CA2181458A1 - Method and system for managing aircraft threat data - Google Patents

Method and system for managing aircraft threat data

Info

Publication number
CA2181458A1
CA2181458A1 CA002181458A CA2181458A CA2181458A1 CA 2181458 A1 CA2181458 A1 CA 2181458A1 CA 002181458 A CA002181458 A CA 002181458A CA 2181458 A CA2181458 A CA 2181458A CA 2181458 A1 CA2181458 A1 CA 2181458A1
Authority
CA
Canada
Prior art keywords
threat
data
region
adjacent regions
area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002181458A
Other languages
French (fr)
Inventor
David L. Deis
Robert M. Gjullin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honeywell Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2181458A1 publication Critical patent/CA2181458A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F41WEAPONS
    • F41GWEAPON SIGHTS; AIMING
    • F41G9/00Systems for controlling missiles or projectiles, not provided for elsewhere
    • F41G9/02Systems for controlling missiles or projectiles, not provided for elsewhere for bombing control
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F41WEAPONS
    • F41GWEAPON SIGHTS; AIMING
    • F41G9/00Systems for controlling missiles or projectiles, not provided for elsewhere
    • F41G9/002Systems for controlling missiles or projectiles, not provided for elsewhere for guiding a craft to a correct firing position
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01CMEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
    • G01C21/00Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
    • G01C21/005Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00 with correlation of navigation data from several sources, e.g. map or contour matching

Landscapes

  • Engineering & Computer Science (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • General Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Traffic Control Systems (AREA)
  • Radar Systems Or Details Thereof (AREA)
  • Position Fixing By Use Of Radio Waves (AREA)

Abstract

A method for calculating intervisibility data in advance of its use for permitting a real time update of threat information. Threat intervisibility data corresponding to an area comprised of adjacent regions is calculated and stored. A region of concern is centered in the adjacent regions. As the location of an aircraft changes, threats move from an adjacent region to the region of concern. However, since the intervisibility data was calculated when the threat first appeared in the adjacent region, it is now available for other functions without further processing. Such other functions include providing it to a threat avoidance algorithms or for display within the aircraft.

Description

?~ A, ~ JC~ f; ~ ,r~ 30;1~ 'J ~1~ 'J~ ?~

2181~58 ~ETHOD ~D S~fSTEM ~OR MANAG~G.~IRCRA~T ~RE.~r DATA
GOVER~T R:IG~TS
The United States Govemment ha~ rights Ul this i~lve~tion pursuant to Contract No. F~3600-88-G-5107, awarded by the Depar~ent of the Air Force.
BACKGROU~D OF r~ r~vEN~o~
Thi~ in~entio~ relates ger~erally to cs."~ -based systems for navigat~g a~raft and, more parucularly, to a system a~d method for detecting and responding to unanticipat~d threats ~o aircraft.
I~ ~lanning the rout~ of aIl aircraft's mission, known threats .such a~ hosile gro~md fire, ~ilitary bases, etc, are ~aJse~ into accow~t. The pla~ned route, which i5 storet i~ the aircraft s computer 3ystem, ~cludes a star~ing poi~t, a ~umber of ~termediate w~ypoint~ d ~n end~g point. The ~i~t~noe be~wcen each waypoint is mcasured i~ ~utical miles and is referred ~o a~c a le~. Thus a pl~nnecl routed consists of a ~umber of con~ectet le~s that 3ngle aroulld kT30WD threats ~o providc th~ sho~est and safcs~ route between the aircraft's stamng po~nt and its ultimatc mi_sioD desT~natio~
(endpo~n~). The route is plan~ed such that there is no Illnt~visibi~ " i e., the aircra~L
being ~et~ct~le by tbe threat.
However, the route pl~nnin~ must ~lso take into accouILt thc probl~m of ~chrea1sunknown at the t'me, which migh~ "pop up'' during the mission. When an unknown threat appears, steps must be taken to avoid detectio~ by the neW thre~t w~thcutcompromicino the miCcion~s objecuves.
In a prior approach, inteLvisibility data for all k~ow~ thre~s i~ precalculated and stored on disk me~ory. Th~s data is then embedded into telrain da~a ;e~m~?nt~ for display as part of a map on a display de~-ice ~rithin the aircraft This data ~s also used for threat avoidance, but musl ~e read i~to the threat avoidarlce procedure a~ the procedure is executed. Over~ll, this approach ts slow and inflex~ble. It re~uires new disks to be generated for each mi~ion a~d threat inter\~i~ibility le~cls to be predetermined. The i~teIvisibilit~. d~ta for a~y unknown threats ~hat pop up l~ust be c~lculated and stored for the eMire mission, limitin~ the number tha~ can be processed durln~ a g~en nlsslon.

E~ II E~ O~i _, - J~ ?~ 3:-S~ o,~ d'~ 'J ~

Sorne releva~lt prior ar~ retereDces are, EEE 1~84 National ~eroSpace a~d Electronicc Conference, vol. ~, ar~icle entitled, "Real-T~me ~r~n~Pmen~ of Strate~ic Pene~ator Mission~ ' by Dissanavake and Pe~as Jr., pub~ished ~Iay ~ S, 1584, which discloses a missi~ management system ~hich take~ into acc~olm~ known and unknownthre3~s and provides thrc3t avoitance i~form~tion. The mission m3~aeement svsteman~lyzes a pa~icle section of the terrain da~aba~e, a~d for tha~ area provides course alternati~es Sor the ~ircraft to a~oit d~tect~on.
Another reference is, the Irlternatiorlal So~iet~ for Opt~cal Engineers (SP~E).
~ol 1995. arTicle entitled7 ''Real-Time I~ ;b1i~y C~lc~la~ions for Ground-Based ~ad~r Systems," by ~ibbv, Love ~d Chou", publi3hed Ap;il lt-14, 199J, which discJoses me~n~ to e~h~nce the spe~d at which 1n~visibility, ~ ~le~ t;0~1S are performe~
f~r uoknowIl or "pop upl' grouTld based r~dar ~hreats. Whe~ a threat is identified, radar extensions ~e ~ ated which ex~end out.ward. .~ selec~ed set of 1ines ~re rhen chec~ed for interseceion with a subse~ of te~m elemencs.
The final refence is, the ~EE 1984 2~Tation~l Aerospace ~d Elec~onicc Confer~nce, ~ol. 1, article entitle~ "'ract~cal Flight Mz~ageme~t - Survivable Pene~ation," b~ Kupfcrer and Halski p~lblished o~ May ~ 5, 1~54, ~iscloses s~stem which c~nploy~ a terra~ database to enh~nr- airc.a~t surviva~ili~. ~Tsi~g a se-~tion of ~he terrain dat~b~P a~ ~alysis is ~a~e for airc.aft sur~,ivabilitv ba~ed on !~;nown ~nd detec~ed thr~ats.
A~ object of the inve~tion, ther~`ore, is to psovide ~ capabi]ity tO process a large nun~ber of threats for fu~c~iorls such as displ~y and threal avoidance. P.nocher object af the i~lvention is to allow l~pd~ting of Ihe ~ispla~, in real ~Le by ~lc~ tins~
and storing threat intervisibilitv data beforehand S~ nother objcct of the in~,ention is to improve the threat avoidance ~nctiorl bv ~ C Jl ~tin Q a~d stori~g irltervisibilit~
d~ for previou~ threats beforehand so that route cbanges can be de~nnined as soon as ~nt~iisibility data for any new, uslk~own threac is c~k~ ted. This ~llows for a f~ster response tO close ra~,~,e ur~own threats.

J ~,!t~ ~!

tS~ (?~ HE \ ~ h . ~ "~ t ~l3 ~3 ) ~

-3 21~1458 S~J~ARY OF TEiE I~ TION
The inven~on comprises a method and syste~ for m~n~o~ing aircraft threat data Cor threat avoidance to an airborne aircra*. ~V~ore pa~icularly, the method of the in~en~ion inc~udes stori~g in computer memon a number of data ~ ntS
representiDg adjacent region~s of an area, the area locarion ch~nginf~ as the ~ircraft rllo~fes frcm one location to another. What hlowrl a~d u~known threats within the adj~cent re~ions comprising the area ~re then determ~rLed ~`rom the segmcnts.
Imerv~sibili~ data ~or the threats detennincd to be withi~ the ~rea i5 calculated aIld swred. The met~od m~y fi~er include determir~ng a local regicn of conc~ c~nter-dwithin the adjacent re~ions. If a rhreat mo~es from an adjacent re~ion into this re8~on of concer~, the threat inte-r~isi~ility da~a is '~en provided for a ~umber of fi ncuons.
The~e other fi~ctions may include displayin~ ~he local reg~on of con~, includirlg the inter~isibili~y da~a for threat~ thereIn.
Along with the method is a sy3tern for m~n~ , aLrc~ thre~t da~. The Svstem irlcludes mea~s for stonn~ che d~u segment ~n c~mputer memcry, means for determ~ing from the segTn~ntC what known and unk~ou~ threa~s ale within the regions, ~nd mean~ for c~lctll~*n~g and stor~ng threat intervisibilily data for the thre3ts within the regio~s.
The fore~oing and oth~r objecs, rea~res, aIld advanta~es or the ill~enuorl will beco~e more ~ppare~t ~om ~e follov~ng de~ailed descrip~on of a pre~erred embodiment which plOCI~edS with refere~ce to the accompanying dr~ s.
BR~F Dl~SC~'r~O~- OF 1~; DR~ GS
~ IG. 1 is a pictorial view of an area for which data is c~lr~late~i in accordaIlce with ~e inven~ion.
FIG. 2 is stIuc~re chart of a system for rn ln~oin~ aircraft thre~t da~a in accordance with the invention.
FIG. 3 is a flow chart o~ a ~reat management process in accordance w~th the inven~on.

c~ S

. _ _, . _ _ . .................................................. . _ .

.

DE~TAILED DESCRIPTION OF .~ P~EFERRED E~ODl~ T
~ IG. I is a piclorial view cf a~ area ~ Through which ~n aircra~ I 0 on a mission must fly along i~c flight plan l 2. Within the ~riew are shown a number of l hreats T 1 througn T3, such as antia~rcraft batteries, radar 3ites ~d Ihe like. Each threat has an intervi~Lbility region that covers a re~ion ~hereiIl the threat would detect the aircraft ~ 0 ~f the ~;rcraft w~re t~ enter that re~ion. In sorne ca~es, the inte~.visibili~y r~ion which is aeDerlly circul r, IS limited by obstac~es such a~ m~unt~inC, tl~ced pl~rnrnt, etc., ~s in the case cf the thre~t r~.
ID the present ~ve~uon, uhe area 8 is represented i~ the aircraft's computer memory as anumber of data seg~ent(s (nine ~rl ~he preferred e~bodiment) representing adja~ellt regi~ s 14 of the area 8. ach da~a ~egm~t reprcsents a reDion OI` 185.~
squ~re kilsmeter3 in the prefe~ed embodiment, ~lthough other-si7ed re~iolls could be used if desired. The data wi~hin a d~a segment include~s data on ~e terr3~ o the region, threats kno~ to be i~ t~e re~1o~, and previoLlsly u~known threats recently detected. At the CerlleI of the ~rea 10 LS a ;egio~ l 6 cf conr~rn. Rcgion l 6 i5 a re~ion whose data is th~ fi~ hed for ather f~ln~tion~ such as displa~ o~ a display de~,ice in ~e ~cr~ or ~e for aY4id~r~c threats that fall or otbe~ise 3nove ~ region l 6 Ona such threat avoidance proccss is ~escribed ~r~ co-pending IJ-.S pa~ent ,~pplicaticn ~nhtie~i T~E.~T .~'O~(~E S`YSl~M ~1~ MTHOD FOR.~IRCR~FT, ~en~l ~o 08J182.892, filed J~nuary 18, l~g l, is hereby inc~p~ d bv reference.
FIG. 2 is a swc~re charr of a system 10 for m~n~a~na a~craft threa~ da~a ~
acc~rdance wil:h the ~~ l,o.l. The syste~ 0 includei at ils core ~ thre~t m~n~ernent proc~s ~Z, to ~e descsibed, which communicates with ~ nurrlber of modules. ~ lcno~
threa~ module 2~ provides threat paIame~nc dQta on know~ threats -,o the Froces each regio~ l 4. .~ ur~known threats r~odule 26 iden~fies a~d loc~te~s pr~viousl~/
unknown thre~ for the process ~". Process 22 comml3ni~atps the l~nown ~nd unl.cnown thre~t data to an intervisibili~ engine 28. The inter~i3ibility engine, in tum, c~1 culales the ~nter~,-isibility data ~or the new threat a~d trans~ers it into cache memory 30 via ~"lE;`!Ce~J SliE-T

?`~ t:~HE~ , 3 "~ ~o, ~ O~ I!J ~1'J ":~!J'J/I Ii,., 1~ J

-5 2181~58 process 2?. A terrain data module 29 commuI~icatesi other data about regions 16 to the process 22 such as the nab~e of the telTain. ~hat da~a is ct~mm-lnir~ted to ~he proce~ss depends orl wha~ region~ are adjacent to the a~rcratt on ~e flight plan. These re~ions are determ~ed by na~ tion~l insuuments on board the aircraflc. Other modules, ofc~urse, m~y be included. The modular data may a~so be rear~a~ged i~ equivale~lt ways LlSlllg other modules The process 1'~ park~s ~e appropr~ate dat~ into dala se~mer~t.s represent~ng adjacent regions 14 and co"~m~ icates ~e data sez~ne~ts ~ cache memorv 30 The ~ache memory 30, in ~rn, makes the dat~ a~ailable for the threat avoida~ce process 3", the display process J4 and possibly other fi~n~sinn~ J6. For cl~ty, kno~h~ data proc~ssing steps for takiIlg the ~a~a ~oln cache memory 30 ~Ld prcvidin~ it to fimctio~s 32~ 34 or 36 have bc~ omittet from the figure.
FIG. ~ is a flow chart illustrati~g the steps of a ~ f~l~d embodiment of the p~oc~s5 22 ror !n~n~ ~craft l:hreat data for threat avoida~ce. Initially the ~
data is fetched fo~ each adjace~t reg~on withi~ the area arQund ~he p~i t of in~rest (40).
The retched da~ is stored ~s da~a s~m~n~ in computer cache memorv 30 (42). Th~
spacial e~tent of each data seam~nt is then che~ed to dete~e if the space represented by the se~ment contaiD~ a ~hreat ~44~ the data ~e~mPnt does not contain a thre~, ~he~
a cheek is made to see ir the area around th~ point OI ~lt~st has ;han8ed ~ecau~e the aircraf'L has mo~,ed frorn one loca~on to another (46J. Ir ~e area is chaDgin~, additio~al data se~3rnents are fe~ched. If not, ~he process ~ai~s for a change.
If a data se~nent does cont~in a threat, the tbreat is ~hP~ed ~o se~ if il is a ~nown threat (SG). Data on kn~wn thr~ats is f~tc~ed (j'). If the threa~ is un~:nowT~ s ~ar~rc is first determined and then stored ~or filrlher refe~ence a~ a llow-known ~reat ~4) ~n eil~èr case, :he in~es~isibiiity fo~ the Lhrea~ is then c~lculated and stored i~
cache memo~y 30 (~6).
The threat i5 then ch~cked to see if it has en~ered the region o:f co~cem 16 (~
If no~ the process checks a~ain for a chan~e ~ loca~ion aIld W~ltS for a change ~ 46).

?~ J~ )o ~or~ o ~_ +~ '3 ~ (J~ r~ l/ 1~) -6- ~181458 Once it is determined that a threat has entered the reg~on of concern 16, the threat ~nter~isibility data is pacsed to t~e other functions (6~). These other i~ncLions include threat a~oidance 32 and displaying 34 the local region of co~cern including intervisibili~ data, and possibly other fimcuons 36.
The inv~ntion offers a ~umber of advamages of pnor approaches. It allows the a~rGraf~s i~tervisibiiity dispiay to be upda~ed in real umc since the irltes visibilit~ data has pre~;iously bee~ calculated (when the threat first entered an adjace~ region) before the data is displayed in the re~ion of co~cer~
The in~ ention also improYe~ the thre~t avoidancs fimc~on. If an ~ nowTl threa~
pops up ill the re~;on of conce~ chat threat's intervis~`oility data h~s prev~ausly becn c~lcul~ted and ca~l be used to repl~n ~he misslon imme~ tPlv.
This ~venuon has ~een de~cribed her~ considcrable de~ in order tO
compl~; with the Patent Statutes and to pro~ide those skilled in the art with the information needed tO apply t~e novel pnnciple~ d to cons~uct and use such specialized cGmr~r,P7ltc as are required. Howe~er, it is to be understood that the tio~ is not reg~cted lO the par~cular eJn~odi~e~l that h~s be~n described and il~ustrated, but ca~ be camed out by 3pecifiç~1ly different equipment and de~ic~" and th~ Yarious modifica~ons, both as to the ~uipr,ne~t details and operatiIlg procedures, ca~ be ac&omplished wi-hout depar~iDg ~rom the scope af the ~I~ven~on itsel~ Havins, i l.ustrated alld described the principles of the invent,on m a p efe.l~d embodiment, it ~hould be apparent ~ those skilled in the art tha~ the invention caIl be modi~
arran~ement and detail w'thout departing from such principles. For exampl~, Ceatures of the invention may be imIllen~ented ~n hardware or ~oftwar~.

r-3 SI~EcT

Claims (10)

-7-
1. A computerized method of managing aircraft threat data for threat avoidance to an airborne aircraft, comprising:
storing in computer memory (29) a number of data segments representing adjacent regions of an area, the area location changing as the aircraft moves from one location to another;
determining from the segments what known and unknown threats are within the adjacent regions comprising the area; and calculating and storing threat intervisibility data for the threats within the adjacent regions wherein intervisibility data represents the ability to be detected by a threat.
2. The method of claim 1 including:
determining a local region of concern centered within the adjacent regions of an area; and providing the threat intervisibility data for the threats within the adjacent regions for other functions whenever a threat moves from an adjacent region intothe region of concern.
3. The method of claim 2 wherein the other function comprise:
displaying the local region of concern on a display (34) in the aircraft, including intervisibility data; and updating the display (34) of the intervisibility data as a threat moves ino the region of concern.
4. The method of claim 2 wherein an other function comprises invoking a threat avoidance process when a threat moves from the adjacent region into theregion of concern.
5. The method of claim 1 including:

reading new data segments into memory representing new adjacent regions of a new area as the area location changes, each data segment representing a spacial extent;
determining from the spacial extent of each data segment what new known and unknown threats have entered the adjacent regions of the new area; and calculating and storing threat intervisibility data for the new threats within the adjacent regions.
6. A computerized system for managing aircraft threat data for threat avoidance to an airborne aircraft, comprising:
means (29) for storing in computer memory a number of data segments representing adjacent regions of an area, the area location changing as the aircraft moves from one location to another;
means (22) for determining from the segments what known and unknown threats are within the adjacent regions; and means (28) for calculating and storing threat intervisibility data for the threats within the adjacent regions wherein intervisibility data represents the ability to be detected by a threat.
7. The system of claim 6 including:
means (22) for determining a local region of concern centered within the adjacent regions of an area; and means (30) for providing the stored threat intervisibility data for the threats within the adjacent regions for other functions whenever the threat moves from an adjacent region into the region of concern.
8. The system of claim 7 including:
means (34) for displaying the local region of concern on a display in the aircraft, including intervisibility data; and means (22) for updating the display of the intervisibility data as a threat moves from the adjacent region into the region of concern.
9. The system of claim 7 including means (32) for invoking a threat avoidance process when a threat moves from the adjacent region into the region of concern.
10. The system of claim 6 including:
means (22) for storing into memory new data segments representing adjacent regions of a new area as the area location changes;
means (22) for determining from the new segments what new known and unknown threats have entered the adjacent regions of the new area; and means (28) for calculating and storing threat intervisibility data for the new threats within the adjacent regions of the new area.
CA002181458A 1994-01-18 1995-01-17 Method and system for managing aircraft threat data Abandoned CA2181458A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US18289394A 1994-01-18 1994-01-18
US08/182,893 1994-01-18

Publications (1)

Publication Number Publication Date
CA2181458A1 true CA2181458A1 (en) 1995-07-20

Family

ID=22670513

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002181458A Abandoned CA2181458A1 (en) 1994-01-18 1995-01-17 Method and system for managing aircraft threat data

Country Status (5)

Country Link
EP (1) EP0740773A1 (en)
JP (1) JPH09507713A (en)
CA (1) CA2181458A1 (en)
IL (1) IL112239A0 (en)
WO (1) WO1995019545A1 (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2749686B1 (en) * 1996-06-07 1998-09-11 Sextant Avionique METHOD FOR THE VEHICLE LATERAL AVOIDANCE OF A MOBILE AREA
FR2749650B1 (en) * 1996-06-07 1998-09-11 Sextant Avionique STEERING METHOD OF A VEHICLE WITH A VIEW TO MAKING A CHANGE IN COURSE AND APPLICATION OF THE METHOD FOR SIDE BYPASSING OF A ZONE
NL1003873C2 (en) * 1996-08-26 1998-03-03 Hollandse Signaalapparaten Bv Method for operating a fire control system.
US5992288A (en) * 1997-11-03 1999-11-30 Raytheon Company Knowledge based automatic threat evaluation and weapon assignment
AU7939900A (en) * 1999-11-02 2001-05-14 Roberto Roldan Prado Method to present the threat situation on a display
EP1242977A1 (en) * 1999-11-25 2002-09-25 Roberto Roldan Prado Method to present the threat situation on a display
US6718261B2 (en) * 2002-02-21 2004-04-06 Lockheed Martin Corporation Architecture for real-time maintenance of distributed mission plans
US7242407B2 (en) 2004-05-28 2007-07-10 Lockheed Martin Corporation Reprojecting map images using graphical techniques
US7492965B2 (en) 2004-05-28 2009-02-17 Lockheed Martin Corporation Multiple map image projecting and fusing
US7486840B2 (en) 2004-05-28 2009-02-03 Lockheed Martin Corporation Map image object connectivity
US7280897B2 (en) 2004-05-28 2007-10-09 Lockheed Martin Corporation Intervisibility determination
US7194353B1 (en) 2004-12-03 2007-03-20 Gestalt, Llc Method and system for route planning of aircraft using rule-based expert system and threat assessment
US7769502B2 (en) 2005-05-26 2010-08-03 Lockheed Martin Corporation Survivability/attack planning system
IN2014DN03130A (en) * 2012-02-16 2015-05-22 Saab Ab
SE1650700A1 (en) * 2016-05-23 2017-11-24 Saab Ab HMI controlled by combat situation
CN110260871A (en) * 2019-04-17 2019-09-20 太原理工大学 A kind of manoeuvre of forces environmental modeling method that facing area threatens
CN111968413B (en) * 2020-08-26 2021-09-24 成都民航空管科技发展有限公司 Flight plan synchronization method for regional control center and terminal area ATC system
JP2021047205A (en) * 2020-12-10 2021-03-25 Kddi株式会社 Determination device, determination method, and program

Also Published As

Publication number Publication date
WO1995019545A1 (en) 1995-07-20
EP0740773A1 (en) 1996-11-06
IL112239A0 (en) 1995-03-30
JPH09507713A (en) 1997-08-05

Similar Documents

Publication Publication Date Title
CA2181458A1 (en) Method and system for managing aircraft threat data
CA2573320C (en) Geospatial image change detecting system and associated methods
CA2573318C (en) Geospatial image change detecting system with environmental enhancement and associated methods
US20070162193A1 (en) Accuracy enhancing system for geospatial collection value of an image sensor aboard an airborne platform and associated methods
EP1806701A1 (en) Environmental condition detecting system using geospatial images and associated methods
CN109029422A (en) A kind of method and apparatus of the three-dimensional investigation map of multiple no-manned plane cooperation building
US7539605B2 (en) Geospatial modeling system providing simulated tree trunks for groups of tree crown vegitation points and related methods
Marsh et al. Eyes of the empire: A viewshed-based exploration of Wari site-placement decisions in the Sondondo Valley, Peru
US20180122331A1 (en) Method for overlaying an image arising from a sensor on a synthetic image by automatic detection of the limit of visibility and associated viewing system
JPH0262907A (en) Method of displaying visibility data
US20080316089A1 (en) Methods and systems for producing an interpretive airborne radar map
CN113448340B (en) Unmanned aerial vehicle path planning method and device, unmanned aerial vehicle and storage medium
Cahyanti et al. Whirlwind prediction using cloud movement patterns on satellite image
Sink Rethinking the Air Operations Center: Air Force Command and Control in Conventional War
Altmann et al. Verification and Conventional Arms Reductions
DE102012213336A1 (en) Method for addition of digital card around spot heights pre-designated on geographical positions of vehicle, involves assigning geodetic projection height, for representing size to geographical position in digital card
Reeves et al. Remembering Uncertainty: The World War II Warscape of the Australian Northern Territory
Cardillo Geospatial Intelligence Basic Doctrine (2018)
CN113532455B (en) Visual fusion positioning method and device, electronic equipment and readable storage medium
Cameron Remote sensing, geographic information systems, and operational research in urban operations
CN114491792B (en) Auxiliary decision-making method and system for multi-target attack task of airplane
Lang et al. Locational components of urban and regional public policy in postwar Vietnam: the case of Ho Chi Minh City (Saigon)
JP2024057934A (en) Drone operating position search system
Griggs An air mission planning algorithm for a theater level combat model
Sapaty Managing Security by Spatial Control of Moving Objects

Legal Events

Date Code Title Description
FZDE Discontinued
FZDE Discontinued

Effective date: 19990118