WO2001039127A1 - Method to present the threat situation on a display - Google Patents

Method to present the threat situation on a display Download PDF

Info

Publication number
WO2001039127A1
WO2001039127A1 PCT/IB2000/001757 IB0001757W WO0139127A1 WO 2001039127 A1 WO2001039127 A1 WO 2001039127A1 IB 0001757 W IB0001757 W IB 0001757W WO 0139127 A1 WO0139127 A1 WO 0139127A1
Authority
WO
WIPO (PCT)
Prior art keywords
threat
circle
objects
seobj
situation
Prior art date
Application number
PCT/IB2000/001757
Other languages
French (fr)
Other versions
WO2001039127A9 (en
Inventor
Roberto Roldan Prado
Original Assignee
Roberto Roldan Prado
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from SE9904283A external-priority patent/SE9904283L/en
Application filed by Roberto Roldan Prado filed Critical Roberto Roldan Prado
Priority to CA002398914A priority Critical patent/CA2398914A1/en
Priority to NZ520097A priority patent/NZ520097A/en
Priority to AU17212/01A priority patent/AU780498B2/en
Priority to APAP/P/2002/002557A priority patent/AP2002002557A0/en
Priority to EP00979830A priority patent/EP1242977A1/en
Publication of WO2001039127A1 publication Critical patent/WO2001039127A1/en
Publication of WO2001039127A9 publication Critical patent/WO2001039127A9/en
Priority to SE0201569A priority patent/SE0201569L/en
Priority to HK03102168.9A priority patent/HK1051920A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T11/002D [Two Dimensional] image generation
    • G06T11/20Drawing from basic elements, e.g. lines or circles
    • G06T11/206Drawing of charts or graphs

Definitions

  • the present invention is intended to present the threat situation on a display.
  • the invention is intended to present civilian as well as military threats and others possible events to objects.
  • An object can be an aircraft, an air-defence gun, a ship, an obstacle, etc.
  • An example of a civilian threat is the risk for collision between aircraft.
  • An example of a military threat is the risk for impact with a missile.
  • An example of a military possible event is to get a sensor to lock on a target.
  • Yet another civil possible event is the risk for a ship to collide with other ships and the risk to run aground.
  • An unsophisticated way to present the situation of the threat is to reproduce the space with the first object situated at the origin in a system of polar co-ordinates, where the distance to the others objects are marked.
  • the threat in the shape of the range of the robots can be marked with circles around respective object.
  • Such presentation is, at least in complicated situations with several objects, difficult to rapidly estimate.
  • the invention is characterised by a common circle, called the threat circle, TC, for all the objects, in the general case called the circle of possible events, in relation to which all the threats are presented.
  • the threats tSF and tFS is marked with its own symbol located in the direction from the centre of the threat circle to the SeObj and / or the FiObj. The latter makes it possible to overlay the picture of the threat situation plane on the plane of location and in the same time presents the true location and the true threat situation of the different objects.
  • the threat circle, TC marks the boundary between the area inside the threat circle in which the threat exists and the area outside the threat circle in which the threat does not exist.
  • the distance of the threat symbol to the threat circle tells nothing about how close in time the threat symbol is from crossing the threat circle. This, however, is obtained from the radial dynamics of the threat symbol together with their position in the threat situation plane.
  • the invention makes it possible to easy present the uncertainty in forming judgement of the threat, witch normally is important to show.
  • uncertain facts E. g. in a military situation you do not know if the antagonist shall discover the firing of your robot and run away or continue on the same course. Also, you do not have complete information of the robotic ranges of the antagonist, perhaps even insecurity on the range of your own robot. Knowledge on the position and velocity of the antagonist can also be insufficient. All this insecurity and others can, fundamentally, be taken over into the radial range of the symbol in the threat situation plane.
  • the invention makes it possible to change the scale of the location plane and/or the scale of the threat situation plane. It is also possible to move the centre of the threat circle to a suitable position in the location plane and at the same time present the real positions and situations of the threat of the different objects.
  • the situation of the threat i.e. the radial distance of the threat symbol to the threat circle
  • tSF is computed as the quotient of the distance from FiObj to SeObj and the range of the missile of SeObj. A value of tSF less than one leads to a position of the threat symbol inside the threat circle, otherwise the position is outside.
  • tSF is computed as the difference of the distance between FiObj and SeObj and the range of the robot of SeObj. A value of tSF less than zero leads to a position of the threat symbol inside the threat circle, otherwise the position is outside.
  • tSF is computed as the time it takes for SeObj, with preserved velocity, to move the distance to FiObj minus the range of the robot of SeObj. If the range of the robot of SeObj is greater than the distance between FiObj and SeObj, the threat situation, tSF, is positioned inside the threat circle, otherwise the position is outside.
  • the analogous is valid for the threat situation, tFS, of the second object, SeObj, concerning the computation of the threat situation.
  • Fig. 1 shows a picture of the presentation of location
  • Fig. 2 shows a picture of the presentation of the threat situation
  • Fig. 3 shows the threat situation according to fig. 2 superposed (overlaid) on a picture of presentation of location
  • Fig. 4 shows a picture of the threat situation superposed on a picture of presentation of location with two first objects
  • Fig. 5 shows a picture of an one-sided threat situation to the second objects, SeObj, from the first objects, FiObj,
  • Fig. 6 shows a picture of the threat situation with insecurity in the threat
  • Fig. 7 shows a picture of the threat situation superposed on a picture of presentation of location with the second objects (SeObjl and SeObj2) close to and nearly at the same bearing, and finally
  • Fig. 8 shows another form of a representation of the threat situation with the second objects close to and nearly at the same bearing.
  • Fig. 1 shows a picture of the presentation of location that can be used together with the picture of the presentation of threat.
  • the current location of one first object, FiObj, and two seconds objects, SeObjl and SeObj2 are presented on a monitor, for example a tactic indicator.
  • a tactic indicator for example a tactic indicator.
  • Fig. 2 presents a situation where the threats (tFS, tSF) are located, in relation to the common threat circle, TC, in radial direction from the centre of the circle to each respective second object.
  • the threat, tS1F, to FiObj from SeObjl is marked with an unfilled ring in radial direction from the centre of the threat circle to SeObjl .
  • the threat, tFS1 , to SeObjl from FiObj is also marked, with a filled ring, in radial direction from the centre of the threat circle to SeObjl .
  • the circle tells us that the threat is imminent when the threat is inside the circle.
  • the object SeObj2 is a danger threat to the object FiObj, which is evident by the position of tS2F inside the threat circle.
  • Fig. 2 shows also that FiObj is inferior to SeObjl in the sense that tS1 F is more close to the area inside TC, in which the threat exist, than tFS1.
  • a threat can be represented e. g. as a ring in the equipment of presentation.
  • the threat can also be represented as a short line (bar). If you choose a bar instead of a ring to present the threat, you must decide on which end of the bar that indicates the threat position. In the case of rings as well as in the case of bars one may use different colours, for example blue for first threat situation, tSF, and red for second threat situation, tFS.
  • Fig. 3 shows that one may overlay fig. 1 and fig. 2 and at the same time represent both the true location and the threats for the different objects.
  • the threat has be represented for one first object, FiObj, and two second objects, (SeObjl , SeObj2).
  • Fig. 4 presents the threat, tS2F1 , to FiObl from SeObj2 and tF1S2 presents the threat to SeObj2 from FiObjl .
  • the threat to FiObj2 from SeObj2 is denoted by tS2F2 and the threat to SeObj2 from FiObj2 is denoted by tF2S2.
  • What restricts the number of objects is the fact that the display can be quite messy and difficult to interpret with many objects. It is, of course, possible to let a user choose which objects to display. After that the others are suppressed until new choices are made, after some time has passed or another simple criterion is fulfilled.
  • FiObj2 is located deliberately at long range from SeObjl in order to illustrate that its threat situation is not interesting and for that reason it is not necessary to be presented. It is evident from the figure that the threat, tF1 S2, to SeObj2 from FiObjl is imminent and that the same is valid for tS2F1. It is evident that SeObj2 is somewhat inferior to FiObjl in the sense that tS2F1 is more close to the area outside TC, where the threat does not exist, than tF1S2. It is also evident that FiObjl is somewhat inferior to SeObjl in the sense that tS1 F1 is more close to the area inside TC, where the threat exists, than tF1S1.
  • Fig. 4 shows two first objects where none of them are placed at the centre of the threat circle.
  • FiObjl or FiObj2 could have been selected to lie at the centre or the centre could be selected to lie in some kind of mean value between the objects.
  • FiObjl or FiObj2 could have been selected to lie at the centre or the centre could be selected to lie in some kind of mean value between the objects.
  • the equipment of presentation of threat can easily be designed so that relative transfer between the overlay pictures can be made.
  • Fig. 5 shows one-sided threat to second objects from first objects. It must be pointed out that there are two different scales in the same picture. One is the scale of the threat- situation plane and the other is the scale of the location plane of the objects. If, for example, in the threat situation plane 1 cm corresponds to 10 km then the threat, tF1S2, to SeObj2 from FiObjl is placed about 15 km inside the robot range of FiObjl . This is because the filled ring is placed about 1.5 cm from the threat circle inside it. In the plane of location 1 cm can, for example, corresponds to 5 km and consequently the distance between FiObjl and SeObj2 is about 40 km.
  • a short line is a suitable choose, where the length of the bar indicates the degree of insecurity.
  • the insecurity of the threat can then be presented as a bar in radial direction where the probability that the threat is inside the threat circle is proportional to the quotient between the length of the part of the bar inside the threat circle and the length of the whole bar.
  • the different lengths of the bars state the different degrees of insecurity.
  • equally long bars or rings are use meaning that the insecurity is either unknown or hidden.
  • the threat, tF1S2, to SeObj2 from FiObjl shows more insecurity than the threat, tS2F1 , to FiObjl from SeObj2 .
  • the threat tF1S2 overlaps somewhat the area inside the threat circle, which means that there is a little probability that FiObjl can impact SeObj2 when its missile is fired.
  • the threat for example the threat from a missile by its range
  • the threat is dependent of several factors like the flying altitude, the relative differences in altitude between aircraft, launch direction, etc.
  • the presentation is constantly changing with respect to the current threat distance, for example the range of the missile.
  • the presentation of the objects can be excellent as can be seen by the figures.
  • the type of object is given by the symbol, which also gives the speed and direction of the speed vector, etc.
  • Fig. 8 shows how one may, by relative removal of the two pictures, render the presentation more clear. If the centre of the threat circle moves near SeObjl and SeObj2, then the angle difference between the objects, as seen from the centre of the threat circle, is bigger and consequently threat bars are more separated in angle. In order to more easily estimate the radial position of the different threats symbols on the display in relation to the threat circle (TC), one or more concentric circles, with respect to the threat circle, can be placed on the display.
  • TC threat circle
  • the threat circle can, more generally, be called the event circle (TC). Inside the event circle it is assumed that possible events occur while outside it, possible events do not occur.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Radar Systems Or Details Thereof (AREA)
  • Devices Affording Protection Of Roads Or Walls For Sound Insulation (AREA)
  • Aiming, Guidance, Guns With A Light Source, Armor, Camouflage, And Targets (AREA)
  • Controls And Circuits For Display Device (AREA)

Abstract

Method to present on a display at least one threat (tSF, tFS) between at least one pair of objects, (FiObj, SeObj), characterized by that only one threat circle, TC, is presented on the screen for all the first objects, FiObj, and all the second objects, SeObj. The threats (tSF, tFS) are marked with symbols placed, in relation to the threat circle, in radial direction from the centre of the threat circle, TC, to respective second object, SeObj, and /or first object, FiObj. The threat circle marks the boundary between the area inside the threat circle in which the threat exists and the area outside the threat circle in which the threat does not exist. The radial distance of the threat symbol, to the threat circle, constitute a measure, in suitable threat scale (time, length, etc.), of closeness to this transition.

Description

Method to present the threat situation on a display
The present invention is intended to present the threat situation on a display. The invention is intended to present civilian as well as military threats and others possible events to objects. An object can be an aircraft, an air-defence gun, a ship, an obstacle, etc. An example of a civilian threat is the risk for collision between aircraft. An example of a military threat is the risk for impact with a missile. An example of a military possible event is to get a sensor to lock on a target. Yet another civil possible event is the risk for a ship to collide with other ships and the risk to run aground.
We shall look now an important case, the threat between the two objects in a pair. The objects are divided into pairs i.e. assuming N objects, where N is at least 2, then there are N * (N -1) 12 pairs. In a military combat situation we consider a specific pair where the first object is called, FiObj, and the second object SeObj. It is now interesting to know how to present the threat (tSF) to the first object (FiObj) from the second object (SeObj) and the threat (tFS) to the second object (SeObj) from the first object (FiObj). Important information is the position in space of the object, their performance (speed and so on) and the range of their weapons and so on.
An unsophisticated way to present the situation of the threat is to reproduce the space with the first object situated at the origin in a system of polar co-ordinates, where the distance to the others objects are marked. The threat in the shape of the range of the robots (missiles) can be marked with circles around respective object. Such presentation is, at least in complicated situations with several objects, difficult to rapidly estimate.
The idea is to solve the mentioned problem so that the observer gets a rapid overview of the total situation of the threat. The observer should also at the same time be able to decide quickly whether or not he is superior or inferior to the threat. Theirs goals are met by my invention as specified in the first claim below. Suitable implementation of the invention gives in the others claims.
The invention is characterised by a common circle, called the threat circle, TC, for all the objects, in the general case called the circle of possible events, in relation to which all the threats are presented. This is the main idea. The threats tSF and tFS is marked with its own symbol located in the direction from the centre of the threat circle to the SeObj and / or the FiObj. The latter makes it possible to overlay the picture of the threat situation plane on the plane of location and in the same time presents the true location and the true threat situation of the different objects.
The threat circle, TC, marks the boundary between the area inside the threat circle in which the threat exists and the area outside the threat circle in which the threat does not exist. The distance of the threat symbol to the threat circle tells nothing about how close in time the threat symbol is from crossing the threat circle. This, however, is obtained from the radial dynamics of the threat symbol together with their position in the threat situation plane.
The invention makes it possible to easy present the uncertainty in forming judgement of the threat, witch normally is important to show. In practice there is a lot of uncertain facts. E. g. in a military situation you do not know if the antagonist shall discover the firing of your robot and run away or continue on the same course. Also, you do not have complete information of the robotic ranges of the antagonist, perhaps even insecurity on the range of your own robot. Knowledge on the position and velocity of the antagonist can also be insufficient. All this insecurity and others can, fundamentally, be taken over into the radial range of the symbol in the threat situation plane.
The invention makes it possible to change the scale of the location plane and/or the scale of the threat situation plane. It is also possible to move the centre of the threat circle to a suitable position in the location plane and at the same time present the real positions and situations of the threat of the different objects.
The situation of the threat, i.e. the radial distance of the threat symbol to the threat circle, can, at least, be computed in three ways, each of which gives a certain form of presentation. Namely presentations with respect to normalized distance, distance and time.
In the normalized distance presentation mode, tSF is computed as the quotient of the distance from FiObj to SeObj and the range of the missile of SeObj. A value of tSF less than one leads to a position of the threat symbol inside the threat circle, otherwise the position is outside.
In the distance presentation mode, tSF is computed as the difference of the distance between FiObj and SeObj and the range of the robot of SeObj. A value of tSF less than zero leads to a position of the threat symbol inside the threat circle, otherwise the position is outside.
Finally, in the time presentation mode, tSF is computed as the time it takes for SeObj, with preserved velocity, to move the distance to FiObj minus the range of the robot of SeObj. If the range of the robot of SeObj is greater than the distance between FiObj and SeObj, the threat situation, tSF, is positioned inside the threat circle, otherwise the position is outside.
The analogous is valid for the threat situation, tFS, of the second object, SeObj, concerning the computation of the threat situation.
The different kinds of presentations have different advantages and are dependent of the current applications. It can be suitable to use just as a particular mode of presentation. It is convenient to make it possible for the presentation equipment to change between the alternative modes of presentation.
The invention is to be described in more detail using the figures of this document. We now briefly describe these figures.
Fig. 1 shows a picture of the presentation of location,
Fig. 2 shows a picture of the presentation of the threat situation,
Fig. 3 shows the threat situation according to fig. 2 superposed (overlaid) on a picture of presentation of location,
Fig. 4 shows a picture of the threat situation superposed on a picture of presentation of location with two first objects,
Fig. 5 shows a picture of an one-sided threat situation to the second objects, SeObj, from the first objects, FiObj,
Fig. 6 shows a picture of the threat situation with insecurity in the threat,
Fig. 7 shows a picture of the threat situation superposed on a picture of presentation of location with the second objects (SeObjl and SeObj2) close to and nearly at the same bearing, and finally
Fig. 8 shows another form of a representation of the threat situation with the second objects close to and nearly at the same bearing.
Below follows a description of the invention from an application inside a combat aircraft. However it is clear that the invention can be used also in other situations, military as well as civilian, for similar presentations and it is my propose that this invention shall cover such applications.
One can present the threat, using each of the 3 modes. However all modes have a common threat circle for all displayed objects. The figures in the examples are valid for an arbitrary choice of any of the three modes.
Fig. 1 shows a picture of the presentation of location that can be used together with the picture of the presentation of threat. In fig. 1 the current location of one first object, FiObj, and two seconds objects, SeObjl and SeObj2, are presented on a monitor, for example a tactic indicator. Of course there could be several first objects and second objects. It is appropriate that the symbol for the first object is different from the symbol of the second object. Even the colour should be different.
Fig. 2 presents a situation where the threats (tFS, tSF) are located, in relation to the common threat circle, TC, in radial direction from the centre of the circle to each respective second object. We present here only two pairs, (FiObj, SeObjl) and (FiObj, SeObj2), but we could present also the third pair (SeObjl , SeObj2). The threat, tS1F, to FiObj from SeObjl is marked with an unfilled ring in radial direction from the centre of the threat circle to SeObjl . The threat, tFS1 , to SeObjl from FiObj is also marked, with a filled ring, in radial direction from the centre of the threat circle to SeObjl . The circle tells us that the threat is imminent when the threat is inside the circle. In this case the object SeObj2 is a danger threat to the object FiObj, which is evident by the position of tS2F inside the threat circle. Fig. 2 shows also that FiObj is inferior to SeObjl in the sense that tS1 F is more close to the area inside TC, in which the threat exist, than tFS1.
A threat can be represented e. g. as a ring in the equipment of presentation. The threat can also be represented as a short line (bar). If you choose a bar instead of a ring to present the threat, you must decide on which end of the bar that indicates the threat position. In the case of rings as well as in the case of bars one may use different colours, for example blue for first threat situation, tSF, and red for second threat situation, tFS.
Fig. 3 shows that one may overlay fig. 1 and fig. 2 and at the same time represent both the true location and the threats for the different objects.
In the text above the threat has be represented for one first object, FiObj, and two second objects, (SeObjl , SeObj2). However, one may also represent the threat from several first objects in the same presentation of threat. Fig. 4 presents the threat, tS2F1 , to FiObl from SeObj2 and tF1S2 presents the threat to SeObj2 from FiObjl . The threat to FiObj2 from SeObj2 is denoted by tS2F2 and the threat to SeObj2 from FiObj2 is denoted by tF2S2. What restricts the number of objects is the fact that the display can be quite messy and difficult to interpret with many objects. It is, of course, possible to let a user choose which objects to display. After that the others are suppressed until new choices are made, after some time has passed or another simple criterion is fulfilled.
In fig. 4 the object FiObj2 is located deliberately at long range from SeObjl in order to illustrate that its threat situation is not interesting and for that reason it is not necessary to be presented. It is evident from the figure that the threat, tF1 S2, to SeObj2 from FiObjl is imminent and that the same is valid for tS2F1. It is evident that SeObj2 is somewhat inferior to FiObjl in the sense that tS2F1 is more close to the area outside TC, where the threat does not exist, than tF1S2. It is also evident that FiObjl is somewhat inferior to SeObjl in the sense that tS1 F1 is more close to the area inside TC, where the threat exists, than tF1S1.
Likewise it is possible to allow the user to specify which threats shall be computed and presented, amongst a number of imaginable (thinkable) threats. The user can choose not to present some improbable threats, though they are possible, with the purpose of making the threat situation plane easy to interpret. An example of such a threat can be the threat from a long-range robot.
In the case that a picture of presentation of location shall be superposed, one must decide which of the first objects, if any, shall be located at the centre of the threat circle. There are several possibilities. Fig. 4 shows two first objects where none of them are placed at the centre of the threat circle. FiObjl or FiObj2 could have been selected to lie at the centre or the centre could be selected to lie in some kind of mean value between the objects. Specially, in a case with a group of first objects that have weapons with larger ranges than the group spreading in space, it is appropriate to place the group in the centre of the threat circle. The equipment of presentation of threat can easily be designed so that relative transfer between the overlay pictures can be made.
Fig. 5 shows one-sided threat to second objects from first objects. It must be pointed out that there are two different scales in the same picture. One is the scale of the threat- situation plane and the other is the scale of the location plane of the objects. If, for example, in the threat situation plane 1 cm corresponds to 10 km then the threat, tF1S2, to SeObj2 from FiObjl is placed about 15 km inside the robot range of FiObjl . This is because the filled ring is placed about 1.5 cm from the threat circle inside it. In the plane of location 1 cm can, for example, corresponds to 5 km and consequently the distance between FiObjl and SeObj2 is about 40 km.
If one wants to visualize the insecurity in the threat, which usually is important, then a short line (bar) is a suitable choose, where the length of the bar indicates the degree of insecurity. The insecurity of the threat can then be presented as a bar in radial direction where the probability that the threat is inside the threat circle is proportional to the quotient between the length of the part of the bar inside the threat circle and the length of the whole bar.
In fig. 6 the different lengths of the bars state the different degrees of insecurity. In the other figures equally long bars or rings are use meaning that the insecurity is either unknown or hidden. The threat, tF1S2, to SeObj2 from FiObjl shows more insecurity than the threat, tS2F1 , to FiObjl from SeObj2 . The threat tF1S2 overlaps somewhat the area inside the threat circle, which means that there is a little probability that FiObjl can impact SeObj2 when its missile is fired.
Normally, the threat, for example the threat from a missile by its range, is dependent of several factors like the flying altitude, the relative differences in altitude between aircraft, launch direction, etc. Fore those reasons the presentation is constantly changing with respect to the current threat distance, for example the range of the missile.
The presentation of the objects can be excellent as can be seen by the figures. The type of object is given by the symbol, which also gives the speed and direction of the speed vector, etc. In some cases with several objects and threats it is suitable, at least some time, to omit the objects to make the picture more easy to interpret. This can be done with an easy choice on the presentation.
If several others objects are lying near each other at almost the same bearing, it can be difficult to see witch symbol of threat belong to which object, as illustrated in fig 7. Fig. 8 shows how one may, by relative removal of the two pictures, render the presentation more clear. If the centre of the threat circle moves near SeObjl and SeObj2, then the angle difference between the objects, as seen from the centre of the threat circle, is bigger and consequently threat bars are more separated in angle. In order to more easily estimate the radial position of the different threats symbols on the display in relation to the threat circle (TC), one or more concentric circles, with respect to the threat circle, can be placed on the display.
It has in the beginning been mentioned that the invention can be used even for civilian air traffic. The reason for that is, of course, that every aircraft in the neighborhood of the own aircraft gives a potential risk of collision. Likewise the own aircraft is a potential risk of collision against nearby aircraft. Proximity to a stationary object constitutes also a risk, the closer the bigger.
The advantage with this presentation, apart from what already has been mentioned, is that one can define the meaning of the risk an aircraft can be exposed to. This risk can be different for different aircraft, and still have the same threat circle for all the aircraft involved.
Only threats between the two objects in a pair have been considered so far. Howewer also the more general case of one or more threats to one or more objects is of interest and can be treated in a similar fashion. In this last case the threat symbols are placed in the radial direction from the centre of the threat circle to respective object.
Ultimately, one must remember that the threat circle can, more generally, be called the event circle (TC). Inside the event circle it is assumed that possible events occur while outside it, possible events do not occur.

Claims

claim:
1. Method to present on a display at least one threat (tSF, tFS) between at least one pair of objects, (FiObj, SeObj), characterized by that only one threat circle (TC) is presented on the screen for all the first objects, FiObj, and all the second objects, SeObj, and that the threats are marked with symbols placed, in relation to the threat circle, in radial direction from the centre of the threat circle to respective second object, SeObj, and / or first object, whereby the threat circle marks the boundary between the area inside the threat circle in which the threat exists and the area outside the threat circle in which the threat does not exist, and where the radial distance of the threat symbol, to the threat circle, constitute a measure, in suitable threat scale (time, length, etc.), of closeness to this transition.
2. Method according to claim 1 , characterized by that one or more threats to one or more objects are placed in the radial direction from the centre of the threat circle to respective object.
3. Method according to any of the previous claims, characterized by that tSF and tFS are presented with different colours.
4. Method according to any of the previous claims, characterized by that the insecurity in the position of the threat, in relation to the threat circle (TC), is presented by a bar that states, with its radial range, where the threat is located.
5. Method according to any of the previous claims, characterized by a picture that with symbols shows the geographic position of first objects (FiObj) and second objects (SeObj) superposed on the threat situation plane.
6. Method according to any of the previous claims, characterized by that the threat situation is presented as a picture that presents the normalized distance to the threat circle.
7. Method according to any of claims 1 - 5, characterized by that threat situation is presented as a picture that presents the distance to the threat circle.
8. Method according to any of claims 1-5, characterized by that the threat situation is presented as a picture that presents the time to the threat circle.
9. Method according to any of the previous claims, characterized by that threat is a possible event and that the threat circle is an event circle (TC) that marks the boundary between the area inside the event circle in which the possible event happens and the area outside the event circle in which the possible event does not happen.
PCT/IB2000/001757 1999-11-25 2000-11-25 Method to present the threat situation on a display WO2001039127A1 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
CA002398914A CA2398914A1 (en) 1999-11-25 2000-11-25 Method to present the threat situation on a display
NZ520097A NZ520097A (en) 1999-11-25 2000-11-25 Presenting a threat situation on a display using a common threat circle, inside which threats exist
AU17212/01A AU780498B2 (en) 1999-11-25 2000-11-25 Method to present the threat situation on a display
APAP/P/2002/002557A AP2002002557A0 (en) 1999-11-25 2000-11-25 Method to present the threat situation on a display.
EP00979830A EP1242977A1 (en) 1999-11-25 2000-11-25 Method to present the threat situation on a display
SE0201569A SE0201569L (en) 1999-11-25 2002-05-24 Ways to present the threat situation on a monitor
HK03102168.9A HK1051920A1 (en) 1999-11-25 2003-03-25 Method to present the threat situation on a display

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
SE9904283A SE9904283L (en) 1999-11-25 1999-11-25 Ways to present a threat situation picture on a monitor
SE9904283-0 1999-11-25
ES200000011 2000-01-04
ES200000011 2000-01-04

Publications (2)

Publication Number Publication Date
WO2001039127A1 true WO2001039127A1 (en) 2001-05-31
WO2001039127A9 WO2001039127A9 (en) 2001-08-02

Family

ID=26156164

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2000/001757 WO2001039127A1 (en) 1999-11-25 2000-11-25 Method to present the threat situation on a display

Country Status (7)

Country Link
EP (1) EP1242977A1 (en)
AP (1) AP2002002557A0 (en)
AU (1) AU780498B2 (en)
CA (1) CA2398914A1 (en)
HK (1) HK1051920A1 (en)
NZ (1) NZ520097A (en)
WO (1) WO2001039127A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006008564A1 (en) 2004-06-17 2006-01-26 Pedersen Roald H A suspension device for a vehicle wheel
US7161500B2 (en) 2001-05-10 2007-01-09 Saab Ab Display device for aircraft and method for displaying detected threats
EP1759367A1 (en) * 2004-06-22 2007-03-07 Portendo AB Surveillance system for real-time threat monitoring

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4853700A (en) * 1984-10-29 1989-08-01 Toyo Communication Equipment Co., Ltd. Indicating system for warning airspace or threatening aircraft in aircraft collision avoidance system
WO1995019545A1 (en) * 1994-01-18 1995-07-20 Honeywell Inc. Method and system for managing aircraft threat data
EP0928952A1 (en) * 1998-01-12 1999-07-14 Dassault Electronique Aircraft terrain collision avoidance method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4853700A (en) * 1984-10-29 1989-08-01 Toyo Communication Equipment Co., Ltd. Indicating system for warning airspace or threatening aircraft in aircraft collision avoidance system
WO1995019545A1 (en) * 1994-01-18 1995-07-20 Honeywell Inc. Method and system for managing aircraft threat data
EP0928952A1 (en) * 1998-01-12 1999-07-14 Dassault Electronique Aircraft terrain collision avoidance method and device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
DEGRE T ET AL: "A new anti-collision system", NAVIGATION, OCT. 1980, FRANCE, vol. 28, no. 112, pages 412 - 425, XP000986511, ISSN: 0028-1530 *
HERTHER J C ET AL: "A fully automatic marine radar data plotter", JOURNAL OF THE INSTITUTE OF NAVIGATION, JAN. 1971, UK, vol. 24, no. 1, pages 43 - 49, XP000981890, ISSN: 0020-3009 *
PETTERSSON G ET AL: "Temporal decision support and datafusion in BVR-combat", PROCEEDINGS OF EUROFUSIO 98. INTERNATIONAL DATA FUSION CONFERENCE, PROCEEDINGS OF EUROFUSION 98. INTERNATIONAL DATA FUSION CONFERENCE, GREAT MALVERN, UK, 6-7 OCT. 1998, 1998, Malvern, UK, DERA, UK, pages 71 - 75, XP000981852 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7161500B2 (en) 2001-05-10 2007-01-09 Saab Ab Display device for aircraft and method for displaying detected threats
WO2006008564A1 (en) 2004-06-17 2006-01-26 Pedersen Roald H A suspension device for a vehicle wheel
EP1759367A1 (en) * 2004-06-22 2007-03-07 Portendo AB Surveillance system for real-time threat monitoring

Also Published As

Publication number Publication date
EP1242977A1 (en) 2002-09-25
AU780498B2 (en) 2005-03-24
AP2002002557A0 (en) 2002-06-30
AU1721201A (en) 2001-06-04
CA2398914A1 (en) 2001-05-31
HK1051920A1 (en) 2003-08-22
NZ520097A (en) 2004-09-24

Similar Documents

Publication Publication Date Title
US7602478B2 (en) Fused sensor situation display
US7934651B2 (en) Intuitive tactical decision display
KR102012466B1 (en) Apparatus and method for threat evaluation based on zone defense
EP3019968B1 (en) System and method for processing of tactical information in combat vehicles
KR101840540B1 (en) Method of Foe Threat Analysis and Visualization based Situation Map and System thereof
US5579009A (en) Sensor system
De Cubber et al. The SafeShore system for the detection of threat agents in a maritime border environment
AU780498B2 (en) Method to present the threat situation on a display
WO2001039127A9 (en) Method to present the threat situation on a display
US6961070B1 (en) Method to graphically represent weapon effectiveness footprint
WO2001033506A1 (en) Method to present the threat situation on a display
CN110199170B (en) Communication system for transmitting detected object information items between at least two communication partners
KR101681530B1 (en) Device for monitoring of no-fighting zone in naval vessel combat system
Simard et al. Central level fusion of radar and IRST contacts and the choice of coordinate system
Fowler The standoff observation of enemy ground forces from Project Peek to JointSTARS-A prolusion
JPH0559360B2 (en)
US20230160661A1 (en) Long distance shooting tool for target identification, communication, and ballistic data
Shostko et al. The Task of Weapon Guidance onto the Aerial Target Using Optoelectronic Station of Trajectory Measurements
Bodenmüller Application of Bayesian reasoning for Military identification and classification
WO2021149448A1 (en) Vessel monitoring device
Mishra Network centric warfare in the context of ‘operation Iraqi freedom’
Widgery Development of a ballistic missile defence capability for the SAMPSON multi-function radar on UK Type 45
GB2151425A (en) Graphic display
Bingham Theater warfare, movement, and airpower
Müller et al. Vessel protection in expeditionary operations: At anchor and in foreign harbours

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
COP Corrected version of pamphlet

Free format text: PAGES 10-13, AMENDED CLAIMS, ADDED

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: PV2002-1804

Country of ref document: CZ

WWE Wipo information: entry into national phase

Ref document number: 02015691

Country of ref document: SE

WWE Wipo information: entry into national phase

Ref document number: 2000979830

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 520097

Country of ref document: NZ

WWE Wipo information: entry into national phase

Ref document number: 17212/01

Country of ref document: AU

WWP Wipo information: published in national office

Ref document number: 02015691

Country of ref document: SE

WWE Wipo information: entry into national phase

Ref document number: 2398914

Country of ref document: CA

WWP Wipo information: published in national office

Ref document number: 2000979830

Country of ref document: EP

WWR Wipo information: refused in national office

Ref document number: PV2002-1804

Country of ref document: CZ

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 520097

Country of ref document: NZ

WWG Wipo information: grant in national office

Ref document number: 520097

Country of ref document: NZ

WWG Wipo information: grant in national office

Ref document number: 17212/01

Country of ref document: AU

WWW Wipo information: withdrawn in national office

Ref document number: 2000979830

Country of ref document: EP