SYSTEMS AND METHODS FOR ASSESING VULNERABILITY OF NON-LINE OF SIGHT TARGERTS
A computer-implemented system and method of determining the vulnerability of an asset includes determining an elevation surface surrounding an asset. A target point and aim point are selected on the asset and ballistic trajectories are determined for a particular projectile. A plurality of trajectory height surfaces that are rotationally symmetric about the asset and having a cross-section corresponding to the projectile trajectory for the selected range. A corrected elevation surface is generated for each range based on the trajectory height surface for the particular range. An observer view surface is generated from the plurality of corrected elevation surfaces, and is combined with the target visibility surface to generate the target vulnerability surface.
This disclosure concerns determining vulnerabilities of assets to rifle fire and other ballistics from geographic positions surrounding the assets.
BACKGROUNDSecurity of industrial and utility assets and infrastructure can be an important consideration in operation of such assets and infrastructure. There has been an effort to place fencing and earthen berms around many facilities with the intent of protecting the assets and personnel inside the facilities. However, the protection is typically only designed to shield sight lines within a short distance of the facility. Such obstructions are not optimal as long range rifles can be used to hit targets outside of the shooters sight line. With recently developed armor piercing ammunition, many of the otherwise protected assets are effectively within range. Thus a systems and methods for determining vulnerabilities from locations that do not have a line of sight to the target are desirable.
SUMMARY OF THE INVENTIONThe present disclosure concerns determining effective rifle sight lines for a geographic area surrounding assets and infrastructure. According to one aspect of the present disclosure, modifications to the elevation of surrounding terrain are made to account for bullet trajectory and drop. Thus, locations are identified in the surrounding area that do not have direct lines of sight, but can nevertheless serve as shooting location for a rifleman intent on hitting the asset.
A computer-implemented system and method of determining the vulnerability of an asset includes determining an elevation surface surrounding an asset. A target point and aim point are selected on the asset and ballistic trajectories are determined for a particular projectile over a plurality of isotropic bands at various ranges. A plurality of trajectory height surfaces are generated for the various ranges that are rotationally symmetric about the asset and having a cross-section corresponding to the projectile trajectory for the particular range. A corrected elevation surface is generated for each range based on the trajectory height surface for the particular range. An observer view surface is generated from the plurality of corrected elevation surfaces, and is combined with the target visibility surface to generate the target vulnerability surface.
In the accompanying drawings, structures and methods are illustrated that, together with the detailed description provided below, describe aspects of a system determining the vulnerability of assets to non-line of sight fire, and related methods. It will be noted that a single component may be implemented as multiple components or that multiple components may be implemented as a single component. The figures are not drawn to scale and the proportions of certain parts have been exaggerated for convenience of illustration. Further, in the accompanying drawings and description that follow, like parts are indicated throughout the drawings and written description with the same reference numerals, respectively.
With reference to
The evaluation of vulnerability of an asset 102 includes providing geographic data 110 including but not limited to elevation data of the geographic region of interest surround the asset 102. Asset data 112 includes the structure, dimensions, target and aim points, and other information concerning asset 102. Ballistic data 114 includes data concerning the specifications of the particular projectile. This can include a trajectory height function dependent on the distance traversed by the projectile. The geographic data 110, asset data 112, and ballistic data 114 can be stored on the CRM 108, such as in storage locations 116a, 116b, 116c, etc. Processor 106 can execute instructions 118 written on CRM 108, including those instructions described herein, to determine target vulnerability 120 and protective barrier placement 122 that would mitigate against potential vulnerabilities by blocking one or both of the shooter's ability to see the aim point or hit the target point with a projectile such as a rifle bullet.
With reference to
With reference to
The initial raster data is filtered by removing anomalies and noise due to, for example, conversion of raster data and incorrect surface elevations from power lines and other localized objects disposed within the surrounding region 402. A resulting filtered elevation surface 404 is generated from the filtered raster data, and can be used to evaluate asset 102 vulnerabilities as described herein.
With reference to
With reference to
With reference to
With reference to
With reference to
With reference to
With reference to
With reference to
In step 1314, a set of trajectory height surfaces 800 are generated, one each for a series of ranges from an inner range to an outer range. The trajectories used to form the trajectory surfaces 800 can be calculated from a curve fit polynomial as described herein, with boundary conditions that one end be at the target point 202 and the other at a predetermined elevation at a location disposed at the particular range. The trajectories are swept around the asset 102 so to form a rotationally symmetric surface 800 such that a cross-sectional view of the surface 800 along the radial direction exposes the trajectory used to form the surface 800. In step 1316, a set of corrected elevation surfaces 900 are determined, one for each of the selected ranges, using the trajectory surface 800 for the particular range. In step 1318, a set of observer point visibility surfaces are generated for each of the plurality of ranges. In step 1320, all of the visibility surfaces of the various ranges are combined to form the observer view surface 1002. In step 1322, the target visibility surface 600 and observer view surface 1002 are combined to form a target vulnerability surface 1100. In step 1324, the target visibility surface 600 is subtracted from the target vulnerability surface 1100 in order to illustrate the additional area 1200 from which a potential shooter can reach the target point 202.
The vulnerability analysis disclosed herein can be performed based on multiple targets in an area. Such an analysis could involve trajectory height surfaces radiating each of the target assets instead of a single target point. The methods disclosed herein can also be used to determine effective locations for visual and ballistic barriers.
The present teachings can be used to determine maximum distances from the asset 102 that could damage the asset 102 based on penetration angle, terminal energy and target shell material. Further, the present teachings can be implemented to determine the effective impact area based on maximum penetration angle of the projectile. The calculations performed herein can be extended to other target shapes, such as vertical, horizontal, and flat cylinders.
In the present disclosure, reference numerals followed by alphabetic indices refer to one of the illustrated elements, while use of the reference numeral without the alphabetic indices refer to one or more of the illustrated elements. For the purposes of this disclosure and unless otherwise specified, “a” or “an” means “one or more.” To the extent that the term “includes” or “including” is used in the specification or the claims, it is intended to be inclusive in a manner similar to the term “comprising” as that term is interpreted when employed as a transitional word in a claim. Furthermore, to the extent that the term “or” is employed (e.g., A or B) it is intended to mean “A or B or both.” When the applicants intend to indicate “only A or B but not both” then the term “only A or B but not both” will be employed. As used herein, “about” will be understood by persons of ordinary skill in the art and will vary to some extent depending upon the context in which it is used. If there are uses of the term which are not clear to persons of ordinary skill in the art, given the context in which it is used, “about” will mean up to plus or minus 10% of the particular term. From about A to B is intended to mean from about A to about B, where A and B are the specified values.
The description of various embodiments and the details of those embodiments is illustrative and is not intended to restrict or in any way limit the scope of the claimed invention to those embodiments and details. Additional advantages and modifications will be apparent to those skilled in the art. Therefore, the invention, in its broader aspects, is not limited to the specific details and illustrative examples shown and described. Accordingly, departures may be made from such details without departing from the spirit or scope of the applicant's claimed invention.
Claims
1. A computer-implemented method of determining the vulnerability of an asset, comprising:
- generating an elevation surface for a region surrounding an asset having elevations;
- determining a target point and aim point of the asset;
- determining ballistic trajectories for a plurality of distances from the asset to the target point;
- generating a plurality of trajectory height surfaces rotationally symmetric about the asset and having a cross-section with a first end at the target point and second end at the radially outer edge of the surface at a distance corresponding to one of the plurality of distances from the asset;
- generating a plurality corrected elevation surfaces by subtracting each of the trajectory height surfaces from a respective elevation surfaces; and,
- generating an observer view surface from the plurality of corrected elevation surfaces.
2. The method of claim 1, further comprising:
- determining a target visibility surface based on the elevation surface and the target point.
3. The method of claim 2, further comprising:
- determining a target vulnerability surface based on the target visibility surface and observer view surface.
4. The method of claim 2, further comprising:
- determining an aim visibility surface based on the elevation surface and aim point; and,
- comparing a surface area of the aim visibility surface and a surface area of the target visibility surface.
5. The method of claim 1, wherein the step of determining a target point and aim point of the asset includes selecting the highest visible point on the asset as the aim point.
6. The method of claim 1, wherein the step of determining a target point and aim point of the asset includes selecting the aim point at a location above the target point.
7. The method of claim 1, wherein the generating an observer view surface step includes selecting one of the plurality corrected elevation surfaces corresponding to one of the plurality of distances from the asset and determining whether locations at the one of the plurality of distances from the asset have an unobstructed line of sight to the target point over the selected one of the corrected elevation surfaces.
8. The method of claim 7, wherein the generating an observer view surface step includes, for each corrected elevation surface, determining whether locations at one of the plurality of distances from the asset have an unobstructed line of sight to the target point over the selected one of the corrected elevation surfaces.
9. The method of claim 1, wherein the determining ballistic trajectories step includes performing a curve fit calculation based on ballistic trajectory data to obtain a trajectory function, and calculating the trajectories based on the functions.
10. An article of manufacture comprising:
- a non-transient computer-readable medium including instructions thereon that upon execution by a processor: determine an elevation surface for a region surrounding an asset; determine a target point and aim point of the asset; determine ballistic trajectories for a plurality of distances from the asset to a target point on the asset; generate a trajectory height surfaces for each of a plurality of ranges having a radial distance from the asset, the trajectory height surfaces being rotationally symmetric about the asset and having a cross-section with a first end at the target point and second end at a ballistic firing point at an outer edge of the trajectory height surface; generate a corrected elevation surfaces for each of the ranges by subtracting each of the trajectory height surfaces for the particular range from a respective elevation surfaces; and, generate an observer view surface from the plurality of corrected elevation surfaces.
Type: Application
Filed: Feb 13, 2015
Publication Date: Dec 8, 2016
Inventor: Ronald A. Kupiec (Chagrin Falls, OH)
Application Number: 14/622,810