner indicates Infra Red capacity.

The camera tool provides additional visual information to the systemUser, helping to locate and identify buildings, tanks and the like, andassisting emergency services to orientate themselves on site. Using theCamera tool the system user can locate personnel from their descriptionsof prominent objects or buildings or inversely, direct personnel bydirecting them in reference to such photographed objects or buildings.

The camera blind-spot tool is an additional utility that can be accessedfrom any Camera icon displaying the ‘Blind-spot’ tab. By selecting the‘Blind-spqt’ tool the system user superimposes a Field of Vision Cone(FVC) onto the plan, map or three dimensional Site risk map, expandingfrom the location of the selected Camera showing the scope, angle andrange of that camera. The FVC can be made up of radiating segments ofdifferent colour that indicate the decreasing image quality of thecamera view as the range increases. Where a camera has multiple visionformats such as infrared, ultra violet and the like, the FVC can bealtered to show the range, angle and scope & blind spots of each visionformat. The blind-spot tool highlights areas within this FVC that cannotbe seen by the camera by displaying blindspot areas with a differentcolour or pattern. The ‘Blind-spot’ tool is designed to make the Camerauser aware of the limitations of CCTV and other Camera hardware and isof particular use to the Security services in, for example search orassault operations where a fugitive may be hiding in CCTV blindspots.

One particularly useful feature is the tracker tool. The TRACKER tool isa search engine and tracking system that allows the user to identify andlocate personnel, vehicles and specific items of equipment that may beavailable at an emergency scene in real time. Personnel, Vehicles anditems of Equipment fitted with a ‘tag’, such as a GPS transponder orradio tags, can be tracked by GPS, GIS, Radio Triangulation or similartracking systems. This ‘tag’ Information can be relayed to the systemvia satellite, phone; WAP, microwave, radio or other broadcastingsystem. As the system receives ‘tag’ information the Tracker toolautomatically appears flashing on screen. By clicking on the Trackertool, the system displays a pull down menu of the Tracked persons,vehicles or items detected. The user selects the required target, forexample, Fire Engine 5 and the appropriate icon representing thatvehicle is super-imposed on the map, plan or 3D risk map in positionaccording to the geographical information received from the GPS, RadioTriangulation or other tracking systems.

The user can click on any of these Tracker icons to access the Contactdatabase which provides access to a range of Information Cardscontaining data about the tagged person, vehicle or item of equipmentthat has been pre-programmed into the system and stored on the system.The contact database includes Information Cards such as PersonnelInformation Cards containing data such as Profession, Name, Rank,Contact Details, Photograph, Blood Type, and the like. VehicleInformation Cards contain data such as Vehicle Type, Base of Operations,Contact Details (radio call signs etc.) Crew Compliment, Water CarryingCapacity, Vehicle Range & On Board Equipment lists. Each VehicleInformation Card has an interactive three dimensional Model orphotograph of the vehicle. The interactive three dimensional VehicleModel/Photo tool allows the user to click on lockers and storage areaspulling down lists of the equipment stored therein. The user can clickon individual items of equipment from these lists to access EquipmentInformation Cards.

Equipment Information Cards containing photographs or three dimensionalEquipment Models and data such as ladder length, snorkel range,generator output, breathing gear, number & capacity of pumps and thelike can be accessed either from the Equipment button and subsequentpull-down menus or via the three dimensional Vehicle Model/Photographfrom the Vehicle Information Card.

Where the tagged Person, Vehicle or item of Equipment has the capacityto collate & send data, the system has means to receive this data anddisplay it on the appropriate Identity Card with a ‘LIVE FEED’ icon. Forexample, the on-board vehicle computer on Fire Engine 5 senses that Pump3 is working at 65% capacity & that it's on-board Fire Water Supply isat 34%. This information is broadcast by radio or other such method andreceived by the system. The system user activates the Tracker tool fromthe control panel and selects Fire Engine 5 by clicking on theappropriate on-screen Icon. This opens the Vehicle Identity Card forFire Engine 5 that displays the relayed sensor information in the ‘LIVEDATA’ Panel.

If a vehicle is equipped with on-board cameras, the visual informationfrom those cameras can be broadcast from the vehicle via GIS, GPS, Radioor other such way. The system has means to receive this information andidentify the source. A ‘Camera’ icon appears on the three dimensionalVehicle Model/Photograph on the Vehicle Identity Card. The system usercan click on that Camera icon to open an on-screen window displaying theview from that on-board camera.

Another available feature of the system is the contact tool. The contacttool provides access to a database containing a range of informationsuch as on site Security, Medical and Emergency Response Teams orEmergency Services Vehicles, Personnel and Equipment.

By selecting the required category a ‘family tree’ hierarchicalstructure showing the names and position of each relevant person on sitesuch as an Emergency Response Team (ERT) member on the premises appears.The User can click on each of these nametags to open the Identity Cardpage. The Identity Card includes the name, ERT role, age, contactaddress on-site and numbers including phone, mobile, pager, email, andthe like, a photo of the staff member, key holder status, disabilities,years at site, qualifications, key experience & Security ClearanceLevel, blood type & languages. The designated emergency assemblylocation for each ERT member is shown either as text or by showing theappropriate location reference number on the ID card. The system usercan click on the designated location icon to highlight that location onthe three dimensional Site risk map. Each I.D Card has a print button.The ‘Contacted’ and ‘ON SITE’ check boxes can be clicked on screen,helping the user to avoid unnecessary repeat contact attempts. If thecomputer running the system has phone, internet or other communicationssystems the user can click on elements such as email or mobile phone,from the Identity Card, automatically accessing the communicationshardware on the computer to contact the person in question.

Another feature of the system is the ability of the system to receivesignals from alarm or other sensor systems within a site, building orship such as smoke alarms, heat sensors, intruder alarms or CCTV camerasdisplaying them as icons on screen. Each of these sensors is given anindividual identification code that is programmed into the threedimensional Site risk map.

This electronic signal can be transmitted directly to the system orrelayed from a central site security/safety control point and passed onto the emergency services. The system has means to read the incomingsignal code and displays the appropriate icon in the correct location onthe plan, map or three dimensional Site risk map. Download points areidentified by the Data icon. For example, Fire Alarm 034 is triggered inRoom 4, Second Floor of Process Building One, Interactive Chemicals. Thealarm signal is sent via the hard-wired or radio broadcast system to thecentral control unit at the Security Building. The safety or securityofficer relays the Information to the emergency services manually or itmay be sent automatically via email, radio or microwave. The signal isreceived by the emergency services where it is identified by the systemapplication and displayed as the appropriate flashing icon on screen.

The system is activated as described previously with the target siteshowing up as an expanding red circle. The specific alarm signal (i.e.Fire Alarm 034) is displayed within the red circle as a flashing icon.As each level of the 3D risk map is accessed on the system the triggeredammonia alarm remains flashing on screen at the correct locationenabling the emergency services to navigate directly to the correctalarm location.

The user may click on the flashing icon to access more detailedinformation, such as the alarm type i.e. Fire, with a recorded audiosample of the claxon sound associated with the triggered alarm, this maybe of particular benefit in complex sites where a multiplicity ofcomplex and uncommon sensors may be in operation. Signals from remotedevices such as CCTV cameras may be received and displayed on the systemas a window on the screen. On sites that have sensor networks but do nothave broadcast capability, the Emergency Services can plug the systeminto the sensor network at designated ‘Data Ports’ using Ethernet, LAN,short-range infra-red (line of sight) transmission devices and the like.The system automatically displays the Data Port icon on-screen'to showthe emergency services where they can plug into the on-site sensorsystems.

Some sites with sensor networks may have internet websites capable ofshowing the on-site sensor networks. The system can access thesewebsites via WAP mobile phones, FM receivers or other mobile web accessdevices. Live sensor data from sites can be downloaded from theirwebsites and displayed on three dimensional Site risk map on the system.The Sensor Input facility provides the system user with a high level ofemergency information at the earliest possible moment. For example, asystem equipped Fire Tender responding to the sample alert atInteractive Chemicals can determine what form of hazard they areresponding to, it's precise location on site and what ancillary hazardsthey should prepare for. A responding Emergency Services Unit using thesystem can utilise the transit time to prepare themselves, donappropriate equipment, devise their emergency strategy, order in furtheremergency services units and order local area evacuations.

Additional hazard icons on the risk maps may include hazardous buildingmaterials icons for asbestos, sandwich panels and the like. The systemautomatically displays a range of icons super-imposed onto the maps,plans or three dimensional Site risk maps on screen indicating wherepotentially hazardous building materials or structure types are in use.These icons may include the Fire Resistance time of the buildingmaterials according to official standards such as British Standard orFactory Mutual Insurance (L.P.C.B) written under each icon. By clickingon any of these Hazardous Building Material icons the user can bring upa Critical Time Calculator tool. This tool shows the Fire ResistanceTime of the building material, it provides a Fire Start Time that theuser can set and a Fire Temperature box (which can be linked to the sitesensors) if available or the user can enter an estimated temperaturemanually. By clicking ‘Calculate’ button the system displays theestimated structural failure time.

Another hazard icon that may be provided is the Salvage icon whichindicates where items of significant value that should be rescued arelocated. Salvage items may include cash, documents, artworks, data orvaluable materials. Where salvage items are stored in secure or fireresistant locations such as safes, the Fire Resistance Time is shown.Where salvage items are secured in locked areas such as safes a ‘Locked’icon appears on, below or beside the Salvage icon. The user may click onthis icon to open an information page providing information on how thearea or safe may be opened, such as the name & contact details of thekey holder. In the case of digital data a ‘download port’ icon will bedisplayed to show where data may be downloaded. By clicking on theDownload Port icon the user can access information on how the data maybe accessed including the type of connection required, estimated dataload, access codes etc.

Another useful tool is the deploy tool. The Deploy tool opens a menulisting the main emergency & security services (Fire Brigade, Police,Ambulance, on site ERTs). By selecting one of these groups the systemdisplays a panel containing icons representing the personnel, equipmentand vehicles common to that group. The user can drag any of these iconsfrom the panel and drop it onto the plans, maps or 3D Site risk maps.For example: The police, responding to a siege at a bank can use theDeploy tool to show where personnel such as snipers, assault units,ambulances etc. should be or are located. Explosives, weapons, hostiles,civilians & casualties can also be placed onto the plans, maps or threedimensional risk map according to best intelligence. The user can alsouse a STATUS tool from the Deploy panel to change the status, i.e.wounded, captured, dead, of any icon deployed on screen. Wherepersonnel; vehicles, equipment etc. that appear on the Deploy panel haveIdentity Cards stored on the Contact database the user can click on theon screen icon for that unit to access the appropriate Identity Card.The Deploy tool is designed to assist the user to visualise thesituation and best deploy resources.

Another useful tool is the evacuate tool. The Evacuate tool isessentially a panic button. When selected from the Tools panel the useris presented with a text panel asking “Are You Sure You Want ToEvacuate? YES/NO”. If the user selects ‘YES’, a large flashing‘Evacuate’ icon appears on screen. If the system terminal is connectedto other system or other visual systems by radio, microwave, phone,ethernet etc. the Evacuate warning is broadcast to them and itautomatically appears on those screens. An automated pre-recorded audio‘Evacuate’ warning can be broadcast to all emergency services personnelin range.

The systems Command & Control is a tool that empowers any remote systemterminal to become a master version of the application for use by theOfficer In Command (OIC) at any given emergency situation. By entering asecond level password into any system application, the O.I.C activatesthe Command & Control function. That specific system terminal becomesthe system Command & Control unit. Once the OIC has activated the systemCommand & Control function he/she is presented with the ‘COMMAND’ tool.The ‘COMMAND’ tool allows the OIC to over-ride subordinate terminalswithin range to ensure that all personnel are using the correct featuresof the system, to draw attention to selected hazards or facilities andbroadcast critical instructions such as ‘Evacuate’ to allemergency/security services on site. All subordinate terminals withinrange automatically display what the OIC is viewing on the systemCommand & Control terminal. Once the ‘COMMAND’ function has beendisengaged by the OIC all sub-ordinate system terminals can resumeindependent activity.

In multi-jurisdictional situations where the command structure maychange, for example: the Fire Brigade arrive and take control at thescene of a building fire. It becomes apparent that the fire is theresult of terrorist activity. At this point the security services becomethe superceding authority on site. In this situation each system Command& Control unit can broadcast a ‘Resign Authority’ request to all othersystem Command & Control units. The ‘Resign Authority’ request appearsautomatically on all system Command & Control terminals in range. If thereceiving OIC agrees to submit to the request he/she clicks the ‘AGREE’button on screen. This brings up a second level password panel, once acorrect password has been entered in this panel that terminal reverts tostandard system functions and may be controlled from the new systemCommand & Control terminal.

A text tool may also be provided in the system. When selected from theTool panel the Text tool brings up a text window on screen. The systemuser can write text messages by using a keyboard, number pad or otherscripting method. The user can then select a recipient from a pull downmenu that includes all terminals in range or other receivers and sendthem the text message. When a text message is sent to a terminal, thetext panel opens automatically on screen, showing the message andidentifying the sender. The Text tool also allows text messages to besent to recipients not directly available to the system by typing in therecipients phone numbers or email address.

The system may also be used in a training mode. Training mode is amodified version of the application for user training & testing.Training mode offers all the main tools of the working version plus aninteractive Question function that prompts the user to use theapplication to answer a wide range of questions relating to the threedimensional risk map. For example: The user may be prompted to “Clickall Toxic materials in Building 23”. The user is then presented with aselection of standard Hazard Icons. The user clicks on icons and ismarked according to the answers given and timed with the Stopwatch tool.In some cases the user may not be able to progress to the next Questionuntil the correct answers are given. The application compiles a finaltest score for the user. This can be printed for training records. AsTraining mode may be run on a standard desktop P.C with a keyboard someanswers may be entered in writing. Training mode helps the user todevelop an intimate knowledge of real three dimensional Risk Mappedsites, improves their ability to use the system to its full potentialand provides a verifiable training record. Training mode may also beused as an emergency-planning tool allowing the emergency services,security services or in house personnel to simulate disaster scenariosand devise appropriate response plans.

Another tool that may be provided is the flow tool. This tool can beselected from the Tool pull down menu. When selected the Flow toolsuperimposes flow arrows representing the direction & approximate numberof people that may take a designated route from an emergency situation.For example: Yellow indicates 1 to 20 people, blue 20-50, brownindicates 50-100, and so on. On sites where personnel have designatedassembly areas individual Flow arrows may be shown terminating at thecorrect Assembly area. The correct total number of persons due toassemble at designated assembly points is shown on assembly point iconsto help the emergency services to calculate evacuated personnel numbersand so identify the number of ‘lost’ persons. The Flow tool can be usedby the emergency services to plan their access & exit strategy to asite, taking into account the obstruction that may be caused by peopleevacuating an area. The Flow tool is also of use to on-site safetytraining personnel in planning evacuation procedures and for on-sitestaff to learn the correct evacuation route.

Flow arrows can also take into account variables in personnel flows suchas day or night shifts, peak arrival time (airports, train stations,public area rush hours). If variable flow data is available on thesystem, ‘sun’ & ‘moon’ icons representing shift periods or ‘Rush-hour’icons representing peak personnel traffic periods appear on the Flowtool buttons. When selected, these tool modifiers show the estimatedpersonnel flows appropriate to the time or shift. In circumstances wherepersonnel evacuating a location may be physically impaired orhandicapped, the flow arrows will flash on and off and iconsrepresenting ‘slow moving persons’ will appear on the flow arrows.

Another tool that may be provided is the dangerous inmates tool. Thistool can be selected from the Tool pull-down menu. When selected theDangerous Inmates tool superimposes icons onto the 3D Site risk mapsindicating the location of dangerous inmates. This is of particular usein emergencies involving prisoners or mental patients in prison,hospitals, and the like. The user may also click on Dangerous Inmateicons to open Personal Identity Cards. This function will provide theuser with detailed access to data about the dangerous patient inquestion, such as how the patent should be handled, supervisingoffice/doctor contact details. Where special access is required a‘Locked’ icon can be displayed on the Dangerous Inmate icon. Whenclicked this function allows the user to access data such as who the keyholder is, medication or security precautions required.

One useful feature of the system is the unmovable persons feature. Whenselected from the Tool pull-down menu this tool superimposes ‘UnmoveablePersons’ icons onto the three dimensional risk map. This tool isintended to alert emergency services personnel to the presence &location of persons who cannot be moved. The Unmoveable Persons tool isintended to represent persons such as critically ill patients who may beseriously harmed or killed if moved or disconnected from life support orother medical machinery. The user may also click on Unmoveable Personsicons to open Personal Identity Cards. This function will provide theuser with detailed access to data about the patient in question, such ashow the patient should be handled, supervising doctor/nurse's contactdetails etc. A green Medical cross may be displayed on UnmoveablePersons Icons if additional data such as ‘what equipment is needed tomove the inmate’ or ‘how long the patient can be disconnected frommedical appliances’ is available. This data may be of particular use toemergency services medics in the evacuation of hospitals.

Where special access is required a ‘Locked’ icon can be displayed on theUnmoveable Inmates icon. When clicked this function allows the user toaccess data such as who the key holder is and the medication required.When an Individual Unmoveable Persons icon is clicked on screen anevacuation arrow may appear on the three dimensional Site risk mapidentifying the designated evacuation route for that Unmoveable Person.Secondary evacuation routes may also be shown as an alternative arrow.

One feature that may be provided is the line of sight feature. Whenselected from the Tool pull-down menu the Line Of Sight tool allows theuser to touch the screen. The user can then drag his/her finger from theinitial contact point across the screen. The system displays a dottedred line from the initial contact point to the point where the userbreaks contact with the screen. The Line of Sight tool is designed toallow system users to identify points represented on a three dimensionalSite risk map from where either emergency/security services personnelcan see from or from where a hostile person may be able to targetemergency/security services personnel from. A ‘scope cone’ may also besuperimposed onto 3D Site risk maps indicating the range, angle ofelevation and scope of view from a given point on a map.

One particularly useful tool is the access/egress tool. When selectedfrom the Tool pull-down menu the Access/Egress tool superimposes iconson the three dimensional Site risk map indicating points of access to &from buildings such as doors, windows, accessible vents and chimneys. Anaccessibility rating code may be displayed on each. Access/Egress icon.These ratings inform the system user of the estimated strength of theaccess points (for example: a weak door may be rated ‘2’ whereas a heavysecurity door may be rated ‘12’), These accessibility ratings may relateto the estimated time it may take to break through an access point.Additional data such as ‘Cutting Gear Required’ may be displayed onaccess points. Access accessibility ratings may be applied to allpotential points of access/egress including doors, windows, vents andwalls. Access/Egress icons may also have a ‘Dimensions’ symboldisplayed. When clicked the Dimensions tool displays width & height dataon screen. This is of particular use in emergency situations where theemergency/security services may need to know the dimensions of doorways,corridors and windows. By clicking on Access/Egress icons, the systemcan also provide detailed information on keyholders (names of thekeyholder, contact details), password codes, lock types, time-lockinformation and connected alarm systems, for example.

Finally, the system may be provided with a search function. The Searchfunction will allow the user to pull down menus listing relevantemergency information contained in three dimensional Site risk mapsstored on the system. By selecting an item from the search menus forexample ‘Asbestos’, the system will display all asbestos hazards on thesite on screen. The Search menu can be divided into categories such as‘Hazardous Building Materials’ etc. from which more specific items suchas ‘Asbestos’ can be selected. Data selected from these menus is thendisplayed on the three dimensional Site risk map. The Search facility isdesigned to allow the system user to highlight specific hazards onscreen. The search function also provides a link facility that allowssystem users to access external software applications, databases, etc.such as Hazmat, HazChem etc. and visa versa.

One further important feature that will be understood is that the methodstep of converting the architectural plans of a specific location intocomputer readable format includes but is not limited to converting thearchitectural plans, photographs, sketches, elevation views, plans andfilms of the specific location into computer readable format. Any suchtype of data may be used to form the three dimensional schematicrepresentation.

It will be further understood that the invention, although primarilydesigned for use by the emergency services will also be of use to owneroccupiers or other occupants of particular locations. Insurance auditorsand environmental auditors could also obtain some benefit from thesystem described.

In the specification the terms “comprise, comprises, comprised andcomprising” or any variation thereof and the terms “include, includes,included and including” or any variation thereof are considered to betotally interchangeable and they should all be afforded the widestpossible interpretation.

The specification is not limited to the embodiments hereinbeforedescribed but may be varied in both construction and detail within thescope of these claims.

1. A risk mapping system for use in crisis management comprising adatabase having a plurality of risk maps stored thereon, hazard dataassociated with each risk map stored on the database, means to accessthe database and select a particular risk map and associated hazarddata, and means to display said selected risk map and associated hazarddata characterised in that: a plurality of the risk maps stored on thedatabase are three-dimensional graphical representations of specificlocations and in which, for each location having a three-dimensionalrisk map, there are provided a plurality of three dimensional risk mapsfrom different aspects of that location.
 2. The risk mapping system asclaimed in claim 1, in which the means to display the selected risk mapand associated hazard data further comprises means to select aparticular three dimensional aspect view of a specific location having aplurality of three dimensional risk maps.
 3. The risk mapping system asclaimed in claim 1, in which there are additionally provided twodimensional risk maps of specific locations.
 4. The risk mapping systemas claimed in claim 1, in which for each specific location, there isprovided an internal view risk map and an external view risk map.
 5. Therisk mapping system as claimed in claim 4, in which the external viewrisk map further comprises hazard data relating to other locationswithin a predetermined radius of the selected location.
 6. The riskmapping system as claimed in claim 1, in which the hazard dataassociated with each risk map comprises a hazard icon superimposed onthe risk map.
 7. The risk mapping system as claimed in claim 6, in whichthe hazard icon representing hazard data may have further accessibledata associated therewith.
 8. The risk mapping system as claimed inclaim 1, in which there are a plurality of risk maps for each aspectview of a particular location taken from different distances.
 9. Therisk mapping system as claimed in claim 1, in which there is provided asurrounding area map showing access routes linked to each risk map. 10.The risk mapping system as claimed claim 1, in which there is provided aperimeter zone map displaying a predetermined distance perimeter zonesurrounding a desired location linked to each risk map.
 11. The riskmapping system as claimed in claim 1, in which a neighbour area mapshowing nearby buildings is linked to each risk map.
 12. The riskmapping system as claimed in claim 11, in which a neighbouring buildingwhich stores hazardous materials is given a hazard icon.
 13. The riskmapping system as claimed in claim 4, in which there is provided aninternal view risk map for each floor of the particular location and inwhich each floor may be accessed one at a time.
 14. The risk mappingsystem as claimed in claim 4, in which the individual accessing the riskmap is diverted sequentially through a series of linked risk maps fromthe outermost view to the innermost view.
 15. The risk mapping system asclaimed in claim 1, in which the specific location comprises a building.16. The risk mapping system as claimed in claim 15, in which there isprovided contact details for each building shown in the risk map. 17.The risk mapping system as claimed in claim 1, in which the system islinked to an existing legacy G.I.S. system.
 18. The risk mapping systemas claimed in claim 1 in which the system is linked to a GlobalPositioning System (GPS).
 19. The risk mapping system as claimed inclaim 1 in which the database is located remote from the means to accessthe database and select a particular risk map and associated hazard dataand the means to display said selected risk map and associated hazarddata.
 20. The risk mapping system as claimed in claim 1 in which themeans to access the database and select a particular risk map andassociated hazard data and the means to display said selected risk mapare located remote from the database.
 21. The risk mapping system asclaimed in claim 1, in which individual buildings on risk maps may becolour coded to indicate types of materials contained therein.
 22. Therisk mapping system as claimed in claim 1, in which the risk maps andthe associated hazard data and the means to access and select aparticular risk map and associated hazard data are stored as a computerprogram.
 23. The risk mapping system as claimed in claim 22, in whichthe computer program is embodied on a record medium.
 24. The riskmapping system as claimed in claim 22, in which the computer program isembodied on a carrier signal.
 25. The three dimensional risk map for usewith the system of claim
 1. 26. The risk map as claimed in claim 25, inwhich the risk map is stored as a computer program.
 27. The risk map asclaimed in claim 26, in which the risk map is embodied on a recordmedium.
 28. The risk map as claimed in claim 26, in which the risk mapis embodied on a carrier signal.
 29. A method of generating a riskmapping system comprising the steps: converting the architectural plansof a specific location into computer readable format; forming a threedimensional schematic representation of the specific location;collecting hazard data for the specific location; generating hazardicons for each piece of hazard data and further generating hazardcontrol information associated with each hazard icon; superimposing thehazard icons generated for the hazard data of the specific location ontothe three dimensional schematic representation of the specific location;and storing said schematic representations with hazard iconssuperimposed thereon in a database.
 30. The method of generating a riskmapping system as claimed in claim 29 in which the method furthercomprises the steps of storing any further generated hazard controlinformation in the database.
 31. The method of generating a risk mappingsystem as claimed in claim 29 in which the step of forming a threedimensional schematic representation of the specific location furthercomprises generating at least one internal view risk map and at leastone external view risk map.
 32. The method of generating a risk mappingsystem as claimed in claim 31, in which an internal view risk map isgenerated for each level in the specific location.
 33. The method ofgenerating a risk mapping system as claimed in claim 29 in which themethod further comprises forming a plurality of three dimensionalschematic representations of the specific location from a plurality ofdifferent aspect views of the location.
 34. The method of generating arisk mapping system as claimed in claim 29 in which the method furthercomprises the step of gathering contact details for individualsresponsible for safety of a specific location and storing the contactdetails of that individual in the database.