US20160356577A1 - Systems and methods for assesing vulnerability of non-line of sight targerts - Google Patents
Systems and methods for assesing vulnerability of non-line of sight targerts Download PDFInfo
- Publication number
- US20160356577A1 US20160356577A1 US14/622,810 US201514622810A US2016356577A1 US 20160356577 A1 US20160356577 A1 US 20160356577A1 US 201514622810 A US201514622810 A US 201514622810A US 2016356577 A1 US2016356577 A1 US 2016356577A1
- Authority
- US
- United States
- Prior art keywords
- asset
- target
- point
- elevation
- determining
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 18
- 238000010304 firing Methods 0.000 claims description 5
- 238000004364 calculation method Methods 0.000 claims description 3
- 230000001052 transient effect Effects 0.000 claims description 3
- 238000004519 manufacturing process Methods 0.000 claims 1
- 230000004888 barrier function Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000035515 penetration Effects 0.000 description 2
- 230000000903 blocking effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 239000004570 mortar (masonry) Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 239000011257 shell material Substances 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- 238000012038 vulnerability analysis Methods 0.000 description 1
Images
Classifications
-
- F—MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
- F41—WEAPONS
- F41H—ARMOUR; ARMOURED TURRETS; ARMOURED OR ARMED VEHICLES; MEANS OF ATTACK OR DEFENCE, e.g. CAMOUFLAGE, IN GENERAL
- F41H13/00—Means of attack or defence not otherwise provided for
-
- F—MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
- F41—WEAPONS
- F41H—ARMOUR; ARMOURED TURRETS; ARMOURED OR ARMED VEHICLES; MEANS OF ATTACK OR DEFENCE, e.g. CAMOUFLAGE, IN GENERAL
- F41H5/00—Armour; Armour plates
- F41H5/24—Armour; Armour plates for stationary use, e.g. fortifications ; Shelters; Guard Booths
Definitions
- This disclosure concerns determining vulnerabilities of assets to rifle fire and other ballistics from geographic positions surrounding the assets.
- the present disclosure concerns determining effective rifle sight lines for a geographic area surrounding assets and infrastructure. According to one aspect of the present disclosure, modifications to the elevation of surrounding terrain are made to account for bullet trajectory and drop. Thus, locations are identified in the surrounding area that do not have direct lines of sight, but can nevertheless serve as shooting location for a rifleman intent on hitting the asset.
- a computer-implemented system and method of determining the vulnerability of an asset includes determining an elevation surface surrounding an asset.
- a target point and aim point are selected on the asset and ballistic trajectories are determined for a particular projectile over a plurality of isotropic bands at various ranges.
- a plurality of trajectory height surfaces are generated for the various ranges that are rotationally symmetric about the asset and having a cross-section corresponding to the projectile trajectory for the particular range.
- a corrected elevation surface is generated for each range based on the trajectory height surface for the particular range.
- An observer view surface is generated from the plurality of corrected elevation surfaces, and is combined with the target visibility surface to generate the target vulnerability surface.
- FIG. 1 (“ FIG. 1 ”) illustrates a diagram of system 100 .
- FIG. 2 illustrates a subject asset 102 .
- FIGS. 3A-3E illustrate sight lines and trajectories for various obstructions 301 - 305 .
- FIG. 4 illustrates a filtered raster 400 .
- FIG. 5 illustrates an aim visibility surface 500 overlaid on elevation surface 404 .
- FIG. 6 illustrates a target visibility surface 600 overlaid on elevation surface 404 .
- FIG. 7 illustrates a comparison of aim visibility surface 500 and target visibility surface 600 .
- FIG. 8 illustrates a trajectory height surfaces 800 overlaid on elevation surface 404 .
- FIG. 9 illustrates a corrected elevation surface 900 .
- FIG. 10 illustrates observer view surface 1002 .
- FIG. 11 illustrates target vulnerability surface 1100 overlaid on elevation surface 404 .
- FIG. 12 illustrates target visibility surface 600 overlaid on target vulnerability surface 1100 .
- FIG. 13 illustrates a method 1300 for determining asset 102 vulnerability.
- a system 100 for evaluating the vulnerability of assets 102 includes a computing device 104 , which can be a general purpose computer or specialized computer, and can be portable, desktop or handheld.
- the computer includes a processor 106 and non-transient computer readable medium (CRM) 108 , which can include without limitation hard drives, random access memory, flash-based drives, caches, registers, optical drives, or other form of non-transient computer-readable media.
- CRM computer readable medium
- the evaluation of vulnerability of an asset 102 includes providing geographic data 110 including but not limited to elevation data of the geographic region of interest surround the asset 102 .
- Asset data 112 includes the structure, dimensions, target and aim points, and other information concerning asset 102 .
- Ballistic data 114 includes data concerning the specifications of the particular projectile. This can include a trajectory height function dependent on the distance traversed by the projectile.
- the geographic data 110 , asset data 112 , and ballistic data 114 can be stored on the CRM 108 , such as in storage locations 116 a , 116 b , 116 c , etc.
- Processor 106 can execute instructions 118 written on CRM 108 , including those instructions described herein, to determine target vulnerability 120 and protective barrier placement 122 that would mitigate against potential vulnerabilities by blocking one or both of the shooter's ability to see the aim point or hit the target point with a projectile such as a rifle bullet.
- asset 102 has a warning light 130 at its highest point, which is at a height of 24 meters above the ground surface 132 .
- the aim point 200 can be selected as the highest point of the particular asset 102 , which would be the minimum amount of the asset 102 that the potential shooter would be required to see in order to determine the position of the remainder of the asset 102 .
- the remainder of the asset 102 can be obstructed by the terrain between the potential shooter and the asset 102 .
- the selected target point 202 is 12 meters above the ground and is at the equatorial latitude of the tank.
- the asset 102 has a diameter of 20 meters.
- the illustrated target point 202 and aim point 200 are non-limiting and can be selected at any desired points on the asset 102 .
- the aim point 200 is preferably above the target point 202 , and as described further herein thresholds can be chosen under which further analysis for the selected target point 202 and aim points 200 is not necessary.
- Target points 402 can be chosen based upon factors including but not limited to known structural vulnerabilities of the asset, intelligence gathering, the likelihood of a non-failure mode strike by a projectile at the selected target point, and others.
- Aim points 200 can likewise be chosen at any reference point on the asset 102 , however, the amount of available terrain from which to view aim points 200 decreases as the selected aim point 200 moves further below the highest possible aim point 200 . Conversely, selecting the highest possible aim point 200 provides the maximum amount of possible terrain from which to view the selected aim point 200 .
- FIGS. 3A-3E illustrate sight lines and trajectories from a shooter firing and viewing from 1 meter above the ground to an asset 102 over different geographic obstructions 301 - 305 having different heights and shapes.
- the target point 202 is visible along direct sight line 310 , and so it is accessible to a shooter at that location.
- the target point 202 is not visible along direct sight line 310 , but the aim point 200 is visible along the indirect sight line 312 . In this case, a shooter can still hit the target point 202 as the projectile trajectory 314 is not impeded by obstruction 302 .
- the locations from which a shooter cannot view the target point 202 but can see the aim point 200 and can reach the target point 202 over intervening obstructions with the projectile trajectory 314 can be determined according to the present teachings.
- at least one of the trajectory 314 or the indirect sight line 312 are blocked by intervening obstructions 303 , 304 , 305 .
- a filtered raster 400 corresponding to a three dimensional elevation surface is created from detailed raster data.
- the initial detailed raster data is obtained from multiple Light Detection and Ranging (LIDAR) files, which can be simple ASCII files wherein each line includes a coordinate (x, y, z) wherein x and y are latitude and longitude and z is the altitude for the particular (x, y) coordinate.
- LIDAR Light Detection and Ranging
- Other forms of files including without limitation CAD files or GIS files, can include data that can be implemented according to the present teachings.
- the multiple LIDAR files each cover separate areas within the region 402 surrounding the asset 102 , which is disposed in the center of the surrounding region 402 .
- the depicted surrounding region 402 is circular with a radius of 5000 meters. Any data contained within the LIDAR files outside of the surrounding region 402 can be masked off and ignored.
- the initial raster data is filtered by removing anomalies and noise due to, for example, conversion of raster data and incorrect surface elevations from power lines and other localized objects disposed within the surrounding region 402 .
- a resulting filtered elevation surface 404 is generated from the filtered raster data, and can be used to evaluate asset 102 vulnerabilities as described herein.
- an aim visibility surface 500 is determined over the elevation surface 404 , representing the locations on the surface 404 from which an potential shooter firing and viewing from a height of 1 meter can see the aim point 200 of the asset 102 , which in the illustrated case corresponds to the surface elevation at the asset plus 24 meters.
- a location on the elevation surface 404 is part of the aim visibility surface 500 if a line from the aim point 200 of the asset 102 to a point 1 meter above the potential shooter's particular location on the elevation surface 404 is unobstructed. At such a location on the elevation surface 404 , the potential shooter will have an unobstructed line of sight to the aim point 200 .
- a target visibility surface 600 is determined over the elevation surface 404 , representing the locations on the surface 404 from which a potential shooter, again viewing from a height of 1 meter, can see the target point 202 of the asset 102 , which in the illustrated case corresponds to the surface elevation at the asset plus 12 meters.
- a location on the elevation surface 404 is part of the target visibility surface 600 if a line from the target point 202 of the asset 102 to a point 1 meter above the ground at the particular location on the elevation surface 404 is unobstructed. At such a location on the elevation surface 404 , the potential shooter will have an unobstructed line of sight to the target point 202 .
- a comparison of the aim visibility surface 500 and the target visibility surface 600 which in the illustrated case is overlaid on aim visibility surface 500 , exposes the locations 501 that are within the aim visibility surface 500 and not the target visibility surfaces 600 .
- a shooter at any of those locations has a line of sight to the aim point 200 but not the target point 202 , rendering those locations 501 potential candidates for trajectory-assisted firing upon the asset 102 .
- the shooter cannot see the target point 202 but can potentially reach the target point 202 with the benefit of the aim point 200 and a shot fired along the correct trajectory, which trajectory has boundary conditions satisfying the selection of the target point 202 and the elevation of the shooter's rifle and viewpoint.
- the locations 501 combined can be required to have a threshold amount of surface area such that below the threshold, no further determination of possible vulnerabilities according are desirable as the amount of risk is acceptably low.
- the potential locations for an obstructed shooter i.e. one that has view of the aim point 200 but not the target point 202 , are few enough that they do not add sufficiently substantial risk in addition to the risk posed from the target visibility surface 600 alone.
- Such a threshold can be predetermined at any desirable amount, including but not limited to 1 percent, 5 percent, 10 percent or 25 percent of the total surface area of the target visibility surface 600 .
- a set of trajectory height surfaces 800 are created. These surfaces 800 can be isotropic, and can correspond to the path of the projectile from a point on the outer edge of the ring to the target point 202 and swept one revolution about the target point 202 .
- One trajectory height surface 800 is generated for each of several circular rings surrounding the asset 102 , the rings starting at 500 meters radius and extending to 1900 meters, each ring 100 meters thick along the radial direction.
- FIG. 8 shows the 1900 meter trajectory height surface 800 overlaid on elevation surface 404 .
- a set of corrected elevation surfaces 900 is generated based on the set of trajectory height surfaces 800 .
- One corrected elevation surface 900 is generated for each trajectory height surface 800 , from 500 to 1900 meters, by subtracting the height of the trajectory height surface 800 from the corresponding base elevation of elevation surface 404 .
- a corrected region 902 can be seen in FIG. 9 , which again corresponds to the 1900 meters ring, in which the elevation has been corrected and appears darker than in elevation surface 404 . In that region 902 , the altitude of the terrain is lower than that found in surface 404 .
- the trajectory of the projectile can be obtained by determining projectile data, such as ballistic information including but not limited to the shape of the projectile, ballistic coefficient, projectile diameter, weight composition, and muzzle velocity.
- projectile data can be obtained from a variety of sources, including but not limited to modeling software.
- results from models can further be curve-fit in order to obtain a finite order polynomial with which to calculate the surfaces 800 .
- projectile trajectory was fit to a fifth order polynomial.
- the present teachings can be applied to a variety of rifle cartridges or to small arms such as rocket propelled grenades, infantry mortars, light cannon and indirect machine gun attacks.
- corrected altitude can be performed on a location by location basis, rather than in wide rings. In such an approach, trajectories are calculated incrementally for each position in the region, and the corrected altitude surface is generated for each individual position.
- an observer view is generated.
- the range for each observer view is one of fifteen 100 meter thick visibility rings surrounding the asset 102 , with the inner radius chosen as the coordinate for which the corresponding elevation is selected for the ring. Other points can be selected for the elevation calculation.
- the outer ring corresponds to the potential shooter's view for 1900 to 2000 meters and the inner ring corresponds to the view for 500 to 600 meters from the asset 102 .
- the highlighted portions within each ring correspond to the locations where an observer at the target point 202 can view the potential shooter viewing and firing from 1 meter elevation over the corrected elevation.
- the rings 1000 can be joined, for example by a logical OR function wherein a coordinate is part of an observer view surface 1002 if it is visible within its respective ring 1000 .
- the observer view surface 1002 can be combined with the target visibility surface 600 to create target vulnerability surface 1100 .
- Locations on the target vulnerability surface 1100 are locations where either the target point 202 is visible or the aim point 200 is visible and the target point 202 is reachable with a projectile shot along the correct trajectory.
- the target visibility surface 600 is overlaid on target vulnerability surface 1100 in order to illustrate the additional area 1200 from which a potential shooter can reach the target point 202 .
- This additional area corresponds to surface that is part of the target vulnerability surface 1100 but not the target visibility surface 600 .
- the increase in surface area over the target visibility surface 600 is 23 percent.
- the various surfaces referred to herein, such as the target vulnerability surface 1100 or target visibility surface 600 need not be contiguous, and can have one or more separate domains.
- a method 1300 for determining the vulnerability of an asset includes receiving high resolution elevation data for the asset and the surrounding area of interest in step 1302 .
- ballistic trajectory data is received, which data can be determined by simulations of projectile shots and subsequent curve fitting of the resulting data to a curve that can be used to describe the projectile's trajectory as a function of its position relative to the asset 102 .
- the position of the aim point 200 and target point 202 of the asset 102 are selected.
- an aim visibility surface 500 is created from the elevation map 404 .
- a target visibility surface 600 is created from the elevation map 404 .
- step 1312 the target visibility surface 600 is compared to the aim visibility surface 500 , for example to determine whether sufficient addition surface area is present in the aim visibility surface 500 over the target visibility surface 600 to justify continued analysis.
- step 1312 can be omitted and the other steps described herein can be performed without limitation.
- a set of trajectory height surfaces 800 are generated, one each for a series of ranges from an inner range to an outer range.
- the trajectories used to form the trajectory surfaces 800 can be calculated from a curve fit polynomial as described herein, with boundary conditions that one end be at the target point 202 and the other at a predetermined elevation at a location disposed at the particular range.
- the trajectories are swept around the asset 102 so to form a rotationally symmetric surface 800 such that a cross-sectional view of the surface 800 along the radial direction exposes the trajectory used to form the surface 800 .
- a set of corrected elevation surfaces 900 are determined, one for each of the selected ranges, using the trajectory surface 800 for the particular range.
- step 1318 a set of observer point visibility surfaces are generated for each of the plurality of ranges.
- step 1320 all of the visibility surfaces of the various ranges are combined to form the observer view surface 1002 .
- step 1322 the target visibility surface 600 and observer view surface 1002 are combined to form a target vulnerability surface 1100 .
- step 1324 the target visibility surface 600 is subtracted from the target vulnerability surface 1100 in order to illustrate the additional area 1200 from which a potential shooter can reach the target point 202 .
- the vulnerability analysis disclosed herein can be performed based on multiple targets in an area. Such an analysis could involve trajectory height surfaces radiating each of the target assets instead of a single target point.
- the methods disclosed herein can also be used to determine effective locations for visual and ballistic barriers.
- the present teachings can be used to determine maximum distances from the asset 102 that could damage the asset 102 based on penetration angle, terminal energy and target shell material. Further, the present teachings can be implemented to determine the effective impact area based on maximum penetration angle of the projectile. The calculations performed herein can be extended to other target shapes, such as vertical, horizontal, and flat cylinders.
- reference numerals followed by alphabetic indices refer to one of the illustrated elements, while use of the reference numeral without the alphabetic indices refer to one or more of the illustrated elements.
- “a” or “an” means “one or more.”
- the term “includes” or “including” is used in the specification or the claims, it is intended to be inclusive in a manner similar to the term “comprising” as that term is interpreted when employed as a transitional word in a claim.
Landscapes
- Engineering & Computer Science (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- General Engineering & Computer Science (AREA)
- Aiming, Guidance, Guns With A Light Source, Armor, Camouflage, And Targets (AREA)
Abstract
A computer-implemented system and method of determining the vulnerability of an asset includes determining an elevation surface surrounding an asset. A target point and aim point are selected on the asset and ballistic trajectories are determined for a particular projectile. A plurality of trajectory height surfaces that are rotationally symmetric about the asset and having a cross-section corresponding to the projectile trajectory for the selected range. A corrected elevation surface is generated for each range based on the trajectory height surface for the particular range. An observer view surface is generated from the plurality of corrected elevation surfaces, and is combined with the target visibility surface to generate the target vulnerability surface.
Description
- This disclosure concerns determining vulnerabilities of assets to rifle fire and other ballistics from geographic positions surrounding the assets.
- Security of industrial and utility assets and infrastructure can be an important consideration in operation of such assets and infrastructure. There has been an effort to place fencing and earthen berms around many facilities with the intent of protecting the assets and personnel inside the facilities. However, the protection is typically only designed to shield sight lines within a short distance of the facility. Such obstructions are not optimal as long range rifles can be used to hit targets outside of the shooters sight line. With recently developed armor piercing ammunition, many of the otherwise protected assets are effectively within range. Thus a systems and methods for determining vulnerabilities from locations that do not have a line of sight to the target are desirable.
- The present disclosure concerns determining effective rifle sight lines for a geographic area surrounding assets and infrastructure. According to one aspect of the present disclosure, modifications to the elevation of surrounding terrain are made to account for bullet trajectory and drop. Thus, locations are identified in the surrounding area that do not have direct lines of sight, but can nevertheless serve as shooting location for a rifleman intent on hitting the asset.
- A computer-implemented system and method of determining the vulnerability of an asset includes determining an elevation surface surrounding an asset. A target point and aim point are selected on the asset and ballistic trajectories are determined for a particular projectile over a plurality of isotropic bands at various ranges. A plurality of trajectory height surfaces are generated for the various ranges that are rotationally symmetric about the asset and having a cross-section corresponding to the projectile trajectory for the particular range. A corrected elevation surface is generated for each range based on the trajectory height surface for the particular range. An observer view surface is generated from the plurality of corrected elevation surfaces, and is combined with the target visibility surface to generate the target vulnerability surface.
- In the accompanying drawings, structures and methods are illustrated that, together with the detailed description provided below, describe aspects of a system determining the vulnerability of assets to non-line of sight fire, and related methods. It will be noted that a single component may be implemented as multiple components or that multiple components may be implemented as a single component. The figures are not drawn to scale and the proportions of certain parts have been exaggerated for convenience of illustration. Further, in the accompanying drawings and description that follow, like parts are indicated throughout the drawings and written description with the same reference numerals, respectively.
-
FIG. 1 (“FIG. 1 ”) illustrates a diagram ofsystem 100. -
FIG. 2 illustrates asubject asset 102. -
FIGS. 3A-3E illustrate sight lines and trajectories for various obstructions 301-305. -
FIG. 4 illustrates afiltered raster 400. -
FIG. 5 illustrates anaim visibility surface 500 overlaid onelevation surface 404. -
FIG. 6 illustrates atarget visibility surface 600 overlaid onelevation surface 404. -
FIG. 7 illustrates a comparison ofaim visibility surface 500 andtarget visibility surface 600. -
FIG. 8 illustrates atrajectory height surfaces 800 overlaid onelevation surface 404. -
FIG. 9 illustrates a corrected elevation surface 900. -
FIG. 10 illustratesobserver view surface 1002. -
FIG. 11 illustratestarget vulnerability surface 1100 overlaid onelevation surface 404. -
FIG. 12 illustratestarget visibility surface 600 overlaid ontarget vulnerability surface 1100. -
FIG. 13 illustrates amethod 1300 for determiningasset 102 vulnerability. - With reference to
FIG. 1 , asystem 100 for evaluating the vulnerability ofassets 102 includes acomputing device 104, which can be a general purpose computer or specialized computer, and can be portable, desktop or handheld. The computer includes aprocessor 106 and non-transient computer readable medium (CRM) 108, which can include without limitation hard drives, random access memory, flash-based drives, caches, registers, optical drives, or other form of non-transient computer-readable media. - The evaluation of vulnerability of an
asset 102 includes providinggeographic data 110 including but not limited to elevation data of the geographic region of interest surround theasset 102.Asset data 112 includes the structure, dimensions, target and aim points, and otherinformation concerning asset 102.Ballistic data 114 includes data concerning the specifications of the particular projectile. This can include a trajectory height function dependent on the distance traversed by the projectile. Thegeographic data 110,asset data 112, andballistic data 114 can be stored on theCRM 108, such as instorage locations Processor 106 can executeinstructions 118 written onCRM 108, including those instructions described herein, to determinetarget vulnerability 120 andprotective barrier placement 122 that would mitigate against potential vulnerabilities by blocking one or both of the shooter's ability to see the aim point or hit the target point with a projectile such as a rifle bullet. - With reference to
FIG. 2 ,asset 102 has awarning light 130 at its highest point, which is at a height of 24 meters above theground surface 132. In this case, theaim point 200 can be selected as the highest point of theparticular asset 102, which would be the minimum amount of theasset 102 that the potential shooter would be required to see in order to determine the position of the remainder of theasset 102. When a potential shooter is able to see only theaim point 200, the remainder of theasset 102 can be obstructed by the terrain between the potential shooter and theasset 102. The selectedtarget point 202 is 12 meters above the ground and is at the equatorial latitude of the tank. Theasset 102 has a diameter of 20 meters. The illustratedtarget point 202 andaim point 200 are non-limiting and can be selected at any desired points on theasset 102. Theaim point 200 is preferably above thetarget point 202, and as described further herein thresholds can be chosen under which further analysis for the selectedtarget point 202 andaim points 200 is not necessary.Target points 402 can be chosen based upon factors including but not limited to known structural vulnerabilities of the asset, intelligence gathering, the likelihood of a non-failure mode strike by a projectile at the selected target point, and others.Aim points 200 can likewise be chosen at any reference point on theasset 102, however, the amount of available terrain from which to viewaim points 200 decreases as theselected aim point 200 moves further below the highestpossible aim point 200. Conversely, selecting the highestpossible aim point 200 provides the maximum amount of possible terrain from which to view theselected aim point 200. -
FIGS. 3A-3E illustrate sight lines and trajectories from a shooter firing and viewing from 1 meter above the ground to anasset 102 over different geographic obstructions 301-305 having different heights and shapes. InFIG. 3A thetarget point 202 is visible alongdirect sight line 310, and so it is accessible to a shooter at that location. InFIG. 3B , thetarget point 202 is not visible alongdirect sight line 310, but theaim point 200 is visible along theindirect sight line 312. In this case, a shooter can still hit thetarget point 202 as theprojectile trajectory 314 is not impeded byobstruction 302. The locations from which a shooter cannot view thetarget point 202 but can see theaim point 200 and can reach thetarget point 202 over intervening obstructions with theprojectile trajectory 314 can be determined according to the present teachings. InFIGS. 3C through 3E , at least one of thetrajectory 314 or theindirect sight line 312 are blocked by interveningobstructions - With reference to
FIG. 4 , a filteredraster 400 corresponding to a three dimensional elevation surface is created from detailed raster data. The initial detailed raster data is obtained from multiple Light Detection and Ranging (LIDAR) files, which can be simple ASCII files wherein each line includes a coordinate (x, y, z) wherein x and y are latitude and longitude and z is the altitude for the particular (x, y) coordinate. Other forms of files, including without limitation CAD files or GIS files, can include data that can be implemented according to the present teachings. The multiple LIDAR files each cover separate areas within theregion 402 surrounding theasset 102, which is disposed in the center of thesurrounding region 402. The depictedsurrounding region 402 is circular with a radius of 5000 meters. Any data contained within the LIDAR files outside of thesurrounding region 402 can be masked off and ignored. - The initial raster data is filtered by removing anomalies and noise due to, for example, conversion of raster data and incorrect surface elevations from power lines and other localized objects disposed within the
surrounding region 402. A resulting filteredelevation surface 404 is generated from the filtered raster data, and can be used to evaluateasset 102 vulnerabilities as described herein. - With reference to
FIG. 5 , anaim visibility surface 500 is determined over theelevation surface 404, representing the locations on thesurface 404 from which an potential shooter firing and viewing from a height of 1 meter can see theaim point 200 of theasset 102, which in the illustrated case corresponds to the surface elevation at the asset plus 24 meters. A location on theelevation surface 404 is part of theaim visibility surface 500 if a line from theaim point 200 of theasset 102 to apoint 1 meter above the potential shooter's particular location on theelevation surface 404 is unobstructed. At such a location on theelevation surface 404, the potential shooter will have an unobstructed line of sight to theaim point 200. - With reference to
FIG. 6 , atarget visibility surface 600 is determined over theelevation surface 404, representing the locations on thesurface 404 from which a potential shooter, again viewing from a height of 1 meter, can see thetarget point 202 of theasset 102, which in the illustrated case corresponds to the surface elevation at the asset plus 12 meters. A location on theelevation surface 404 is part of thetarget visibility surface 600 if a line from thetarget point 202 of theasset 102 to apoint 1 meter above the ground at the particular location on theelevation surface 404 is unobstructed. At such a location on theelevation surface 404, the potential shooter will have an unobstructed line of sight to thetarget point 202. - With reference to
FIG. 7 , a comparison of theaim visibility surface 500 and thetarget visibility surface 600, which in the illustrated case is overlaid onaim visibility surface 500, exposes thelocations 501 that are within theaim visibility surface 500 and not the target visibility surfaces 600. A shooter at any of those locations has a line of sight to theaim point 200 but not thetarget point 202, rendering thoselocations 501 potential candidates for trajectory-assisted firing upon theasset 102. In thoselocations 501, the shooter cannot see thetarget point 202 but can potentially reach thetarget point 202 with the benefit of theaim point 200 and a shot fired along the correct trajectory, which trajectory has boundary conditions satisfying the selection of thetarget point 202 and the elevation of the shooter's rifle and viewpoint. Thelocations 501 combined can be required to have a threshold amount of surface area such that below the threshold, no further determination of possible vulnerabilities according are desirable as the amount of risk is acceptably low. In such a cases the potential locations for an obstructed shooter, i.e. one that has view of theaim point 200 but not thetarget point 202, are few enough that they do not add sufficiently substantial risk in addition to the risk posed from thetarget visibility surface 600 alone. Such a threshold can be predetermined at any desirable amount, including but not limited to 1 percent, 5 percent, 10 percent or 25 percent of the total surface area of thetarget visibility surface 600. - With reference to
FIG. 8 , several steps are performed in order to create a corrected elevation map for evaluating vulnerabilities. A set of trajectory height surfaces 800 are created. Thesesurfaces 800 can be isotropic, and can correspond to the path of the projectile from a point on the outer edge of the ring to thetarget point 202 and swept one revolution about thetarget point 202. Onetrajectory height surface 800 is generated for each of several circular rings surrounding theasset 102, the rings starting at 500 meters radius and extending to 1900 meters, eachring 100 meters thick along the radial direction.FIG. 8 shows the 1900 metertrajectory height surface 800 overlaid onelevation surface 404. - With reference to
FIG. 9 , a set of corrected elevation surfaces 900 is generated based on the set of trajectory height surfaces 800. One corrected elevation surface 900 is generated for eachtrajectory height surface 800, from 500 to 1900 meters, by subtracting the height of thetrajectory height surface 800 from the corresponding base elevation ofelevation surface 404. A correctedregion 902 can be seen inFIG. 9 , which again corresponds to the 1900 meters ring, in which the elevation has been corrected and appears darker than inelevation surface 404. In thatregion 902, the altitude of the terrain is lower than that found insurface 404. The trajectory of the projectile can be obtained by determining projectile data, such as ballistic information including but not limited to the shape of the projectile, ballistic coefficient, projectile diameter, weight composition, and muzzle velocity. Such data can be obtained from a variety of sources, including but not limited to modeling software. In addition, results from models can further be curve-fit in order to obtain a finite order polynomial with which to calculate thesurfaces 800. In the illustrated case, projectile trajectory was fit to a fifth order polynomial. It should be noted that the present teachings can be applied to a variety of rifle cartridges or to small arms such as rocket propelled grenades, infantry mortars, light cannon and indirect machine gun attacks. Further, corrected altitude can be performed on a location by location basis, rather than in wide rings. In such an approach, trajectories are calculated incrementally for each position in the region, and the corrected altitude surface is generated for each individual position. - With reference to
FIG. 10 , from each of the corrected elevations, an observer view is generated. The range for each observer view is one of fifteen 100 meter thick visibility rings surrounding theasset 102, with the inner radius chosen as the coordinate for which the corresponding elevation is selected for the ring. Other points can be selected for the elevation calculation. The outer ring corresponds to the potential shooter's view for 1900 to 2000 meters and the inner ring corresponds to the view for 500 to 600 meters from theasset 102. The highlighted portions within each ring correspond to the locations where an observer at thetarget point 202 can view the potential shooter viewing and firing from 1 meter elevation over the corrected elevation. Therings 1000 can be joined, for example by a logical OR function wherein a coordinate is part of anobserver view surface 1002 if it is visible within itsrespective ring 1000. - With reference to
FIG. 11 , theobserver view surface 1002 can be combined with thetarget visibility surface 600 to createtarget vulnerability surface 1100. Locations on thetarget vulnerability surface 1100 are locations where either thetarget point 202 is visible or theaim point 200 is visible and thetarget point 202 is reachable with a projectile shot along the correct trajectory. With reference toFIG. 12 , thetarget visibility surface 600 is overlaid ontarget vulnerability surface 1100 in order to illustrate theadditional area 1200 from which a potential shooter can reach thetarget point 202. This additional area corresponds to surface that is part of thetarget vulnerability surface 1100 but not thetarget visibility surface 600. In the current example, the increase in surface area over thetarget visibility surface 600 is 23 percent. It should be noted that the various surfaces referred to herein, such as thetarget vulnerability surface 1100 ortarget visibility surface 600, need not be contiguous, and can have one or more separate domains. - With reference to
FIG. 13 , amethod 1300 for determining the vulnerability of an asset includes receiving high resolution elevation data for the asset and the surrounding area of interest instep 1302. Instep 1304, ballistic trajectory data is received, which data can be determined by simulations of projectile shots and subsequent curve fitting of the resulting data to a curve that can be used to describe the projectile's trajectory as a function of its position relative to theasset 102. Instep 1306, the position of theaim point 200 andtarget point 202 of theasset 102 are selected. Instep 1308, anaim visibility surface 500 is created from theelevation map 404. Instep 1310, atarget visibility surface 600 is created from theelevation map 404. Instep 1312, thetarget visibility surface 600 is compared to theaim visibility surface 500, for example to determine whether sufficient addition surface area is present in theaim visibility surface 500 over thetarget visibility surface 600 to justify continued analysis. In one aspect of the present teachings,step 1312 can be omitted and the other steps described herein can be performed without limitation. - In
step 1314, a set of trajectory height surfaces 800 are generated, one each for a series of ranges from an inner range to an outer range. The trajectories used to form the trajectory surfaces 800 can be calculated from a curve fit polynomial as described herein, with boundary conditions that one end be at thetarget point 202 and the other at a predetermined elevation at a location disposed at the particular range. The trajectories are swept around theasset 102 so to form a rotationallysymmetric surface 800 such that a cross-sectional view of thesurface 800 along the radial direction exposes the trajectory used to form thesurface 800. Instep 1316, a set of corrected elevation surfaces 900 are determined, one for each of the selected ranges, using thetrajectory surface 800 for the particular range. Instep 1318, a set of observer point visibility surfaces are generated for each of the plurality of ranges. Instep 1320, all of the visibility surfaces of the various ranges are combined to form theobserver view surface 1002. Instep 1322, thetarget visibility surface 600 andobserver view surface 1002 are combined to form atarget vulnerability surface 1100. Instep 1324, thetarget visibility surface 600 is subtracted from thetarget vulnerability surface 1100 in order to illustrate theadditional area 1200 from which a potential shooter can reach thetarget point 202. - The vulnerability analysis disclosed herein can be performed based on multiple targets in an area. Such an analysis could involve trajectory height surfaces radiating each of the target assets instead of a single target point. The methods disclosed herein can also be used to determine effective locations for visual and ballistic barriers.
- The present teachings can be used to determine maximum distances from the
asset 102 that could damage theasset 102 based on penetration angle, terminal energy and target shell material. Further, the present teachings can be implemented to determine the effective impact area based on maximum penetration angle of the projectile. The calculations performed herein can be extended to other target shapes, such as vertical, horizontal, and flat cylinders. - In the present disclosure, reference numerals followed by alphabetic indices refer to one of the illustrated elements, while use of the reference numeral without the alphabetic indices refer to one or more of the illustrated elements. For the purposes of this disclosure and unless otherwise specified, “a” or “an” means “one or more.” To the extent that the term “includes” or “including” is used in the specification or the claims, it is intended to be inclusive in a manner similar to the term “comprising” as that term is interpreted when employed as a transitional word in a claim. Furthermore, to the extent that the term “or” is employed (e.g., A or B) it is intended to mean “A or B or both.” When the applicants intend to indicate “only A or B but not both” then the term “only A or B but not both” will be employed. As used herein, “about” will be understood by persons of ordinary skill in the art and will vary to some extent depending upon the context in which it is used. If there are uses of the term which are not clear to persons of ordinary skill in the art, given the context in which it is used, “about” will mean up to plus or minus 10% of the particular term. From about A to B is intended to mean from about A to about B, where A and B are the specified values.
- The description of various embodiments and the details of those embodiments is illustrative and is not intended to restrict or in any way limit the scope of the claimed invention to those embodiments and details. Additional advantages and modifications will be apparent to those skilled in the art. Therefore, the invention, in its broader aspects, is not limited to the specific details and illustrative examples shown and described. Accordingly, departures may be made from such details without departing from the spirit or scope of the applicant's claimed invention.
Claims (10)
1. A computer-implemented method of determining the vulnerability of an asset, comprising:
generating an elevation surface for a region surrounding an asset having elevations;
determining a target point and aim point of the asset;
determining ballistic trajectories for a plurality of distances from the asset to the target point;
generating a plurality of trajectory height surfaces rotationally symmetric about the asset and having a cross-section with a first end at the target point and second end at the radially outer edge of the surface at a distance corresponding to one of the plurality of distances from the asset;
generating a plurality corrected elevation surfaces by subtracting each of the trajectory height surfaces from a respective elevation surfaces; and,
generating an observer view surface from the plurality of corrected elevation surfaces.
2. The method of claim 1 , further comprising:
determining a target visibility surface based on the elevation surface and the target point.
3. The method of claim 2 , further comprising:
determining a target vulnerability surface based on the target visibility surface and observer view surface.
4. The method of claim 2 , further comprising:
determining an aim visibility surface based on the elevation surface and aim point; and,
comparing a surface area of the aim visibility surface and a surface area of the target visibility surface.
5. The method of claim 1 , wherein the step of determining a target point and aim point of the asset includes selecting the highest visible point on the asset as the aim point.
6. The method of claim 1 , wherein the step of determining a target point and aim point of the asset includes selecting the aim point at a location above the target point.
7. The method of claim 1 , wherein the generating an observer view surface step includes selecting one of the plurality corrected elevation surfaces corresponding to one of the plurality of distances from the asset and determining whether locations at the one of the plurality of distances from the asset have an unobstructed line of sight to the target point over the selected one of the corrected elevation surfaces.
8. The method of claim 7 , wherein the generating an observer view surface step includes, for each corrected elevation surface, determining whether locations at one of the plurality of distances from the asset have an unobstructed line of sight to the target point over the selected one of the corrected elevation surfaces.
9. The method of claim 1 , wherein the determining ballistic trajectories step includes performing a curve fit calculation based on ballistic trajectory data to obtain a trajectory function, and calculating the trajectories based on the functions.
10. An article of manufacture comprising:
a non-transient computer-readable medium including instructions thereon that upon execution by a processor:
determine an elevation surface for a region surrounding an asset;
determine a target point and aim point of the asset;
determine ballistic trajectories for a plurality of distances from the asset to a target point on the asset;
generate a trajectory height surfaces for each of a plurality of ranges having a radial distance from the asset, the trajectory height surfaces being rotationally symmetric about the asset and having a cross-section with a first end at the target point and second end at a ballistic firing point at an outer edge of the trajectory height surface;
generate a corrected elevation surfaces for each of the ranges by subtracting each of the trajectory height surfaces for the particular range from a respective elevation surfaces; and,
generate an observer view surface from the plurality of corrected elevation surfaces.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/622,810 US20160356577A1 (en) | 2014-02-13 | 2015-02-13 | Systems and methods for assesing vulnerability of non-line of sight targerts |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201461939294P | 2014-02-13 | 2014-02-13 | |
US14/622,810 US20160356577A1 (en) | 2014-02-13 | 2015-02-13 | Systems and methods for assesing vulnerability of non-line of sight targerts |
Publications (1)
Publication Number | Publication Date |
---|---|
US20160356577A1 true US20160356577A1 (en) | 2016-12-08 |
Family
ID=57451461
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/622,810 Abandoned US20160356577A1 (en) | 2014-02-13 | 2015-02-13 | Systems and methods for assesing vulnerability of non-line of sight targerts |
Country Status (1)
Country | Link |
---|---|
US (1) | US20160356577A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10288380B1 (en) * | 2018-07-30 | 2019-05-14 | Sig Sauer, Inc. | Energy transfer indicator |
US11473880B2 (en) * | 2018-06-13 | 2022-10-18 | Bae Systems Plc | Apparatus for a directed-energy weapon |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5153366A (en) * | 1988-12-23 | 1992-10-06 | Hughes Aircraft Company | Method for allocating and assigning defensive weapons against attacking weapons |
US5822713A (en) * | 1993-04-05 | 1998-10-13 | Contraves Usa | Guided fire control system |
US6467388B1 (en) * | 1998-07-31 | 2002-10-22 | Oerlikon Contraves Ag | Method for engaging at least one aerial target by means of a firing group, firing group of at least two firing units, and utilization of the firing group |
US20080052054A1 (en) * | 1999-12-03 | 2008-02-28 | Anthony Beverina | Method and apparatus for risk management |
US20080258880A1 (en) * | 2007-01-10 | 2008-10-23 | Smith Richard A | Information Collecting and Decision Making Via Tiered Information Network Systems |
US20100042269A1 (en) * | 2007-12-14 | 2010-02-18 | Kokkeby Kristen L | System and methods relating to autonomous tracking and surveillance |
US20110030538A1 (en) * | 2009-02-26 | 2011-02-10 | Ahrens Frederick A | Integrated airport domain awareness response system, system for ground-based transportable defense of airports against manpads, and methods |
US8179310B2 (en) * | 2006-02-02 | 2012-05-15 | Diehl Stiftung & Co., Kg | Method for sensing a threat |
-
2015
- 2015-02-13 US US14/622,810 patent/US20160356577A1/en not_active Abandoned
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5153366A (en) * | 1988-12-23 | 1992-10-06 | Hughes Aircraft Company | Method for allocating and assigning defensive weapons against attacking weapons |
US5822713A (en) * | 1993-04-05 | 1998-10-13 | Contraves Usa | Guided fire control system |
US6467388B1 (en) * | 1998-07-31 | 2002-10-22 | Oerlikon Contraves Ag | Method for engaging at least one aerial target by means of a firing group, firing group of at least two firing units, and utilization of the firing group |
US20080052054A1 (en) * | 1999-12-03 | 2008-02-28 | Anthony Beverina | Method and apparatus for risk management |
US8179310B2 (en) * | 2006-02-02 | 2012-05-15 | Diehl Stiftung & Co., Kg | Method for sensing a threat |
US20080258880A1 (en) * | 2007-01-10 | 2008-10-23 | Smith Richard A | Information Collecting and Decision Making Via Tiered Information Network Systems |
US20100042269A1 (en) * | 2007-12-14 | 2010-02-18 | Kokkeby Kristen L | System and methods relating to autonomous tracking and surveillance |
US20110030538A1 (en) * | 2009-02-26 | 2011-02-10 | Ahrens Frederick A | Integrated airport domain awareness response system, system for ground-based transportable defense of airports against manpads, and methods |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11473880B2 (en) * | 2018-06-13 | 2022-10-18 | Bae Systems Plc | Apparatus for a directed-energy weapon |
US10288380B1 (en) * | 2018-07-30 | 2019-05-14 | Sig Sauer, Inc. | Energy transfer indicator |
US10591255B2 (en) | 2018-07-30 | 2020-03-17 | Sig Sauer, Inc. | Energy transfer indicator in a digital reticle |
US10942008B2 (en) | 2018-07-30 | 2021-03-09 | Sig Sauer, Inc. | Energy transfer indicator in a digital reticle |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2830339C (en) | An active protection system | |
KR101840540B1 (en) | Method of Foe Threat Analysis and Visualization based Situation Map and System thereof | |
US7654185B1 (en) | System and method for defending against a projectile | |
CN102314537B (en) | Method for calculating damage probability of hedgehopping-and-upper-attacking smart ammunition | |
KR101119882B1 (en) | Apparatus for analyzing firing data and method for operating the same | |
CN115238226B (en) | Calculation method for air defense effective killing area | |
US20160356577A1 (en) | Systems and methods for assesing vulnerability of non-line of sight targerts | |
Racek et al. | Tracking, aiming, and hitting the UAV with ordinary assault rifle | |
Zhao | Conventional Counterforce Strike: An Option for Damage Limitation in Conflicts with Nuclear-Armed Adversaries? | |
CN114091255B (en) | Fire damage evaluation simulation method for indirect firing of warships and warships | |
KR102449953B1 (en) | Apparatus and method for correcting detection error of GIS-based artillery detection radar | |
KR102489645B1 (en) | Apparatus and Method for evaluating realtime Hit Probabilities to Antiair Target based on Shot Groups Proability Model | |
Sivilich et al. | Surveying, Statistics, and Spatial Mapping: KOCOA Landscape Analysis of Eighteenth-Century Artillery Placements at Monmouth Battlefield State Park, New Jersey | |
CN116797032A (en) | Method for evaluating damage efficiency of tank hit-loading class-A target | |
Jung et al. | Combat effectiveness and efficiency evaluation of firearm weapon systems in different projectile guidance simulations | |
ES2660587T3 (en) | Procedure for the classification of RAM-projectiles that approach flying | |
Baek et al. | A Methodology for the Zoning Danger Region in Small Arm Firing Range Using Aerial Photogrammetry with Drone | |
Leese | Siege Archaeology of the English Civil Wars: Establishing a methodology to unlock the archaeology of attack and defence at early modern siege sites | |
Kerkhoff et al. | The systemic error in the vertical component of handgun bullet trajectory reconstructions | |
Tong et al. | Research on time-on-target firing method of fixed loading ammunition for naval gun | |
Bergmann | Land 400 phase 3: Infantry fighting vehicle decision imminent | |
RU2784092C1 (en) | Method for active protection of the object from the side of the upper hemisphere from multiple uav attacks | |
Obradović et al. | Application of the modeling method to the calculation of the probability of hitting a stationary target during the fire action of a tank squad in defense | |
Dutta et al. | Modelling Effectiveness of Machine Gun Fire | |
Kwik | The Scope of an Autonomous Attack |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ABB TECHNOLOGY AG, SWITZERLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KUPIEC, RONALD A.;REEL/FRAME:035740/0063 Effective date: 20150306 |
|
AS | Assignment |
Owner name: ABB SCHWEIZ AG, SWITZERLAND Free format text: MERGER;ASSIGNOR:ABB TECHNOLOGY LTD.;REEL/FRAME:040621/0929 Effective date: 20160509 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |