A method and system for managing an aircraft's flight path by identifying and categorizing potential threats in the aircraft's original flight path and determining an alternate flight path. The alternate flight path is selected from potential flight paths and has a threat value lower than any of the
A method and system for managing an aircraft's flight path by identifying and categorizing potential threats in the aircraft's original flight path and determining an alternate flight path. The alternate flight path is selected from potential flight paths and has a threat value lower than any of the potential flight paths. The potential flight path candidates are generated from combinations of the original flight path coordinates, and coordinates that vary from the original coordinates by a set range.
대표청구항▼
1. A method of managing a flight path of an aircraft subject to a threat, the method comprising the steps of: a. receiving threat data;b. receiving flight path data including a location of each of a plurality of preselected mission waypoints;c. computing a simulated waypoint along the flight path, t
1. A method of managing a flight path of an aircraft subject to a threat, the method comprising the steps of: a. receiving threat data;b. receiving flight path data including a location of each of a plurality of preselected mission waypoints;c. computing a simulated waypoint along the flight path, the simulated waypoint located between two of the plurality of preselected mission waypoints;d. computing line of sight LOS vectors from the location of the simulated waypoint to locations of threats, each of the LOS vector having an azimuth parameter, an elevation parameter, and a range parameter;e. determining a probability of threat detection by the threat using the computed LOS Vector;f. creating a volumetric perturbation by, perturbing the parameters of Azimuth, elevation, and range to generate a plurality of perturbed LOS vectors each having one or more or all of its respective parameters of azimuth, elevation, and range having perturbed values;g. altering the flight path based on the volumetric perturbation;h. assigning a threat value from among each probability of threat detection by the threat determined using the computed LOS vector and each of the plurality of perturbed LOS vectors;i. determining if the maximum probability of threat detection value of the threat exceeds an acceptable probability of detection value of the threat; andj. if the maximum probability of threat detection value of the threat exceeds the acceptable probability of threat detection value, performing the step of generating, a list of a plurality of candidate waypoints. 2. The method as defined in claim 1, wherein the threat is a single threat, wherein the location of the threat is the location of the threat radar tor the single threat, the method further comprising the step of: computing a volumetric probability of detection for the single threat for the simulated waypoint based upon the computed LOS vector to the location of the single threat and the generated plurality of perturbed LOS vectors each providing a perturbed location for the single threat. 3. The method as defined in claim 1, wherein the threat is a first threat of a plurality of threats; andwherein the method further comprises repeating steps (d) through (j) for each other of the of the plurality of threats for the simulated waypoint. 4. The method as defined in claim 3, wherein the simulated waypoint is a first simulated waypoint of a plurality of simulated waypoints, the method further comprising: repeating steps (c) through (j) for each of the plurality of threats, for each other of the plurality of simulated waypoints. 5. The method as defined in claim 1, wherein the threat is a first threat of a plurality of threats, wherein the simulated waypoint is a first simulated waypoint of a plurality of simulated waypoints, and wherein the method provides for: computing dynamic detection probabilities from each of the plurality of threats at each of the plurality of simulated waypoints. 6. The method as defined in claim 1, further comprising the step of: performing a new flight path algorithm to identify a flight path to the candidate waypoint of the plurality of candidate waypoints providing a lowest probability of threat detection value of the plurality candidate waypoints. 7. The method as defined in claim 6, wherein the threat is a first threat of a plurality of threats, the method further comprising the steps of: recalculating ownship position for the candidate waypoint; andrepeating steps(d), (e), (i), and (j) for each of the plurality of threats. 8. The method as defined in claim 1, wherein the threat is a first single threat of the plurality of threats, the method further comprising: repeating steps (d) through (f) for each other of the of the plurality of threats for the simulated waypoint to form a plurality of sets or threat location points;identifying a plurality of the threat location points that can be represented by a second single threat location;forming a threat cluster that represents the plurality of the threat location points as the second single threat; andcomputing a centroid for the threat cluster, a longest distance between the centroid and the respective threat location point of the threat cluster corresponding thereto defining a maximum value, and a shortest distance between the centroid and the respective threat location point of the threat duster corresponding thereto defining a minimum value. 9. The method as defined in claim 8, further comprising: performing the following after step (c) and before step (i) for the second single threat representing the formed threat cluster: computing a line of sight LOS vector from the location of the simulated waypoint to a location of each of the following: the centroid,computing a probability of threat detection using each of the computed LOS vectors for the second single threat, andidentifying a maximum probability of threat detection value from among each probability of threat detection determined using the computed LOS vectors for the second single threat; andrepeating steps (i) and (j) utilizing the identified maximum probability of threat detection value. 10. The method as defined in claim 8, wherein the plurality of threat location points include latitude, longitude, and altitude of each of a corresponding plurality of threat ground points, the method further comprising: identifying an optimum geometric shape of a plurality of possible geometric shapes representing the plurality of ground points, the optimum geometric shape having minimum computed area when compared to an area of each other of the plurality of possible geometric shapes to reflect an area of the centroid. 11. The method as defined in claim 1, wherein the threat is a first single threat, the method further comprising; identifying a plurality of additional threats from the throat data that can be represented by a second single threat;forming a threat cluster that represents the plurality of additional threats as the second single threat; andcomputing a centroid for the threat cluster, a longest distance between the centroid and the respective additional threat of the threat cluster corresponding thereto donning a maximum value, and a shortest distance between the centroid and the respective additional threat of the threat cluster corresponding thereto defining a minimum value. 12. The method as defined in claim 11, further comprising: performing the following after step (c) and before step (i) for the second single threat representing the formed threat cluster: computing a line of sight LOS vector from the location of the simulated waypoint to a location of each of the following: the centroid,computing a probability of threat detection using each of the computed LOS vectors for the second single threat, andidentifying a maximum probability of threat detection value from among each probability of threat detection determined using the computed LOS vectors for the second single threat; andrepeating steps (i) and (j). 13. The method of claim 1, wherein the step of creating LOS vectors creases the following LOS vectors: (1) LOSnew((Az+0.003×Az), Elm, Rngm), and (2) LOSnew((Az−0.003×Az), Elm, Rngm), wherein Elm is a measured value for an elevation parameter and Rnmg is the measured value for a slant range parameter.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (49)
Houlberg Christian L., Airborne video tracking system.
Kershner Stuart D. ; Warburton Frank W., Aircraft virtual image display system and method for providing a real-time perspective threat coverage display.
Robertson David B. (North Kingstown RI) Perruzzi Joseph J. (Tiverton RI) Rabenold Laura C. (Bristol RI), Method and apparatus for avoiding detection by a threat projectile.
Kronfeld, Kevin M.; Lapis, Mary Beth; Walling, Karen L.; Chackalackal, Mathew S., Method and apparatus for identification of hazards along an intended travel route.
Kaneko,Toshimitsu; Hori,Osamu; Mita,Takeshi; Yamamoto,Koji, Method of describing object region data, apparatus for generating object region data, video processing apparatus and video processing method.
Ma,Cedric Sek Kong; Miller,Robert Henry, Mixed integer linear programming trajectory generation for autonomous nap-of-the-earth flight in a threat environment.
Schober Michael B. (11681 N. Europa Pl. Tucson AZ 85737), Radar system and method for detecting targets clutter using target intensity and angular position.
Sabol, Bruce M.; Melton, R. Eddie, Using video-based imagery for automated detection, tracking, and counting of moving objects, in particular those objects having image characteristics similar to background.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.