WO1995019546A1 - Intervisibility algorithm - Google Patents

Intervisibility algorithm Download PDF

Info

Publication number
WO1995019546A1
WO1995019546A1 PCT/US1995/000709 US9500709W WO9519546A1 WO 1995019546 A1 WO1995019546 A1 WO 1995019546A1 US 9500709 W US9500709 W US 9500709W WO 9519546 A1 WO9519546 A1 WO 9519546A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
threat
slope
data post
intervisibility
Prior art date
Application number
PCT/US1995/000709
Other languages
French (fr)
Inventor
Robert M. Gjullin
Douglas E. Thorpe
Original Assignee
Honeywell Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honeywell Inc. filed Critical Honeywell Inc.
Publication of WO1995019546A1 publication Critical patent/WO1995019546A1/en

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01CMEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
    • G01C21/00Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
    • G01C21/005Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00 with correlation of navigation data from several sources, e.g. map or contour matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T15/003D [Three Dimensional] image rendering
    • G06T15/06Ray-tracing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T15/003D [Three Dimensional] image rendering
    • G06T15/10Geometric effects
    • G06T15/40Hidden part removal

Definitions

  • the present invention relates generally to a method of aircraft flight management, and particularly to a method of intervisibility calculation with respect to digital terrain elevation data (DTED).
  • DTED digital terrain elevation data
  • Digital terrain elevation data represents surface elevation at discrete "data posts.” Each data post has a surface location or address, e.g., latitude and longitude, and an associated altitude, i.e., relative to sea level.
  • a simple form of a DTED database would deliver a sealer altitude in response to longitude and latitude input.
  • More complicated DTED databases have been developed for certain applications.
  • U.S. Patent No. 4,899,292 issued February 6, 1990 to J. F. Dawson and E. W. Ronish shows a tessellation method for creating a spherical database by warping a digital map, including digital terrain elevation data, by longitude and latitude parameters.
  • DTED database systems are used in flight mission computer systems and flight planning strategy in military applications to aid in, for example, covert and evasive flight operations.
  • a DTED database can aid a pilot in time-critical maneuvers such as terrain following flight or in selecting evasive routes having low observability with respect to a given threat position.
  • threat positions may be known in advance and included in the DTED database, or detected while in flight.
  • the computation speed required in accessing and calculating routes or alternatives based on DTED systems can be vitally critical, especially for computations executed repeatedly to keep a pilot fully appraised of current terrain conditions and route alternatives.
  • improvements in methods of accessing DTED and computations based on extracted DTED are not simply improvements in computational elegance, but can be life-saving and critical to mission success.
  • the method of the present invention identifies terrain obscured by other terrain with respect to the view of a threat installation, including calculation of the extent of vertical clearance between a threat detection envelope and a given obscured ground point.
  • a series of radials are identified emanating from a given threat installation, and for each radial identified, data points therealong are visited and an intervisibility calculation performed relative thereto.
  • the intervisibility calculation of the present invention provides a zero value for all data points visited along the radial within view of the threat installation.
  • a non-zero value is provided for each point visited when obscured by intervening terrain, the non-zero value representing a vertical clearance between the data point and the lower boundary of the threat detection envelope thereabove.
  • Each data point visited along each radial, beginmng at a data point nearest the threat installation is associated with a slope value corresponding to the relative difference in altitude between the threat installation and the data post visited.
  • a maximum previous slope calculated is maintained.
  • the associated slope value is compared to the maintained maximum slope value. If the slope value associated with the current data point is greater than the maintained maximum slope value, then the current data post is considered visible with respect to the threat installation and its slope value is adopted as the maximum slope value. If, however, the slope value for a given data point visited is less than the maintained maximum slope value, then the data point visited is considered terrain masked relative to the threat installation.
  • the maintained maximum slope value represents the threat detection envelope above the data point visited whereby the maintained maximum slope value in conjunction with the slope value associated with the terrain masked data point provides a basis for calculating the vertical separation between the obscured data point visited and the lower boundary of the threat detection envelope.
  • the vertical separation value may be stored along with the data point elevation data to indicate not only visibility but also a representation of the extent of terrain masked vertical clearance above the data point.
  • FIGS. 1-3 illustrate a radial spoke pattern method of and device for accessing digital terrain elevation data.
  • FIG. 4 illustrates a sectional terrain view showing calculation of intervisibility based on a line slope comparison method of calculation for an intervisibility ground reference value in accordance with the present invention.
  • FIGS. 5A-5I illustrate computation of intervisibility ground reference values along a first portion of a radial during a radial pattern scan.
  • FIG. 6 illustrates in greater detail intervisibility calculation at a specific data post during radial traversal.
  • FIG. 7 illustrates earth curvature and radar curvature compensation for intervisibility calculations as a function of a distance representation provided under the present invention.
  • FIG. 8 illustrates a hardware implementation of the earth curvature and radar curvature compensation method illustrated in FIG. 7.
  • FIG. 9 is a flow chart illustrating a radial pattern intervisibility calculation according to the present invention.
  • the preferred embodiment of the present invention as illustrated in the drawings comprises a method of intervisibility calculation identifying terrain obscured by other terrain with respect to the view of a threat installation.
  • the method of the present invention further identifies the vertical separation between the obscured terrain and a threat installation detection envelope.
  • Such information can be then used to identify air space supporting a mission route within the range capability of the threat installation, yet obscured from view by the threat installation.
  • This vertical separation or clearance between obscured terrain and a detection envelope thereabove is referred to herein as an "intervisibility ground reference" or IGR value.
  • a threat intervisibility calculation indicates what terrain surrounding a threat, e.g., anti-aircraft SAM sight, is hidden from the threat sensor equipment, typically a radar-type sensor. Terrain may be hidden from the threat sensor equipment because it is either out of range capability of the threat, or within range but terrain masked relative to the view of the threat installation.
  • the intervisibility calculation allows the pilot to choose a flight path minimizing or avoiding aircraft exposure to threat detection.
  • terrain surrounding the threat must be fully analyzed taking into account such factors as DTED database characteristics, radar range, threat elevation, earth curvature, and radar curvature along the earth's surface. As may be appreciated it is difficult to compensate for all these factors while maintaining reasonable calculation performance, i.e., speed and accuracy, in a simple, dedicated hardware implementation.
  • Intervisibility calculation in accordance with the present invention shall be illustrated in the context of a radial scan pattern method of accessing DTED database systems.
  • a point of interest is selected, e.g., a threat installation, and data sampling occurs along radials emanating from the point of interest and having a length corresponding to, for example, the range capability of the threat installation.
  • raster scan techniques can be employed to sample and analyze a DTED database, typically addressed in a two-dimensional or XY addressing scheme
  • radial scan pattern sampling requires less hardware, i.e., memory, and has proven a successful method of scanning and analyzing DTED database systems for intervisibility calculations.
  • a data cache 10 contains a relevant portion of a DTED database comprising a plurality of data posts 12 individually addressable according to a two dimensional, i.e., X and Y, addressing scheme.
  • a threat installation is identified at the data post 12a with a given range capability indicated as R threat - I n the illustrated example, the distance R threat corresponds to 146 data posts 12.
  • a radial scan is then executed by taking data samples along a set of radials 14 originating at the threat position 12a and extending a distance corresponding to R threat? i- e - > extending 146 posts from point 12a.
  • a complete intervisibility calculation is thereby executed across a 360 scan 16.
  • a partial intervisibility calculation may be executed by traversing only a portion of selected radials 14 emanating from data post 12a.
  • Such a partial intervisibility calculation may include a contiguous sector of adjacent radials 14, or may comprise various sets of radial 14 sectors, i.e., various "pie slices" from the area surrounding data post 12a.
  • a sample step 18 corresponds to the spacing between data posts 12 along, for example, vertical radial 14a, i.e., parallel to the Y axis as indicated in FIG. 1.
  • the same number of steps 18 are taken along each radial 14 to sample out to a given distance R threat -
  • the method of traversing a constant radial 14 length as a function of a constant number of steps 18 allows, as will be apparent from the following discussion, a simple hardware mechanism for traversing radials 14 out to the distance R threat -
  • an intervisibility calculation may be performed relative to that sample.
  • the angular increment between radials 14 is selected, taking into account the magnitude of sample step 18, to assure complete data post 12 visitation throughout the range capability of the threat at data post 12a.
  • the magnitude of sample step 18 is preferably equal to data post 14 spacing as discussed above, and the angular increment between radials is selected to insure that all data posts within the radius R threat are visited in the radial scan.
  • Computer simulation has proven helpful in establishing the angular increment between radials 14 as a function of step 18 magnitude and R ⁇ reat magnitude.
  • FIG. 3 illustrates in block diagram the hardware implementation of a radial scanner 30.
  • Radial scanner 30 receives externally 3 values identifying a threat installation position, i.e., X threat an d N threat!
  • R threat Data cache 10 is accessed by way of address unit 32 providing X and Y address values 33 corresponding to the data posts 12 within cache 10.
  • Data cache 10 in turn provides intervisibility input data 35, including X and Y location values and at least an elevation value for each data post 12 addressed by address unit 32.
  • Intervisibility input data 35 may further include a prior intervisibility calculation (not shown in FIG. 3) for the data post currently visited and previously stored in cache 10.
  • a master controller 34 thereby selects a most conservative intervisibility calculation by comparing a prior intervisibility result with a current intervisibility result.
  • the resulting intervisibility data stored in the DTED database 10 will provide a most conservative representation of intervisibility for that data post.
  • Master controller 34 selects a suitable angular increment between radials 14 to accomplish complete data post visitation as a function of the magnitude of the value
  • the 360° scan 16 is accomplished by sequentially sampling at increments of step 18 along the length of each of a plurality of radials 14 separated by this angular increment.
  • the angular orientation of each radial 14 traversed is applied in some fashion to a delta XY lookup table 36. Based on this angular orientation, lookup table 36 provides appropriate delta X and delta Y values 37 required to step or sample along the current radial 14 at increments of sample step 18.
  • master controller 34 applies a control input ⁇ index to table 36 to determine the output of table 36.
  • the control input ⁇ index could be a clock signal to increment a counter for addressing table 36, or could be an actual address value for accessing table 36.
  • master controller 34 causes table 36 to output suitable delta X and delta Y values 37 corresponding to the angular orientation of the radial 14 currently being traversed.
  • XY accumulator 38 sums a series of delta X and a series of delta Y values received from table 36 for application as address values 39 to address unit 32.
  • the values presented to and accumulated in XY accumulator 38 represent real number values whereas the values 39 provided to address unit 32 by XY accumulator 38 are truncated to provide suitable integer address values for application to data cache 10.
  • a radial distance counter 40 monitors the progress along each radial 14, i.e., counts the steps 18, and allows master controller 34 to detect when a scan along the full length, i.e., out to the distance R ⁇ a n of a radial 14 is complete.
  • intervisibility calculation 42 for the threat at post 12a is available. More particularly, and as will be discussed more fully hereafter, an intervisibility calculation is performed on a post-by-post basis whereby master controller 34 may write for each data post sampled appropriate intervisibility data back into data cache 10. This intervisibility data may be employed directly to drive a display relative to the threat installation analyzed, or may be simply retained in data cache 10 for other uses.
  • An intervisibility calculation is thereby executed at each data post 12 in the threat range R ⁇ reat to identify all terrain masked regions within the threat range.
  • the method of the present invention provides an "intervisibility ground reference" or IGR value representing the vertical distance or clearance between a terrain masked data post and the threat detection envelope thereabove.
  • This intervisibility ground reference value for each data post 12 can be stored on a one-to-one basis with the DTED database records and used, for example, in aircraft instrument display or in selecting a terrain following route masked with respect to specific threat installations.
  • Each intervisibility ground reference value thereby relates two specific data posts 12, one post being a data post 12 sampled during the radial scan and associated or stored with the intervisibility ground reference value and the other post being the data post 12 associated with a threat installation, e.g., post 12a.
  • each data post 12 within the distance R t reat °f the data post 12a may be identified as being either visible or hidden from view relative to the threat.
  • the intervisibility calculation under the present invention provides a zero value intervisibility ground reference for all data posts 12 identified as being visible with respect to the threat installation.
  • a non-zero intervisibility ground reference value indicates terrain masking of the corresponding data post 12 relative to a threat installation.
  • the magnitude of the non-zero IGR value represents a vertical distance between the given data post and the lower boundary of the threat detection envelope thereabove.
  • the intervisibility ground reference value is independent of aircraft position and altitude and useful generally in selecting terrain-masked routes within a threat installation range capability.
  • the intervisibility of terrain surrounding a given threat installation need only be calculated once when the threat is first identified, and also when its position or elevation has changed.
  • FIG. 4 illustrates sampling along one of the radials 14 and calculation of an intervisibility ground reference value for only the first eleven data post 12 visited along the radial 14, it being understood that an intervisibility calculation is executed for all data posts 12 visited along each radial 14 traversed.
  • FIG. 4 is a terrain elevation cross- section profile taken through the data post 12a and along the radial 14a showing relative elevation among the data posts 12 along a given radial 14 and the threat installation at the data post 12a.
  • the radial scan pattern method of accessing the cache 10 selects data posts 12b- 12k as the first 11 data posts 12 lying on the given radial 14.
  • Each of the data posts 12 lying along the radial 14 are associated with a slope value relative to the threat 12a.
  • slope values are indicated graphically in FIG. 4 as the lines or slopes SI -SI 1 emanating from the post 12a and extending to the elevation of each of the data posts 12b- 12k, respectively.
  • S new calculated while working out from the threat position, is compared to a prior greatest magnitude reference slope, designated S ref . If S new is greater than or equal to S ref , then the terrain at the data post associated with S ref is considered “visible" to the threat sensor. For this visible case, the S ref value is replaced with the current S new value and an intervisibility ground reference value for that post is set to zero. If S new is less than S ref , then the data post is considered "hidden" from sensor view. When beginning traversal of a new radial 14, the S ref variable is set to a maximum negative value. Thus, the first data post encountered along a radial is deemed “visible” to the threat and provides the first reference slope S ref for subsequent data samples 20 taken.
  • the data posts 12b-12i all receive a zero magnitude intervisibility ground reference values because an unobscured line of sight exists between each of data posts 12b-12i and the threat installation at data post 12a.
  • Data posts 12j and 12k are terrain masked with respect to the threat installation at data post 12a. Accordingly, data posts 12j and 12k will receive non-zero intervisibility ground reference values.
  • the intervisibility ground reference value 20 corresponds to the distance between the data post 12j and the threat detection envelope 22.
  • the intervisibility ground reference value 24 corresponds to the distance between data post
  • an intervisibility ground reference value is calculated, it is stored in the DTED database 10. This is easily accomplished by making the DTED database memory deep enough to store the associated intervisibility ground reference value with the DTED data post elevation data. By definition, if a DTED data post is hidden from a sensor and is within range of the sensor, its associated intervisibility ground reference value will be non-zero. If the post is visible to the sensor, then the intervisibility ground reference value will be zero. Note that for each DTED data post 12 visited, a read- modify-write operation is performed on the DTED database memory.
  • the algorithm of the present invention compares the intervisibility ground reference value already stored for a given data post 12, i.e., as derived in previous intervisibility calculations with respect to other threats, with the newly calculated intervisibility ground reference value from the threat currently under consideration. If the previous intervisibility ground reference value is less than the current intervisibility ground reference value, then the previous intervisibility ground reference value is maintained in memory. If the new intervisibility ground reference value is less than the previous intervisibility ground reference value, then the new intervisibility ground reference value is written into memory, destroying the previous value. This assures the most conservative and safest intervisibility calculation at any particular data post 12.
  • FIGS. 5A-5I illustrate successive intervisibility calculations by slope comparison at the first through tenth, respectively, data posts 12 encountered while traversing a given radial 14.
  • a terrain profile 32 is shown in FIGS. 5A-5I as a collection of data posts 12 lying along radial 14.
  • the horizontal axis of each of FIGS. 5A-5I corresponds to the distance of the corresponding data post 12 relative to the threat 30 in step 18 units. More particularly, the horizontal axis represents the distance from the threat 30 expressed in increments of data post 12 spacing, i.e., the content of radial distance counter 40 (FIG. 3).
  • the vertical axis of FIGS. 5A-5I corresponds to elevation in meters.
  • FIG. 5 A shows intervisibility calculation at the second data post 12 encountered along a radial 14.
  • the first data post 12 encountered establishes slope 43 as a first reference slope S ref .
  • slope S ref corresponds to the slope 43, a line connecting threat 30 and the first data post 12.
  • the slope 45 is taken as the current slope S new and corresponds to the slope between threat 30 and the second data post 12 encountered. Because S new (slope 45) is greater than S ref (slope 43), S new will be taken as the new reference slope S ref .
  • intervisibility calculation at the third data post 12 takes slope 45 as the reference slope S ref and slope 44 as slope S new . Because slope S ref is greater than S ref (slope 43).
  • slope 44 exceeds slope 45, slope 44 becomes the reference slope S ref .
  • FIG. 5C shows intervisibility calculation at the fourth data post 12 encountered along the radial 14.
  • the slope 44 being the greatest magnitude slope encountered thus far, was identified as the reference slope S ref .
  • Slope 46 associated with the fourth data post, is taken as the current slope S new . Because slope 46 is greater than slope 44, i.e., slope S new greater than slope S ref , the forth data post is taken as being visible with respect to threat 30.
  • slope 48 associated with the fifth data post assumes the status of slope S new and is greater than the previous slope S ref , i.e., slope 46, and the fifth data post is taken as being visible with respect to threat 30. Also, slope 48 is now taken as the reference slope S ref .
  • FIG. 5E shows analysis at the sixth data post 12 encountered where the slope 50, currently slope S new , is less than the previously identified slope 48, currently slope S ref .
  • the sixth data post encountered therefore, is considered terrain masked with respect to the detection envelope of threat 30.
  • an intervisibility ground reference value 54 may be computed for the sixth data post 12 as a representation of the vertical spacing between the sixth data post 12 and the detection envelope of the threat 30 thereabove.
  • an intervisibility ground reference value 56 is calculated for the seventh data post 12.
  • the slope 48 remains as the reference slope S ref , i.e., the greatest magnitude slope encountered thus far, and therefore as a representation of the lower boundary for the detection envelope of threat 30.
  • FIGS. 5G-5H illustrate further steps at the eighth and ninth data posts 12 encountered.
  • Each of the eighth and ninth data posts are associated with slopes less than slope 48, i.e., less than reference slope
  • FIG. 51 illustrates the tenth data post 12 encountered is associated with a slope equal to the current reference slope S ref , and is therefore taken as being visible with respect to threat 30.
  • the combined intervisibility ground reference values associated with the sixth through tenth data posts encountered indicate a vertical plane through which an aircraft may fly undetected by the threat 30, yet be within its range capabilities. Taken with other intervisibility ground reference values obtained for data posts 12 along other radials 14, a volume of terrain masked space surrounding threat 30 and within the range capability of threat 30 may be identified.
  • FIG. 6 illustrates calculation of a particular intervisibility ground reference value taking into account threat elevation, i.e., tower elevation.
  • a threat 60 is positioned on a tower 62 having a height H t .
  • Intervisibility is shown as calculated for the fifth data post 12 encountered, with the slope 62 representing S ref , i.e., the lower boundary of the threat detection envelope.
  • the slope S ref is computed generally as follows:
  • reference slope S ref is the slope 62 established by the fourth data post 12 and calculated as follows:
  • H 4 is the height of the fourth data post 12 encountered and the post 12 spacing increment D is multiplied by the integer 4 because the reference slope S ref corresponds to the slope associated with the fourth data post 12.
  • H new corresponds to the height of the data post 12 presently under intervisibility calculation and the value County corresponds to the count value associated with the data post 12 currently under intervisibility calculation.
  • the slope S new for slope 64 is calculated in the example of FIG. 6 as follows:
  • H 5 is the elevation associated with the fifth data post under intervisibility calculation and the denominator is calculated by multiplying the data post 12 spacing D by the integer 5.
  • Intervisibility calculation under the present invention advantageously allows slope comparison and calculation of an intervisibility ground reference value without reference to the actual data post 12 spacing factor D. Multiplying each of the above general equations 1 and 3 for the slopes S ref and S new , respectively, by the data post 12 spacing factor D provides the following relationship discussed more fully hereafter:
  • n . c Countnew - Ht ⁇ &new _
  • each side of the inequality may be multiplied by the post spacing factor D to derive the following:
  • IGR new is the intervisibility ground reference value computed for the data post 12 under consideration. Equation 8 is further simplified as follows:
  • the slope comparison required to identify terrain masked data posts as well as the calculation of an intervisibility ground reference value for a terrain masked data post 12 may be performed simply and efficiently, i.e., without reference to the data post 12 spacing factor D.
  • the post 12 spacing factor D when the post 12 spacing factor D can be taken as a constant, it need not be used in the slope comparison or in calculation of the intervisibility ground reference value.
  • the counter 40 stores a single sealer value reflecting the sample point position along the radial, where value zero equals the threat position and value 255, in the illustrated example, equals the maximum number of posts along a radial.
  • the value held in the radial distance counter 40 is not a true measure of distance, but can be used advantageously as a distance value in calculation under the present invention.
  • an eight bit counter will allow a radial length of 633 meters times 256 or 152,048 meters (approximately 100 miles). This represents the maximum radar range capability supported in use of such a radial distance counter, and is sufficient for the majority of threat installations encountered. As may be appreciated, a larger counter would expand range capability support.
  • the intervisibility ground reference calculation as described thus far does not require any local RAM memory.
  • a single register is required to hold the S ref data value from one post to the next. Therefore, the hardware implementation can forego any local static RAM and the circuitry required to manage it.
  • FIG. 7 illustrates earth curvature E c 70 and radar beam curvature B c 72 with respect to a threat installation 74 and a terrain profile 76.
  • Terrain profile 76 includes a data post 12 establishing a line of sight threat detection envelope 78.
  • Radar curvature can be approximated by adding the difference between the earth's curvature 70 and the radar beam curvature 72. Therefore, the elevation normally associated with each data post 12 under consideration can be modified relative to a given threat position to compensate for earth curvature and radar beam curvature.
  • the term DTED CC is curvature compensated data post 12 elevation
  • the term DTED R is the data post 12 elevation normally stored in the data cache 10
  • the term E R represents an offset for earth curvature
  • the term B CR represents an offset for radar beam curvature.
  • the curvature compensation calculation can provide an earth and radar beam offset from the normal post height or elevation advantageously as a function of only the current radial distance counter value.
  • FIG. 8 illustrates a simple hardware scheme implementing the earth curvature and beam curvature compensation as a function of the radial distance counter 40, i.e., number of steps taken along a radial.
  • the curvature compensation can be precalculated as a function of distance in increments of steps 18 out from the threat position.
  • This data i.e., the term (2E CR +B CR ) is then stored in a PROM 92 addressed by the radial distance counter 40.
  • the curvature compensation data unique for and a function of each radial count value, is subtracted by
  • ALU and multiplier 96 from the DTED data post elevation stored in register 94.
  • the result is the above term DTED CC , used thereafter as data post 12 height when comparing line slopes and computing an intervisibility ground reference values as discussed above.
  • This warps the line of sight or detection envelope boundary 78 into appropriate compensation curvature. It has been determined that this method of approximation works well for radial distances up to 100 nautical miles from the threat position.
  • a reciprocal table 90 addressed by counter 40, delivers the inverse of the radial count value to ALU 96 to avoid a division operation when performing slope comparison, such as in equation 7 above, and intervisibility ground reference value calculation, such as in equation 10 above.
  • FIG. 9 illustrates the general algorithm for executing an intervisibility calculation using a radial scanning pattern as described herein.
  • processing beings at decision block 100 where the total number of radials traversed is compared to a total number expected to be traversed. If all the radials have been traversed processing completes by exiting through the YES branch of decision block 100. Otherwise, processing continues to block 102 wherein the next radial 14 is specified by modifying the angular displacement indication applied to the lookup table 36 (FIG. 3), i.e., ⁇ index .
  • table 36 presents suitable delta X and delta Y values 37 for presentation to XY accumulator 38.
  • the master controller 34 resets the XY accumulator 38 to correspond to the threat position address X threat and Y threat -
  • the master controller 34 asserts the step signal causing accumulator 38 to receive the delta X and delta Y values from lookup table 36 and provide appropriate XY address values 39 to address unit 32.
  • master controller 34 sets the variable S ref to a maximum negative value as an initial reference value.
  • the radial distance counter 40 is reset to zero, and in block 112 the variable IGR (intervisibility ground reference) is set to zero.
  • the variable IGR is then written into data cache 10 as specified by the current X and Y address values for the threat position under consideration.
  • the radial distance counter 40 is then incremented in block 116 to move to the first data post 12 along the designated radial 14 and also, in block 118, suitably increment the X and Y address values 39 presented to address unit 32.
  • master controller 34 then reads data 35 from data cache 10 to obtain the existing IGR value from data cache 10 in addition to the associated elevation data.
  • the earth curvature and radar curvature compensation data are utilized to offset the elevation data obtained from data cache 10 for the currently addressed data post 12. Given this curvature compensated data post elevation data, the variable S new is then calculated in block 124. In decision block 126, the variable S new is compared to the variable S ref .
  • processing branches to block 128 where the value of the variable S new is assigned to the variable S ref .
  • the variable IGR is set to zero to indicate that the data post 12 presently under consideration is visible to the threat installation under consideration.
  • this IGR value is written into data cache 10 and processing continues to block 134.
  • decision block 138 the newly calculated IGR value is compared to the original IGR value for the data post under consideration. If the new IGR value is less than or equal to the original IGR value then processing branches to block 132 where the new IGR value is written into cache 10 to reflect the most conservative IGR to be associated with the data post 12 under calculation. If, however, the new IGR is not less than or equal to the original IGR, then there is no need to modify the existing IGR value in data cache 10 and processing branches directly to block 134.
  • the radial distance counter 40 is again incremented to address the next data post 12 on the radial 14 currently being traversed.
  • the XY address values applied to address unit 32 are incremented to move to the next data post 12 under intervisibility calculation.
  • master controller 34 determines whether or not the current radial 14 has been fully traversed, i.e., examines the value currently held in radial distance counter 40, as an indication of being still within the radar range of the threat under consideration. If the data post currently under consideration is within the radar range of the threat installation under consideration, then processing branches through the YES path from block 142 back to block 120 and continues therefrom.

Abstract

Intervisibility relative to a given threat position is obtained by reference to a digital terrain elevation data (DTED) database by executing radial scan pattern sampling method and calculating intervisibility by slope comparison of lines emanating from the threat position to each data post encountered when traversing a given radial. The greatest magnitude slope encountered along each radial is taken as a reference slope indicating the lower boundary of the threat detection envelope. The slope associated with each data post sampled along the radial is compared to the reference slope. If the reference slope is greater, then the sampled data post is considered hidden. For all hidden data posts a non-zero intervisibility ground reference value is calculated as the vertical separation between the data post elevation and the detection envelope. The method of intervisibility calculation under the present invention is well adapted for implementation in simple, dedicated hardware engines to provide small execution time while ensuring accurate intervisibility results.

Description

INTERVISIBILITY ALGORITHM GOVERNMENT RIGHTS
The United States Government has rights in this invention pursuant to Contract No. F33600-88-G-5107, awarded by the Department of the Air Force. BACKGROUND OF THE INVENTION
The present invention relates generally to a method of aircraft flight management, and particularly to a method of intervisibility calculation with respect to digital terrain elevation data (DTED).
Digital terrain elevation data represents surface elevation at discrete "data posts." Each data post has a surface location or address, e.g., latitude and longitude, and an associated altitude, i.e., relative to sea level. Thus, a simple form of a DTED database would deliver a sealer altitude in response to longitude and latitude input. More complicated DTED databases have been developed for certain applications. For example, U.S. Patent No. 4,899,292 issued February 6, 1990 to J. F. Dawson and E. W. Ronish shows a tessellation method for creating a spherical database by warping a digital map, including digital terrain elevation data, by longitude and latitude parameters.
DTED database systems are used in flight mission computer systems and flight planning strategy in military applications to aid in, for example, covert and evasive flight operations. As used in mission computer systems, a DTED database can aid a pilot in time-critical maneuvers such as terrain following flight or in selecting evasive routes having low observability with respect to a given threat position. Such threat positions may be known in advance and included in the DTED database, or detected while in flight. The computation speed required in accessing and calculating routes or alternatives based on DTED systems can be vitally critical, especially for computations executed repeatedly to keep a pilot fully appraised of current terrain conditions and route alternatives. Thus, improvements in methods of accessing DTED and computations based on extracted DTED are not simply improvements in computational elegance, but can be life-saving and critical to mission success. SUMMARY OF THE INVENTION
The method of the present invention identifies terrain obscured by other terrain with respect to the view of a threat installation, including calculation of the extent of vertical clearance between a threat detection envelope and a given obscured ground point. Under the present invention, a series of radials are identified emanating from a given threat installation, and for each radial identified, data points therealong are visited and an intervisibility calculation performed relative thereto. The intervisibility calculation of the present invention provides a zero value for all data points visited along the radial within view of the threat installation. A non-zero value is provided for each point visited when obscured by intervening terrain, the non-zero value representing a vertical clearance between the data point and the lower boundary of the threat detection envelope thereabove. Each data point visited along each radial, beginmng at a data point nearest the threat installation, is associated with a slope value corresponding to the relative difference in altitude between the threat installation and the data post visited. As the data points are visited in traversing outward along a radial, a maximum previous slope calculated is maintained. For each point visited, the associated slope value is compared to the maintained maximum slope value. If the slope value associated with the current data point is greater than the maintained maximum slope value, then the current data post is considered visible with respect to the threat installation and its slope value is adopted as the maximum slope value. If, however, the slope value for a given data point visited is less than the maintained maximum slope value, then the data point visited is considered terrain masked relative to the threat installation. Furthermore, the maintained maximum slope value represents the threat detection envelope above the data point visited whereby the maintained maximum slope value in conjunction with the slope value associated with the terrain masked data point provides a basis for calculating the vertical separation between the obscured data point visited and the lower boundary of the threat detection envelope. In this manner, the vertical separation value may be stored along with the data point elevation data to indicate not only visibility but also a representation of the extent of terrain masked vertical clearance above the data point.
The subject matter of the present invention is particularly pointed out and distinctly claimed in the concluding portion of this specification. However, both the organization and method of operation of the invention, together with further advantages and objects thereof, may best be understood by reference to the following description taken with the accompanying drawings wherein like reference characters refer to like elements.
BRIEF DESCRIPTION OF THE DRAWINGS For a better understanding of the invention, and to show how the same may be carried into effect, reference will now be made, by way of example, to the accompanying drawings in which:
FIGS. 1-3 illustrate a radial spoke pattern method of and device for accessing digital terrain elevation data.
FIG. 4 illustrates a sectional terrain view showing calculation of intervisibility based on a line slope comparison method of calculation for an intervisibility ground reference value in accordance with the present invention.
FIGS. 5A-5I illustrate computation of intervisibility ground reference values along a first portion of a radial during a radial pattern scan.
FIG. 6 illustrates in greater detail intervisibility calculation at a specific data post during radial traversal.
FIG. 7 illustrates earth curvature and radar curvature compensation for intervisibility calculations as a function of a distance representation provided under the present invention.
FIG. 8 illustrates a hardware implementation of the earth curvature and radar curvature compensation method illustrated in FIG. 7.
FIG. 9 is a flow chart illustrating a radial pattern intervisibility calculation according to the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT The preferred embodiment of the present invention as illustrated in the drawings comprises a method of intervisibility calculation identifying terrain obscured by other terrain with respect to the view of a threat installation. The method of the present invention further identifies the vertical separation between the obscured terrain and a threat installation detection envelope. As may be appreciated, such information can be then used to identify air space supporting a mission route within the range capability of the threat installation, yet obscured from view by the threat installation. This vertical separation or clearance between obscured terrain and a detection envelope thereabove is referred to herein as an "intervisibility ground reference" or IGR value. The data intensive calculation of threat intervisibility in a real time aircraft environment demands a simple dedicated hardware implementation. To keep within strict cost and development schedule requirements, the complexity of the hardware must be held to a minimum. Hardware complexity can be minimized if the operational steps, or algorithm, to perform the task is highly repetitive, has a small number of unique operations to perform, and requires little or no local RAM memory to manage. The method of intervisibility calculation under the present invention exhibits these characteristics and is thereby advantageously implemented in such a simple, dedicated hardware device. A threat intervisibility calculation indicates what terrain surrounding a threat, e.g., anti-aircraft SAM sight, is hidden from the threat sensor equipment, typically a radar-type sensor. Terrain may be hidden from the threat sensor equipment because it is either out of range capability of the threat, or within range but terrain masked relative to the view of the threat installation. The intervisibility calculation allows the pilot to choose a flight path minimizing or avoiding aircraft exposure to threat detection. To properly calculate intervisibility, terrain surrounding the threat must be fully analyzed taking into account such factors as DTED database characteristics, radar range, threat elevation, earth curvature, and radar curvature along the earth's surface. As may be appreciated it is difficult to compensate for all these factors while maintaining reasonable calculation performance, i.e., speed and accuracy, in a simple, dedicated hardware implementation.
Intervisibility calculation in accordance with the present invention shall be illustrated in the context of a radial scan pattern method of accessing DTED database systems. Under a radial scan pattern, a point of interest is selected, e.g., a threat installation, and data sampling occurs along radials emanating from the point of interest and having a length corresponding to, for example, the range capability of the threat installation. While raster scan techniques can be employed to sample and analyze a DTED database, typically addressed in a two-dimensional or XY addressing scheme, radial scan pattern sampling requires less hardware, i.e., memory, and has proven a successful method of scanning and analyzing DTED database systems for intervisibility calculations. FIGS. 1-3 illustrate a hardware design and method for executing a radial scan pattern in sampling a DTED database during intervisibility calculation relative to a threat installation. In FIG. 1, a data cache 10 contains a relevant portion of a DTED database comprising a plurality of data posts 12 individually addressable according to a two dimensional, i.e., X and Y, addressing scheme. In execution of a radial scan intervisibility calculation, a threat installation is identified at the data post 12a with a given range capability indicated as Rthreat- In the illustrated example, the distance Rthreat corresponds to 146 data posts 12. A radial scan is then executed by taking data samples along a set of radials 14 originating at the threat position 12a and extending a distance corresponding to Rthreat? i-e-> extending 146 posts from point 12a. A complete intervisibility calculation is thereby executed across a 360 scan 16. A partial intervisibility calculation may be executed by traversing only a portion of selected radials 14 emanating from data post 12a. Such a partial intervisibility calculation may include a contiguous sector of adjacent radials 14, or may comprise various sets of radial 14 sectors, i.e., various "pie slices" from the area surrounding data post 12a. The specific radials 14 traversed and the pattern of radials 14 traversed may, therefore, vary according to the type of intervisibility calculation required and execution time allowed. The following discussion will focus primarily upon calculations performed while traversing one radial 14. In FIG. 2, a sample step 18 corresponds to the spacing between data posts 12 along, for example, vertical radial 14a, i.e., parallel to the Y axis as indicated in FIG. 1. The same number of steps 18 are taken along each radial 14 to sample out to a given distance Rthreat- The method of traversing a constant radial 14 length as a function of a constant number of steps 18 allows, as will be apparent from the following discussion, a simple hardware mechanism for traversing radials 14 out to the distance Rthreat- Thus, as each sample 20 is taken from the data cache 10, an intervisibility calculation may be performed relative to that sample. The angular increment between radials 14 is selected, taking into account the magnitude of sample step 18, to assure complete data post 12 visitation throughout the range capability of the threat at data post 12a. The magnitude of sample step 18 is preferably equal to data post 14 spacing as discussed above, and the angular increment between radials is selected to insure that all data posts within the radius Rthreat are visited in the radial scan. Computer simulation has proven helpful in establishing the angular increment between radials 14 as a function of step 18 magnitude and R^reat magnitude. While some data post 12 revisitation does occur under this method due to the density of radials 14 near the post 12a, it is considered better to have some data post 12 revisitation than to have a failure to visit all data posts 12 within the radius Rthreat- Furthermore, some data posts 12 may be within the range capability of more than one threat installation, and it is desirable to always calculate an intervisibility result for each data post visited, regardless of a prior visitation of that data post, to insure that a most conservative intervisibility result is stored for each data post 12. FIG. 3 illustrates in block diagram the hardware implementation of a radial scanner 30. Radial scanner 30 receives externally 3 values identifying a threat installation position, i.e., Xthreat and Nthreat! and the range capability of that installation, i.e., Rthreat Data cache 10 is accessed by way of address unit 32 providing X and Y address values 33 corresponding to the data posts 12 within cache 10. Data cache 10 in turn provides intervisibility input data 35, including X and Y location values and at least an elevation value for each data post 12 addressed by address unit 32. Intervisibility input data 35 may further include a prior intervisibility calculation (not shown in FIG. 3) for the data post currently visited and previously stored in cache 10. A master controller 34 thereby selects a most conservative intervisibility calculation by comparing a prior intervisibility result with a current intervisibility result. Thus, for a data post 12 lying within the range capability of more than one threat installation, the resulting intervisibility data stored in the DTED database 10 will provide a most conservative representation of intervisibility for that data post.
Master controller 34 selects a suitable angular increment between radials 14 to accomplish complete data post visitation as a function of the magnitude of the value
Rthreat- The 360° scan 16 is accomplished by sequentially sampling at increments of step 18 along the length of each of a plurality of radials 14 separated by this angular increment.
The angular orientation of each radial 14 traversed is applied in some fashion to a delta XY lookup table 36. Based on this angular orientation, lookup table 36 provides appropriate delta X and delta Y values 37 required to step or sample along the current radial 14 at increments of sample step 18. In the illustrated example, master controller 34 applies a control input Θindex to table 36 to determine the output of table 36. Thus, the control input Θindex could be a clock signal to increment a counter for addressing table 36, or could be an actual address value for accessing table 36. In any case, master controller 34 causes table 36 to output suitable delta X and delta Y values 37 corresponding to the angular orientation of the radial 14 currently being traversed. An
XY accumulator 38 sums a series of delta X and a series of delta Y values received from table 36 for application as address values 39 to address unit 32. As may be appreciated, the values presented to and accumulated in XY accumulator 38 represent real number values whereas the values 39 provided to address unit 32 by XY accumulator 38 are truncated to provide suitable integer address values for application to data cache 10. A radial distance counter 40 monitors the progress along each radial 14, i.e., counts the steps 18, and allows master controller 34 to detect when a scan along the full length, i.e., out to the distance R^an of a radial 14 is complete. After each radial 14 is scanned, a new Θindex is applied to the table 36, the counter 40 is reset, and scanning is executed along the next radial 14. After all radials 14 have been scanned in this manner, a complete intervisibility calculation 42 for the threat at post 12a is available. More particularly, and as will be discussed more fully hereafter, an intervisibility calculation is performed on a post-by-post basis whereby master controller 34 may write for each data post sampled appropriate intervisibility data back into data cache 10. This intervisibility data may be employed directly to drive a display relative to the threat installation analyzed, or may be simply retained in data cache 10 for other uses.
An intervisibility calculation is thereby executed at each data post 12 in the threat range R^reat to identify all terrain masked regions within the threat range. The method of the present invention provides an "intervisibility ground reference" or IGR value representing the vertical distance or clearance between a terrain masked data post and the threat detection envelope thereabove. This intervisibility ground reference value for each data post 12 can be stored on a one-to-one basis with the DTED database records and used, for example, in aircraft instrument display or in selecting a terrain following route masked with respect to specific threat installations. Each intervisibility ground reference value thereby relates two specific data posts 12, one post being a data post 12 sampled during the radial scan and associated or stored with the intervisibility ground reference value and the other post being the data post 12 associated with a threat installation, e.g., post 12a. In this manner, each data post 12 within the distance Rt reat °f the data post 12a may be identified as being either visible or hidden from view relative to the threat.
The intervisibility calculation under the present invention provides a zero value intervisibility ground reference for all data posts 12 identified as being visible with respect to the threat installation. A non-zero intervisibility ground reference value (IGR) indicates terrain masking of the corresponding data post 12 relative to a threat installation. The magnitude of the non-zero IGR value represents a vertical distance between the given data post and the lower boundary of the threat detection envelope thereabove. The intervisibility ground reference value is independent of aircraft position and altitude and useful generally in selecting terrain-masked routes within a threat installation range capability. The intervisibility of terrain surrounding a given threat installation need only be calculated once when the threat is first identified, and also when its position or elevation has changed. These properties of intervisibility calculation under the present invention greatly reduce the throughput requirements of the intervisibility calculation because most threats are stationary during the time-frame of a given mission.
FIG. 4 illustrates sampling along one of the radials 14 and calculation of an intervisibility ground reference value for only the first eleven data post 12 visited along the radial 14, it being understood that an intervisibility calculation is executed for all data posts 12 visited along each radial 14 traversed. FIG. 4 is a terrain elevation cross- section profile taken through the data post 12a and along the radial 14a showing relative elevation among the data posts 12 along a given radial 14 and the threat installation at the data post 12a. The radial scan pattern method of accessing the cache 10 selects data posts 12b- 12k as the first 11 data posts 12 lying on the given radial 14. Each of the data posts 12 lying along the radial 14 are associated with a slope value relative to the threat 12a. These slope values are indicated graphically in FIG. 4 as the lines or slopes SI -SI 1 emanating from the post 12a and extending to the elevation of each of the data posts 12b- 12k, respectively. Each new slope, designated Snew, calculated while working out from the threat position, is compared to a prior greatest magnitude reference slope, designated Sref. If Snew is greater than or equal to Sref, then the terrain at the data post associated with Sref is considered "visible" to the threat sensor. For this visible case, the Sref value is replaced with the current Snew value and an intervisibility ground reference value for that post is set to zero. If Snew is less than Sref, then the data post is considered "hidden" from sensor view. When beginning traversal of a new radial 14, the Sref variable is set to a maximum negative value. Thus, the first data post encountered along a radial is deemed "visible" to the threat and provides the first reference slope Sref for subsequent data samples 20 taken.
The data posts 12b-12i all receive a zero magnitude intervisibility ground reference values because an unobscured line of sight exists between each of data posts 12b-12i and the threat installation at data post 12a. Data posts 12j and 12k, however, are terrain masked with respect to the threat installation at data post 12a. Accordingly, data posts 12j and 12k will receive non-zero intervisibility ground reference values. For data post 12j, the intervisibility ground reference value 20 corresponds to the distance between the data post 12j and the threat detection envelope 22. For data post 12k, the intervisibility ground reference value 24 corresponds to the distance between data post
12k and the detection envelope 22.
Once an intervisibility ground reference value is calculated, it is stored in the DTED database 10. This is easily accomplished by making the DTED database memory deep enough to store the associated intervisibility ground reference value with the DTED data post elevation data. By definition, if a DTED data post is hidden from a sensor and is within range of the sensor, its associated intervisibility ground reference value will be non-zero. If the post is visible to the sensor, then the intervisibility ground reference value will be zero. Note that for each DTED data post 12 visited, a read- modify-write operation is performed on the DTED database memory. In the case of terrain in the detection range of several threats, the algorithm of the present invention compares the intervisibility ground reference value already stored for a given data post 12, i.e., as derived in previous intervisibility calculations with respect to other threats, with the newly calculated intervisibility ground reference value from the threat currently under consideration. If the previous intervisibility ground reference value is less than the current intervisibility ground reference value, then the previous intervisibility ground reference value is maintained in memory. If the new intervisibility ground reference value is less than the previous intervisibility ground reference value, then the new intervisibility ground reference value is written into memory, destroying the previous value. This assures the most conservative and safest intervisibility calculation at any particular data post 12.
FIGS. 5A-5I illustrate successive intervisibility calculations by slope comparison at the first through tenth, respectively, data posts 12 encountered while traversing a given radial 14. A terrain profile 32 is shown in FIGS. 5A-5I as a collection of data posts 12 lying along radial 14. The horizontal axis of each of FIGS. 5A-5I corresponds to the distance of the corresponding data post 12 relative to the threat 30 in step 18 units. More particularly, the horizontal axis represents the distance from the threat 30 expressed in increments of data post 12 spacing, i.e., the content of radial distance counter 40 (FIG. 3). The vertical axis of FIGS. 5A-5I corresponds to elevation in meters.
FIG. 5 A shows intervisibility calculation at the second data post 12 encountered along a radial 14. The first data post 12 encountered establishes slope 43 as a first reference slope Sref. Thus, at this time slope Sref corresponds to the slope 43, a line connecting threat 30 and the first data post 12. The slope 45 is taken as the current slope Snew and corresponds to the slope between threat 30 and the second data post 12 encountered. Because Snew (slope 45) is greater than Sref (slope 43), Snew will be taken as the new reference slope Sref. In FIG. 5B, intervisibility calculation at the third data post 12 takes slope 45 as the reference slope Sref and slope 44 as slope Snew. Because slope
44 exceeds slope 45, slope 44 becomes the reference slope Sref.
FIG. 5C shows intervisibility calculation at the fourth data post 12 encountered along the radial 14. Previously, the slope 44, being the greatest magnitude slope encountered thus far, was identified as the reference slope Sref. Slope 46, associated with the fourth data post, is taken as the current slope Snew. Because slope 46 is greater than slope 44, i.e., slope Snew greater than slope Sref, the forth data post is taken as being visible with respect to threat 30. In FIG. 5D, slope 48 associated with the fifth data post assumes the status of slope Snew and is greater than the previous slope Sref, i.e., slope 46, and the fifth data post is taken as being visible with respect to threat 30. Also, slope 48 is now taken as the reference slope Sref.
FIG. 5E shows analysis at the sixth data post 12 encountered where the slope 50, currently slope Snew, is less than the previously identified slope 48, currently slope Sref. The sixth data post encountered, therefore, is considered terrain masked with respect to the detection envelope of threat 30. Also, an intervisibility ground reference value 54 may be computed for the sixth data post 12 as a representation of the vertical spacing between the sixth data post 12 and the detection envelope of the threat 30 thereabove. Turning to FIG. 5F, an intervisibility ground reference value 56 is calculated for the seventh data post 12. Note, the slope 48 remains as the reference slope Sref, i.e., the greatest magnitude slope encountered thus far, and therefore as a representation of the lower boundary for the detection envelope of threat 30. FIGS. 5G-5H illustrate further steps at the eighth and ninth data posts 12 encountered. Each of the eighth and ninth data posts are associated with slopes less than slope 48, i.e., less than reference slope
Sref, and is considered terrain masked with respect to the threat 30. As shown in FIG. 51, the tenth data post 12 encountered is associated with a slope equal to the current reference slope Sref, and is therefore taken as being visible with respect to threat 30. The combined intervisibility ground reference values associated with the sixth through tenth data posts encountered indicate a vertical plane through which an aircraft may fly undetected by the threat 30, yet be within its range capabilities. Taken with other intervisibility ground reference values obtained for data posts 12 along other radials 14, a volume of terrain masked space surrounding threat 30 and within the range capability of threat 30 may be identified. FIG. 6 illustrates calculation of a particular intervisibility ground reference value taking into account threat elevation, i.e., tower elevation. In FIG. 6, a threat 60 is positioned on a tower 62 having a height Ht. Intervisibility is shown as calculated for the fifth data post 12 encountered, with the slope 62 representing Sref, i.e., the lower boundary of the threat detection envelope. The slope Sref is computed generally as follows:
Figure imgf000013_0001
(J)
where Href represents elevation for the data post 12 establishing the reference slope, Ht represents tower 62 height, Count,.ef represents a distance from the threat 60 to the data post 12 establishing the reference slope expressed as a multiple of whole increments D, and D represents data post 12 spacing. In the example of FIG. 6, reference slope Sref is the slope 62 established by the fourth data post 12 and calculated as follows:
_ _ H4 - H,
^ref " ^~
4 • D (2)
where H4 is the height of the fourth data post 12 encountered and the post 12 spacing increment D is multiplied by the integer 4 because the reference slope Sref corresponds to the slope associated with the fourth data post 12.
The general equation for calculation of the slope Snew is as follows: = Hnew " Ht ,-..
Countnew * υ
where Hnew corresponds to the height of the data post 12 presently under intervisibility calculation and the value County corresponds to the count value associated with the data post 12 currently under intervisibility calculation.
The slope Snew for slope 64 is calculated in the example of FIG. 6 as follows:
Hs - H« new
D (4)
where H5 is the elevation associated with the fifth data post under intervisibility calculation and the denominator is calculated by multiplying the data post 12 spacing D by the integer 5.
Intervisibility calculation under the present invention advantageously allows slope comparison and calculation of an intervisibility ground reference value without reference to the actual data post 12 spacing factor D. Multiplying each of the above general equations 1 and 3 for the slopes Sref and Snew, respectively, by the data post 12 spacing factor D provides the following relationship discussed more fully hereafter:
(5)
D • sref = CθUntref ' Ht Countref
n . c = Countnew - Ht ^ &new _
Countnew A compare operation must be performed for each slope Snew calculated to identify terrain masked with respect to the threat installation. The following compare operation returns a false result for terrain masked with respect to the threat under consideration:
-----ref — new (6)
From the above general equations 1 and 3 for slopes Sref and Snew, respectively, the following substitution results:
Countref - Ht Countnew ~ Ht Countref • D Countnew * D
Because the data post 12 spacing D is always positive, each side of the inequality may be multiplied by the post spacing factor D to derive the following:
Countref - Ht < Countnew - Ht
Countref Countnew (7)
The initial compare operation performed for each data post 12 visited along a given radial 14, i.e., is then a function of equation 6 above. Those data posts 12 identified as being terrain masked with respect to the threat under consideration are then associated with a non-zero intervisibility ground reference value as calculated under the following equation:
IGRnew = [Sref • (Countnew D)] - [Snew • (Countnew • D)] (8)
where IGRnew is the intervisibility ground reference value computed for the data post 12 under consideration. Equation 8 is further simplified as follows:
= [Sref " Snew] # Countnew * D
= (D • Sref) " (D • Snew) CoWltnew (9) The terms (D-Sref) and (D-Snew) can be substituted from the above derived equation 5 as follows:
IΓΏ - Countref - Ht Countnew - Ht r n
IGRnew - — ~ ~ * Countnew ")
Countref Countnew
Thus, the slope comparison required to identify terrain masked data posts as well as the calculation of an intervisibility ground reference value for a terrain masked data post 12 may be performed simply and efficiently, i.e., without reference to the data post 12 spacing factor D.
Thus, when the post 12 spacing factor D can be taken as a constant, it need not be used in the slope comparison or in calculation of the intervisibility ground reference value. This simplifies the hardware implementation by allowing the counter 40 (FIG. 3) to represent radial distance. The counter 40 stores a single sealer value reflecting the sample point position along the radial, where value zero equals the threat position and value 255, in the illustrated example, equals the maximum number of posts along a radial. Thus, the value held in the radial distance counter 40 is not a true measure of distance, but can be used advantageously as a distance value in calculation under the present invention. If the post spacing is 633 meters, for example, then an eight bit counter will allow a radial length of 633 meters times 256 or 152,048 meters (approximately 100 miles). This represents the maximum radar range capability supported in use of such a radial distance counter, and is sufficient for the majority of threat installations encountered. As may be appreciated, a larger counter would expand range capability support.
The intervisibility ground reference calculation as described thus far does not require any local RAM memory. A single register is required to hold the Sref data value from one post to the next. Therefore, the hardware implementation can forego any local static RAM and the circuitry required to manage it.
An accurate intervisibility calculation must include earth curvature and also radar beam refraction according to altitude dependent atmospheric density changes causing the radar beam to curve downward toward the earth as it moves away from the transmitter or the return source. Both of these factors become more pronounced as a function of distance. FIG. 7 illustrates earth curvature Ec 70 and radar beam curvature Bc 72 with respect to a threat installation 74 and a terrain profile 76. Terrain profile 76 includes a data post 12 establishing a line of sight threat detection envelope 78. When the DTED database is a flat earth model, earth curvature can be approximated by subtracting the difference between the line of sight ray 78 and the earth's surface, i.e., data post elevation, from the DTED post elevation. Radar curvature can be approximated by adding the difference between the earth's curvature 70 and the radar beam curvature 72. Therefore, the elevation normally associated with each data post 12 under consideration can be modified relative to a given threat position to compensate for earth curvature and radar beam curvature. The following equation modifies data post 12 elevation including compensation for earth curvature Ec 70 and radar beam curvature Bc 72: DTEDcc = (DTEDR - ECR) + (BCR - ECR)
= DTEDR - (2 ECR + BCR) (11)
where the term DTEDCC is curvature compensated data post 12 elevation, the term DTEDR is the data post 12 elevation normally stored in the data cache 10, the term E R represents an offset for earth curvature, and the term BCR represents an offset for radar beam curvature. The curvature compensation calculation can provide an earth and radar beam offset from the normal post height or elevation advantageously as a function of only the current radial distance counter value.
FIG. 8 illustrates a simple hardware scheme implementing the earth curvature and beam curvature compensation as a function of the radial distance counter 40, i.e., number of steps taken along a radial. The curvature compensation can be precalculated as a function of distance in increments of steps 18 out from the threat position. This data, i.e., the term (2ECR+BCR), is then stored in a PROM 92 addressed by the radial distance counter 40. As data samples are taken along a radial, the curvature compensation data, unique for and a function of each radial count value, is subtracted by
ALU and multiplier 96 from the DTED data post elevation stored in register 94. The result is the above term DTEDCC, used thereafter as data post 12 height when comparing line slopes and computing an intervisibility ground reference values as discussed above. This warps the line of sight or detection envelope boundary 78 into appropriate compensation curvature. It has been determined that this method of approximation works well for radial distances up to 100 nautical miles from the threat position. Also shown in FIG. 8, a reciprocal table 90, addressed by counter 40, delivers the inverse of the radial count value to ALU 96 to avoid a division operation when performing slope comparison, such as in equation 7 above, and intervisibility ground reference value calculation, such as in equation 10 above.
FIG. 9 illustrates the general algorithm for executing an intervisibility calculation using a radial scanning pattern as described herein. In FIG. 9, processing beings at decision block 100 where the total number of radials traversed is compared to a total number expected to be traversed. If all the radials have been traversed processing completes by exiting through the YES branch of decision block 100. Otherwise, processing continues to block 102 wherein the next radial 14 is specified by modifying the angular displacement indication applied to the lookup table 36 (FIG. 3), i.e., Θindex. In response, table 36 presents suitable delta X and delta Y values 37 for presentation to XY accumulator 38. In block 104, the master controller 34 resets the XY accumulator 38 to correspond to the threat position address Xthreat and Ythreat- Continuing to block 106, the master controller 34 asserts the step signal causing accumulator 38 to receive the delta X and delta Y values from lookup table 36 and provide appropriate XY address values 39 to address unit 32. In block 108 master controller 34 sets the variable Sref to a maximum negative value as an initial reference value. In block 110 the radial distance counter 40 is reset to zero, and in block 112 the variable IGR (intervisibility ground reference) is set to zero. In block 114 the variable IGR is then written into data cache 10 as specified by the current X and Y address values for the threat position under consideration. The radial distance counter 40 is then incremented in block 116 to move to the first data post 12 along the designated radial 14 and also, in block 118, suitably increment the X and Y address values 39 presented to address unit 32. Continuing to block 120, master controller 34 then reads data 35 from data cache 10 to obtain the existing IGR value from data cache 10 in addition to the associated elevation data. In block 122, the earth curvature and radar curvature compensation data are utilized to offset the elevation data obtained from data cache 10 for the currently addressed data post 12. Given this curvature compensated data post elevation data, the variable Snew is then calculated in block 124. In decision block 126, the variable Snew is compared to the variable Sref. If Snew is greater than or equal to Sref, then processing branches to block 128 where the value of the variable Snew is assigned to the variable Sref. In block 130, the variable IGR is set to zero to indicate that the data post 12 presently under consideration is visible to the threat installation under consideration. In block 132, this IGR value is written into data cache 10 and processing continues to block 134.
Returning to decision block 126, if the variable Snew is not greater than or equal to the variable Sref, processing branches to block 136 where a non-zero IGR value is computed for the data post under consideration, i.e., for a data post considered terrain masked with respect to the threat installation under consideration. In decision block 138, the newly calculated IGR value is compared to the original IGR value for the data post under consideration. If the new IGR value is less than or equal to the original IGR value then processing branches to block 132 where the new IGR value is written into cache 10 to reflect the most conservative IGR to be associated with the data post 12 under calculation. If, however, the new IGR is not less than or equal to the original IGR, then there is no need to modify the existing IGR value in data cache 10 and processing branches directly to block 134.
In block 134, the radial distance counter 40 is again incremented to address the next data post 12 on the radial 14 currently being traversed. As a result, and as indicated in block 140, the XY address values applied to address unit 32 are incremented to move to the next data post 12 under intervisibility calculation. In decision block 142, master controller 34 determines whether or not the current radial 14 has been fully traversed, i.e., examines the value currently held in radial distance counter 40, as an indication of being still within the radar range of the threat under consideration. If the data post currently under consideration is within the radar range of the threat installation under consideration, then processing branches through the YES path from block 142 back to block 120 and continues therefrom. If, however, the current radial has been fully traversed, then processing branches through the NO branch of the decision block 142 and returns to the decision block 100 and processing continues' therefrom. This invention has been described herein in considerable detail in order to comply with the Patent Statutes and to provide those skilled in the art with the information needed to apply the novel principles and to construct and use such specialized components as are required. However, it is to be understood that the invention is not restricted to the particular embodiment that has been described and illustrated, but can be carried out by specifically different equipment and devices, and that various modifications, both as to the equipment details and operating procedures, can be accomplished without departing from the scope of the invention itself.

Claims

1. A method of calculating intervisibility of a given set of points relative to a threat point, a threat installation being located at said threat point and having a given visibility range capability, the method comprising the steps: identifying a radial extending from said threat point a distance corresponding to said given range capability and visiting points along said radial; calculating for each point visited a slope value corresponding to a difference in height between said threat point and said point visited; comparing for each point visited the corresponding calculated slope with a selected maximum slope value, said selected maximum slope value for a given point visited being the greatest slope value calculated for a set of points intermediate said threat point and said given point; establishing visibility of each point visited as a function of said comparing step.
2. A method according to claim 1 wherein said method further comprises further the step of identifying additional radials extending from said threat point and, for each additional radial, executing the steps of calculating, comparing, and establishing for each point visited along each additional radial.
3. A method according to claim 1 comprising an additional step of: calculating a ground reference value for at least one point visited, said ground reference value corresponding to a vertical clearance between said at least one point visited and a threat detection envelope thereabove as represented by the selected maximum slope for associated with said at least one point visited.
4. A method according to claim 3 wherein said ground reference value is stored in a data structure storing information relative to said at least one point visited.
5. A method of accessing a digital terrain elevation data base to establish visibility of data posts therein relative to a given threat installation, each data post having an associated altitude and associated position, the method comprising the steps: identifying a first data post corresponding in position to said given threat installation; identifying a set of data posts lying along a radial extending from said first data post; visiting each data post along said radial successively beginning at a second data post closest to said first data post; calculating for each data post visited a slope value corresponding the relative position and height of said first data post; maintaining a maximum slope value as the greatest one of said slope values calculated while visiting each data post along said radial; comparing for each data post visited its calculated slope relative to said first data post with the currently maintained maximum slope value; and establishing as visible each data post visited when its calculated slope relative to said first data post is greater than the currently maintained maximum slope value and as not visible when its calculated slope relative to said first data post is less than the currently maintained maximum slope value.
PCT/US1995/000709 1994-01-18 1995-01-17 Intervisibility algorithm WO1995019546A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US18353294A 1994-01-18 1994-01-18
US08/183,532 1994-01-18

Publications (1)

Publication Number Publication Date
WO1995019546A1 true WO1995019546A1 (en) 1995-07-20

Family

ID=22673205

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1995/000709 WO1995019546A1 (en) 1994-01-18 1995-01-17 Intervisibility algorithm

Country Status (2)

Country Link
IL (1) IL112185A0 (en)
WO (1) WO1995019546A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2826762A1 (en) * 2001-06-29 2003-01-03 Thales Sa METHOD FOR SYNTHESIZING AN INTERVISIBILITY IMAGE
US7242407B2 (en) 2004-05-28 2007-07-10 Lockheed Martin Corporation Reprojecting map images using graphical techniques
US7280897B2 (en) 2004-05-28 2007-10-09 Lockheed Martin Corporation Intervisibility determination
US7305147B2 (en) 2001-06-29 2007-12-04 Thales Zooming method
US7486840B2 (en) 2004-05-28 2009-02-03 Lockheed Martin Corporation Map image object connectivity
US7492965B2 (en) 2004-05-28 2009-02-17 Lockheed Martin Corporation Multiple map image projecting and fusing

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0337338A2 (en) * 1988-04-11 1989-10-18 Hughes Aircraft Company Method for displaying intervisibility data

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0337338A2 (en) * 1988-04-11 1989-10-18 Hughes Aircraft Company Method for displaying intervisibility data

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "Terrain Exposure Factor", IBM TECHNICAL DISCLOSURE BULLETIN, vol. 37, no. 1, NEW YORK, US, pages 649 - 652 *
ANONYMOUS: "Three-Dimensional Intervisibility Algorithm.", IBM TECHNICAL DISCLOSURE BULLETIN, vol. 34, no. 2, NEW YORK, US, pages 61 - 66 *
LIBBY V ET AL: "Real-time inter visibility calculations for ground-based radar systems", PROCEEDINGS OF THE SPIE - THE INTERNATIONAL SOCIETY FOR OPTICAL ENGINEERING, 1993, USA, vol. 1955, ISSN 0277-786X, pages 318 - 323 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2826762A1 (en) * 2001-06-29 2003-01-03 Thales Sa METHOD FOR SYNTHESIZING AN INTERVISIBILITY IMAGE
WO2003003312A1 (en) * 2001-06-29 2003-01-09 Thales Method for synthesizing an intervisibility image
US7084871B2 (en) 2001-06-29 2006-08-01 Thales Method for synthesizing an intervisibility image
US7305147B2 (en) 2001-06-29 2007-12-04 Thales Zooming method
US7242407B2 (en) 2004-05-28 2007-07-10 Lockheed Martin Corporation Reprojecting map images using graphical techniques
US7280897B2 (en) 2004-05-28 2007-10-09 Lockheed Martin Corporation Intervisibility determination
US7486840B2 (en) 2004-05-28 2009-02-03 Lockheed Martin Corporation Map image object connectivity
US7492965B2 (en) 2004-05-28 2009-02-17 Lockheed Martin Corporation Multiple map image projecting and fusing
US8010244B2 (en) 2004-05-28 2011-08-30 Lockheed Martin Corporation Intervisibility determination

Also Published As

Publication number Publication date
IL112185A0 (en) 1995-03-15

Similar Documents

Publication Publication Date Title
US5526260A (en) Device executing intervisibility calculation
US5719949A (en) Process and apparatus for cross-correlating digital imagery
EP0611021A2 (en) Image generator
US20050267652A1 (en) Intervisibility determination
JPH09504388A (en) Weather simulation system
US8290304B2 (en) Iterative region-based automated control point generation
KR920008205B1 (en) Method for displaying intervisibility data
WO1995019546A1 (en) Intervisibility algorithm
Huss et al. Effect of database errors on intervisibility estimation
EP0655714A1 (en) Transformation of digital terrain elevation data to reveal areas of low observability
US5630035A (en) Method of sampling a terrain data base
Shannon et al. Minimum altitude visibility diagram—MAVD
Altay et al. Geoadjust: Adjusting for positional uncertainty in geostatistial analysis of dhs data
Boldi et al. An automated, operational two hour convective weather forecast for the corridor integrated weather
Janlov et al. Developing military situation picture by spatial analysis and visualization
Leary et al. Search for a stealthy flight path through a hostile radar defense network
WO1995019610A1 (en) Optimized radial scan technique
Rančić et al. Clouds visualization for hail suppression purposes
KR20220150758A (en) Method for decisioning line of sight on 3d map
Massey Validation of a climate model for extreme event attribution studies
Freeman A heuristic route planning model for simulating cruise missile flight paths
Simon et al. Effects of magnification and observation time on target identification in simulated orbital reconnaissance
Sheffer Jr et al. Simulation of laser radar imagery
Patz et al. Real Scan Evolution
Eerola Description of the TRT track trigger simulation in ATRIG

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): CA JP

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA