Abstract: The present disclosure discloses a system for threat computation for aerial objects (AOs) where an input is received fromsensorsthat pertains to a classification information of the AOs. Compute from the received input a second set of data packets pertaining to threat information associated witheach of the AOs. Determine a final threat index for each of the AOs based on the threat information computed for each of the AOs andassign a priority level based on the final threat index computed for each of the AOs. Assign a group to each of the AOs based on a mapping provided in the dataset and the final threat index computed for each of the AOs.
Claims:1. A system for threat computation for one or more aerial objects (AOs), said system comprising:
one or more processors operatively coupled to a memory storing a set of executable instructions, wherein one or more processors are configured to:
receive an input from one or more sensors;
extract, from the received input, a first set of data packets pertaining to a classification information of the AOs;
compute, from the received input, a second set of data packets pertaining to threat information associated to each of the AOs;
determine a final threat index for each of the AOs based on the threat information computed for each of the AOs;
maintain a dataset based on the second set of data packets, wherein the dataset comprises a plurality of groups, wherein each of the plurality of groups correspond to a range of a final threat index values; and
assign a priority level based on the final threat index determined for each of the AOs.
2. The system of claim 1, wherein the classification information comprises a classification of each of the AOs, where each of the AOs is classified as any of a friend AO, a hostileAO or an unknown AO.
3. The system of claim 2, wherein the classification information is computed for each of the AOs based on an IFF response, a flight plan and/or a flight corridor.
4. The system of claim 1, wherein the threat information comprises computation of a threat index for each of a plurality of threat parameters.
5. The system of claim 4, wherein the plurality of threat parameters comprises a distance of at least one of an AO of the one or more AOs from a zone, time taken by the at least one of the AO to reach a zone, a distance of the at least one of the AO from a zone center, time taken by the at least one of the AO to reach a zone center, velocity of the at least one of the AO of the one or more AOs, height of the one or moreAOs, origin sector of the one or more the AOs, current sector of the one or more AOs, approaching direction of the one or more AOs, size of a formation of a group of the one or moreAOs, a type of ammunition carried by the one or moreAOs, ammunition carrying capacity of the one or more AOs and/or a jamming capability of the one or more AOs.
6. The system of claim 5, wherein the final threat index is computed by summing the computed threat index for each of the plurality of threat parameters for each of the one or more AOs.
7. The system of claim 6, wherein the priority level assigned to each of the AOs of the one or more AOs comprisesany of a first priority level, a medium priority level and a low priority level.
8. The system of claim 7, wherein the system comprises a fire control system to implement a set of instructions for each of the one or moreAOs assigned to a group from the plurality of groups based on the classification information associated with each of the AOs.
9. The system of claim 8, wherein the system facilitates to receive a user input to override the group assigned to at least one of the AOs.
10. A method for threat computation for one or more aerial objects (AOs), said method comprising the steps of:
receiving, from one or more sensors, an input data associated to one or more aerial objects (AOs);
extracting, at a processor, a first set of data packets pertaining to a classification information of the AOs associated with the received input data;
computing, at the processor, a second set of data packets pertaining to threat information associated with the received input data;
determining, at the processor, a final threat index for each of the AOs based on the threat information computed for each of the AOs;
maintaining, at the processor, a dataset based on the computed second set of data packets, wherein the dataset comprises a plurality of groups, wherein each of the plurality of groupsis corresponds to a range of a final threat index values; and
assigning, at the processor, a priority level based on the final threat index computed for each of the AOs.
, Description:FIELD
[0001] The present invention relates to air defence systems, and more particularly pertains to a threat computation system which incorporates knowledge of databases or techniques in the solution.
BACKGROUND OF THE INVENTION
[0002] Background description includes information that may be useful in understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art.
[0003] Defence systems which effectively defend strategic assets under modern battlefield conditions are under constant threat of attack by offensive weapons having various destructive capabilities.Such attacks may be directed by an enemy at any instant of time. Air borne offensive weapons have different ranges, altitudes and closing speeds. Typical airborne offensive weapons include guided, homing and ballistic missiles, bombs and artillery shells; armored vehicles or ships; torpedoes, etc. Types of warhead carried by these offensive weapons may be conventional explosives, CBN (chemical, biological, nuclear), and ECM (Electronics counter measures) and ECCM (Electronic counter-counter measures) apparatus.To avert such offensive attack by an air borne weapon at a defended area, automatic threat detection systems are used. A typical automatic threat detection system detects an air object which may enter a defended area and computes a threat index. If the threat index of the air object breaches certain predetermined value, then it is declared as hostile and a fire control systemis triggered.
[0004] As is disclosed in US5992288 is a knowledge based threat evaluation and weapon assignment (TEWA) system and method. Upon identification of ahostile class track, if the track is outside national boundaries or defensive zones, a threat index is calculated to evaluatethe threat. The index considers tracks speed, heading,altitude, and any known amplifying information such as a flight size, an airframe type, weapons load or missile type, and the like. Here, if athreat enters a defensive zone, it becomes a target and a trial intercept calculation is calculated against the target.
[0005] As is disclosed in KR20140074036A is a technique of threat computation. The threat computation of target uses target attributes information, a fuzzy inference technique, an attack capability and proximity of the target. The attack capability of the target is derived using a predetermined CPT (conditional probability table) with respect to a Bayesian network and nodes. Target attribute information includes information related to distance, direction of motion of the target, altitude and altitude variation. An attack capability takes into account importance of the protected assets, inorganic range, speed change amount and If Friend or Foe (IFF).
[0006] However, such conventional automatic threat detection do not account for target maneuver. Consequently, upon threat detection, if the target maneuvers, the threat detection may no longer be valid for the manoeuvred air object. Moreover, once a threat detection is completed, the air object is no longer be tracked for automatic threat evaluation processing. Hence, such missed air object may lead to an offensive attack which is undesirable.
[0007] Therefore, theconventional systems fail to account for targets which have manoeuvred with respect to their location. Hence, there is a need for a method and a system for threat computation which is precise and accurate in averting any offensive attack by an airborne object.
OBJECTS OF THE PRESENT DISCLOSURE
[0008] Some of the objects of the present disclosure are aimed to provide mitigate one or more problems of the prior art or to at least provide a useful alternative and are listed herein below.
[0009] An object of the present disclosure is to provide a system and method that facilitates classification, computation and assessment of threat and prioritization of aerial objects (AOs) in an accurate manner.
[00010] Another object of the present disclosure is to provide a system and method that facilitates using databases for classification, computation and assessment of threat and prioritization of aerial objects (AOs) in an accurate manner.
[00011] Another object of the present disclosure is to provide a system and method that facilitates classification, computation and assessment of threat and prioritization of aerial objects (AOs) which have a capability of manoeuvring in an accurate manner.
SUMMARY OF THE INVENTION
[00012] Various objects, features, aspects and advantages of the present disclosure will become more apparent from the following detailed description of preferred embodiments, along with the accompanying drawing figures in which like numerals represent like features.
[00013] The present disclosure relates to a field of air defence systems, and more particularly pertains to a threat computation system which incorporates knowledge of databases or techniques in the solution.
[00014] An aspect of the present disclosure pertains to a system for threat computation for one or more aerial objects (AOs) comprising one or more sensors to receive an input associated with each of the AOs, one or more processors operatively coupled to the one or more sensors and a memory, the memory storing instructions executable by the processors to: extract, from the received input, a first set of data packets pertaining to a classification information of the AOs; compute, from the received input, a second set of data packets pertaining to threat information associated to each of the AOs; determine a final threat index for each of the AOs based on the threat information computed for each of the AOs; maintain a dataset based on the second set of data packets, wherein the dataset comprises a plurality of groups, wherein each of the plurality of group corresponds to a range of a final threat index values; assign a priority level based on the final threat index determined for each of the AOs.
[00015] In one aspect, the classification information comprises a classification of each of the AOs, where each of the AOs is classified as any of a friend AO, a hostile AO or an unknown AO.In one aspect, the classification information can be computed for each of the AOs based on an IFF response, a flight plan and/or a flight corridor.
[00016] In one aspect, the threat information can include computation of a threat index for each of a plurality of threat parameters.In one aspect, the plurality of threat parameters comprises a distance of at least one of an AO of the one or more AOs from a zone, time taken by the at least one of the AO to reach a zone, a distance of the at least one of the AO from a zone center, time taken by the at least one of the AO to reach a zone center, velocity of the at least one of the AO of the one or more AOs, height of the one or more AOs, origin sector of the one or more the AOs, current sector of the one or more AOs, approaching direction of the one or more AOs, size of a formation of a group of the one or more AOs, a type of ammunition carried by the one or more AOs, ammunition carrying capacity of the one or more AOs and/or a jamming capability of the one or more AOs.
[00017] In one aspect, the final threat index can be computed by summing the computed threat index for each of the plurality of threat parameters for each of the one or more AOs.In one aspect, the priority level assigned to each of the AOs of the one or more AOs comprises any of a first priority level, a medium priority level and a low priority level.
[00018] In one aspect, the system can include a fire control system to implement a set of instructions for each of the one or more AOs assigned to a group from the plurality of groups based on the classification information associated with each of the AOs.In one aspect, the system facilitates to receive a user input to override the group assigned to at least one of the AOs.
[00019] Another aspect of the present disclosure pertains to a air defence method comprising the steps of:receiving, from one or more sensors, an input data associated to one or more aerial objects (AOs);extracting, at a processor, a first set of data packets pertaining to a classification information of the AOs associated with the received input data;computing, at the processor, a second set of data packets pertaining to threat information associated with the received input data;determining, at the processor, a final threat index for each of the AOs based on the threat information computed for each of the AOs;maintaining, at the processor, a dataset based on the computed second set of data packets, wherein the dataset comprises a plurality of groups, wherein each of the plurality of groups is corresponds to a range of a final threat index values;assigning, at the processor, a priority level based on the final threat index computed for each of the AOs.
[00020] Various objects, features, aspects and advantages of the present disclosure will become more apparent from the following detailed description of preferred embodiments, along with the accompanying drawing figures in which like numerals represent like features.
BRIEF DESCRIPTION OF THE ACCOMPANYING DRAWINGS
[00021] In the figures, similar components and/or features may have the same reference label. Further, various components of the same type may be distinguished by following the reference label with a second label that distinguishes among the similar components. If only the first reference label is used in the specification, the description is applicable to any one of the similar components having the same first reference label irrespective of the second reference label.
[00022] FIG. 1 illustrates a network implementation 100 of a threat computation system 102 that facilitates computation of a threat level of airborne objects in accordance with an embodiment of the present disclosure.
[00023] FIG. 2 illustrates exemplary functional components of the system in accordance with an embodiment of the present disclosure.
[00024] FIG. 3 illustrates an exemplary representation of a navigation technique and a control strategy for autonomous navigation of a UAV on roads using a monocular vision in accordance with an embodiment of the present disclosure.
[00025] FIG. 4 is a high-level flow diagram representing a mechanism for generating and sending control signals to a UAV to generate flight maneuvers in accordance with an embodiment of the present disclosure.
[00026] FIG. 5 illustrates an exemplary computer system to implement the proposed system in accordance with embodiments of the present disclosure.
DETAILED DESCRIPTION
[00027] In the following description, numerous specific details are set forth in order to provide a thorough understanding of embodiments of the present invention. It will be apparent to one skilled in the art that embodiments of the present invention may be practiced without some of these specific details.
[00028] Embodiments of the present invention include various steps, which will be described below. The steps may be performed by hardware components or may be embodied in machine-executable instructions, which may be used to cause a general-purpose or special-purpose processor programmed with the instructions to perform the steps. Alternatively, steps may be performed by a combination of hardware, software, firmware and/or by human operators.
[00029] Embodiments of the present invention may be provided as a computer program product, which may include a machine-readable storage medium tangibly embodying thereon instructions, which may be used to program a computer (or other electronic devices) to perform a process. The machine-readable medium may include, but is not limited to, fixed (hard) drives, magnetic tape, floppy diskettes, optical disks, compact disc read-only memories (CD-ROMs), and magneto-optical disks, semiconductor memories, such as ROMs, PROMs, random access memories (RAMs), programmable read-only memories (PROMs), erasable PROMs (EPROMs), electrically erasable PROMs (EEPROMs), flash memory, magnetic or optical cards, or other type of media/machine-readable medium suitable for storing electronic instructions (e.g., computer programming code, such as software or firmware).
[00030] Various methods described herein may be practiced by combining one or more machine-readable storage media containing the code according to the present invention with appropriate standard computer hardware to execute the code contained therein. An apparatus for practicing various embodiments of the present invention may involve one or more computers (or one or more processors within a single computer) and storage systems containing or having network access to computer program(s) coded in accordance with various methods described herein, and the method steps of the invention could be accomplished by modules, routines, subroutines, or subparts of a computer program product.
[00031] Exemplary embodiments will now be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. These embodiments are provided so that this invention will be thorough and complete and will fully convey the scope of the invention to those of ordinary skill in the art. Moreover, all statements herein reciting embodiments of the invention, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future (i.e., any elements developed that perform the same function, regardless of structure).
[00032] While embodiments of the present invention have been illustrated and described, it will be clear that the invention is not limited to these embodiments only. Numerous modifications, changes, variations, substitutions, and equivalents will be apparent to those skilled in the art, without departing from the spirit and scope of the invention, as described in the claim.
[00033] The present disclosure relates to a field of air defence systems, and more particularly pertains to a threat computation system which incorporates knowledge of databases or techniques in the solution.
[00034] According to an aspect, the present disclosure discloses a system for threat computation for one or more aerial objects (AOs) including one or more sensors to receive an input associated with each of the AOs, one or more processors operatively coupled to the one or more sensors and a memory, the memory storing instructions executable by the processors to:extract, from the received input, a first set of data packets pertaining to a classification information of the AOs;compute, from the received input, a second set of data packets pertaining to threat information associated to each of the AOs;determine a final threat index for each of the AOs based on the threat information computed for each of the AOs;maintain a dataset based on the second set of data packets, wherein the dataset comprises a plurality of groups, wherein each of the plurality of group corresponds to a range of a final threat index values;assign a priority level based on the final threat index computed for each of the AOs. In an embodiment, the classification information of each of the AOs can include a classification of each of the AO as a friend, hostile and/or unknown.
[00035] In an embodiment, the classification information can be computed for each of the AOs based on an IFF response, a flight plan and/or a flight corridor.
[00036] In an embodiment, the threat information can include computation of a threat index for each of a plurality of threat parameters.
[00037] In an embodiment, the plurality of threat parameters can include a distance of AO from a zone, time to reach a zone, a distance from a zone centre, time to reach a zone centre, velocity of the AOs, height of the AOs, origin sector of the AOs, current sector of the AOs, approaching direction of the AOs, size of a formation of a group of AOs, a type of ammunition carried by the AOs, ammunition carrying capacity of the AOs and/or a jamming capability of the AOs.
[00038] In an embodiment, the final threat index can be computed by summing the computed threat index for each of the plurality of threat parameters for each of the AOs.
[00039] In an embodiment, the priority level assigned to each of the AOs can includea first priority level, a medium priority level and a low priority level.
[00040] In an embodiment, the system can include a fire control system to implement a set of instructions for each of the AOs assigned to a group from the plurality of groups based on the classification information associated with each of the AOs.
[00041] In an embodiment, the system can enable a user input to override the group assigned to at least one of the AOs.
[00042] FIG. 1 illustrates a network implementation 100 of an air defence system 102 (referred to herein system 102) which facilitates classification, computation and assessment and prioritization of a threat posed by one or more airborne object (AOs) in accordance with an embodiment of the present disclosure.
[00043] According to an embodiment, the system 102 includes a processing unit 104to classify, compute and assess threat level of one or more airborne objects (AOs) 106-1, 106-2, 106-3(collectively referred to as AOs 106, and individually referred to as AO 106, hereinafter) detected in one or more predefine zones 108(collectively referred to as the zones 108, and individually referred to as the zone 108, hereinafter). The one or more predefined zones 108 are not shown in the figures. In an embodiment, the AOs may be any of an aircraft, a helicopter, unmanned aerial vehicles (UAVs or "drones"), balloons, blimps and dirigibles, rockets, pigeons, kites, parachutes, stand-alone telescoping vehicle-mounted poles, and the like.
[00044] In an embodiment, the system 102 may be configured to define zones 108 but not limited to areas in form of convex polygons. Such zones 108 may be categorized as boundaries or designated protected areas.
[00045] Further, multiple entities 112-1, 112-2…112-N (which are collectively referred to as entities 112 and individually referred to as the entity 112, hereinafter) can communicate with the system 102 via a network 114 through one or more computing devices 116-1, 116-2…116-N (which are collectively referred to as computing devices 116 and individually referred to as the computing device 116, hereinafter) that can be communicatively coupled to the system 102. The entity 112 can be any person, who is an administrator, a data scientist, a police officer, an investigator, a driver and the like.
[00046] The computing devices 116 can include a variety of computing systems, including but not limited to, a laptop computer, a desktop computer, a notebook, a workstation, a portable computer, a personal digital assistant, a handheld device, a smartphone and a mobile device. In an embodiment, the entity 112 may receive information from the system 102using the computing device 116, and use the information for applications such as for aerial photography, geographic mapping, precision agriculture, weather forecast and so forth. Network 114 can be a wireless network, a wired network or a combination thereof.
[00047] The network 114 can be implemented as one of the different types of networks, such as intranet, local area network (LAN), wide area network (WAN), the internet, Wi-Fi, LTE network, CDMA network, and the like. Further, the network 114 can either be a dedicated network or a shared network. The shared network represents an association of the different types of networks that use a variety of protocols, for example, Hypertext Transfer Protocol (HTTP), Transmission Control Protocol/Internet Protocol (TCP/IP), Wireless Application Protocol (WAP), and the like, to communicate with one another. Further the network 114 can include a variety of network devices, including routers, bridges, servers, computing devices, storage devices, and the like.
[00048] In an embodiment, the AOs 106 may be classified as friendly, hostile and/or unknown by a classification unit 110. The classification unit 110 is onboard processing unit 104. In an embodiment, the AOs 106 may be classified based on size, range and endurance, and may be classified as small AOs, micro or nano AOs, small AOs, mini AOs, medium AOs, and large AOs. Further, AOs can also be classified according to the ranges they can travel as being very low close-range AOs, close-range AOs, short-range AOs, mid-range AOs, and endurance AOs.
[00049] In an embodiment, one or more sensors using different technologies may be used to detect the AOs. Such sensors may include, but not limited to, CCD or CMOS cameras, intensified CCD or CMOS cameras, high quantum efficiency CCD or CMOS cameras operating at very low light levels, thermal imaging cameras, and bolometric thermal sensors. a commercial ground based radar; an optical and/or infrared and/or laser range finder; an omnidirectional radio frequency (RF) receiving antenna; and /or a directional radio frequency (RF) receiving/direction finding antenna. Such equipment can be mounted on separate fixtures such as mobile trailers, or on the same fixture or other structure. The outputs of these one or more sensors are analysed using the system 102 (described below) to detect and classify the AOs, and to determine a level of threat assessment.In an embodiment, output from a combination of sensors operating in both visible and infrared spectrums, and with their combined data may be used to make decisions in respect of target detection to provide improved performance.
[00050] In an embodiment, the system 102 can be used in protecting critical infrastructure such as airports, bridges, power lines, factories, nuclear/power plants, shipping facilities, football stadiums, military installations, largepublic venues, etc., from being threatened by the target AOs 106.
[00051] A set of instructions when executed by the one or more processors enable the processing unit 104 to digitally enhance and process the data captured from the one or more sensors to detect and classify objects of interest.
[00052] In an embodiment, the classification unit 110 may classify the AOs 106 into categories including but not limited to friendly, hostile and unknown based on but not limited to computation of parameters such as but not limited to, IFF(identify friend or foe), flight plans, flight corridors and/hostile sectors.
[00053] In an embodiment, the system 102 may be configured to process the IFF response signals received in response to IFF interrogation signals based on a database of predefine records maintained in a database. A transceiver may intercept IFF signals from one or more transceiver in the AO to determine the IFF status of the OA. In an embodiment, a response received from the AO may be decoded to determine if the AO is listed as a safe in the database. However, the AO is constantly monitored for other parameters to avoid any kind of manoeuvred threat. In case there is no response received to an IFF interrogation signals from an AO then other parameters are computed for the AO.
[00054] In an embodiment, the AO may be classified based on the computation of all the parameters and based on the computation of the parameters each AO is classified as a friend, foe or unknown.
[00055] In an embodiment, the system 102 may be configured to determine and process a flight plan of the one or more AOs in order toclassify the AOs 106. A flight plan may be determined by connecting to an associated air traffic service unit of the AO to determine if the AO has detoured from its allocated flight plan due to some emergency. Based on the determination of the flight plan of an AO, the system 102 may determine if the AO is a threat or not. The system 102 may assign a weight to each OA based on determination of a flight plan. If the current position of OA is not in accordance to the flight plan determined for the AO, then the AO is considered a threat and a weight is assigned to the AO based on a level of detour detected from its allocated flight plan.
[00056] In an embodiment, the system 102 may be configured to determine a flight corridor of one or more AOs 106 to classify the AOs 106.The flight corridor (also known as an air corridor) is a designated air space defined for aircrafts that they are supposed to remain in during transits. The flight corridor may be strictly allocated by authorities for foreign aircrafts while travelling through protected zones. Any deviation from the designated air corridor may classify the AO as a foe.
[00057] In an embodiment, the threat computation unit 109 may be configured to compute a threat index of one or more AOs 106 preceding the classification processing of the AOs 106.
[00058] In an embodiment, the processing unit 104 may be configured to compute a threat index of one or more AOs 106 based on one or more threat parameters including but not limited totime to zone 108 and time to zone 108 centre, distance from a zone 108, distance from zone 108 centre, velocity of AOs 106, height of AO 106, AO 106 origin sector, AO 106current sector, AO106 approaching direction, size of a formation of a multiple AOs, type of ammunition carried by AOs 106, ammunition carrying capacity of the AOs 106and/or whether AO106 is a jammer.
[00059] In an embodiment, the system 102 may assign a weight to each of the AOs 106 for each of the threat parameters. The AOs are then sorted in descending order of their weights to assign a priority level to each of the AOs. Each AO is assigned to a fire action group based on which the fire control system may proceed to tackle the AO.
[00060] In an embodiment, the system 102 may determine a fire control solution based on a weight assigned to each of the AOs 106. The fire control solution may be implemented by a fire control system as implemented by the system 102 based on the priority value of each AOs 106.
[00061] In an embodiment, the AOs 106 classified as friend may not be monitored for threat index computation. In an embodiment, the AOs 106 classified as friend may be monitored for threat index computation but assigned a priority and grouped for fire control solution to be applied.
[00062] FIG. 2 illustrates exemplary functional components 200 of the system 102 in accordance with an embodiment of the present disclosure.
[00063] In an aspect, the system 102 may comprise one or more processor(s) 202. The one or more processor(s) 202 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, logic circuitries, and/or any devices that manipulate data based on operational instructions. Among other capabilities, the one or more processor(s) 202 are configured to fetch and execute computer-readable instructions stored in a memory 204 of the system 102. The memory 204 may store one or more computer-readable instructions or routines, which may be fetched and executed to create or share the data units over a network service. The memory 204 may comprise any non-transitory storage device including, for example, volatile memory such as RAM, or non-volatile memory such as EPROM, flash memory, and the like.
[00064] The system 102 may also comprise an interface(s) 206. The interface(s) 206 may comprise a variety of interfaces, for example, interfaces for data input and output devices, referred to as I/O devices, storage devices, and the like. The interface(s) 206 may facilitate communication of system 102. The interface(s) 206 may also provide a communication pathway for one or more components of the processing engine 208. Examples of such components include, but are not limited to, processing engine(s) 208 and database 210.
[00065] The processing engine(s) 208 may be implemented as a combination of hardware and programming (for example, programmable instructions) to implement one or more functionalities of the processing engine(s) 208. The processing engine(s) 208 is stored on the memory 204 and runs on the processor(s) 202. In examples described herein, such combinations of hardware and programming may be implemented in several different ways. For example, the programming for the processing engine(s) 208 may be processor executable instructions stored on a non-transitory machine-readable storage medium and the hardware for the processing engine(s) 208 may comprise a processing resource (for example, one or more processors), to execute such instructions. In the present examples, the machine-readable storage medium may store instructions that, when executed by the processing resource, implement the processing engine(s) 208. In such examples, the system 102 may comprise the machine-readable storage medium storing the instructions and the processing resource to execute the instructions, or the machine-readable storage medium may be separate but accessible to system 102 and the processing resource. In other examples, the processing engine(s) 208 may be implemented by electronic circuitry.
[00066] The database 210 may comprise data that is either stored or generated as a result of functionalities implemented by any of the components of the processing engine(s) 208 or the system 102. In an embodiment, the database 210 may include IFF database which may include predefine codes of a list of AOs registered as friend AOs and hostile AOs. In an embodiment, the classification engine 212 may verify the classification of an AO by check the list of AOs registered in the database. In an embodiment, the database may be updated automatically by receiving data regarding foreign agents or countries sending their AOs to a protected zone. In an embodiment, the processing engine(s) 208 may include a classification engine 212, a threat computation engine 214, a priority setting engine 216, and other engine (s) 220. Other engine(s) 220 can supplement the functionalities of the processing engine 208 or the system 102.
[00067] According to an embodiment, the classification engine 212, facilitates enabling classification of each of the AOs as one of the following categories but not limited to friend, foe or unknown. The classification engine 212 facilitates classification of AOs 106 based on factors including but not limited to, a response to IFF enquiry signals received by the system 102, flight plan determined for the AOs 106 and/or flight corridor determined for the AOs 106. In an embodiment, a database look-up algorithm may be implemented to lookup for a classification of anAO in the IFF database.
[00068] According to an embodiment, the threat computation engine 214 generates a threat index for each of the AOs 106 based on following threat index parameters but not limited to, distance from zone 108, time to zone 108, distance from zone 108 centre, time to zone 108 centre, velocity of AOs 106, height of AO 106, AO 106 origin sector, AO 106current sector, AO106 approaching direction, size of a formation of a multiple AOs, type of ammunition carried by AOs 106, ammunition carrying capacity of the AOs 106 and/or whether AO106 is a jammer.
[00069] In an embodiment, the threat index parameters may be categorized as time influence parameters which may compute a numeric value based on a time an AO requires reaching the protectedarea or zone. The time influence parameters may include but not limited to time to zone 108, time to zone centre, etc.
[00070] In an embodiment, the threat index parameters may be categorized as height influence parameters which compute a numeric value based on the height of an AO. The height influence parameters may include but not limited to height of AOs, etc.
[00071] In an embodiment, the threat index parameters may be categorized as group strength influence parameters which compute a numeric value based on the group strength (no. of AOs flying together).
[00072] In an embodiment, the threat index parameters may be categorized as lethality influence parameters which compute a numeric value based on ammunition type and ammunition carrying capacity of the target. In an embodiment, a predefined mapping may be provided in a database including a table of ammunition types and their associated numerical value.
[00073] In an embodiment, the threat index parameters may be categorized as distance influence parameters which compute a numeric value based on AOs’ distance from a zone or a critical asset.
[00074] In an embodiment, the threat index parameters may be categorized as jammer influence parameters which determined if an AO supports other technology that enables the AO to escape air defence. A jammer AO is considered more threating as it may manoeuvre and may not be detected by the system 102.
[00075] In an embodiment, the processing engine 208 may process data received from one or more sensors to compute the values of the threat index parameters. The one or more sensors may include but not limited to a gyroscope, accelerometer, magnetometer, infrared sensor, camera, microphone, gas sensor, photo-detector, GPS, etc.
[00076] Data from each sensor may be corrected and optimized by one or more processorsfor removal of noise and mapped, calibrated or corrected for further computation. In an embodiment, the data is enhanced by applying a variety of digital filters to the sensor data. The filters include various filters applicable in relevant art. In an embodiment, the processing engine 208may determine whether there is any useful information in the sensor data after enhancement. In many instances the data comprises only noise, and the processing engine 208 can conserve power by avoiding further operations.
[00077] In an embodiment, the AOs may be assigned weights for various threat parameters and classified. The AOs are grouped according to priority and risk they posebased on pre-defined data. In an embodiment, the grouping is referred to as a threat profile, and the processing engine 208 has access to a catalogue of standard profiles that may be mapped to AOs based on its classification, threat index and priority.
[00078] In an embodiment, the classification of AOs may be automatically done however, in one embodiment, classification may include user intervention, based on information being relayed to the user for user input. Multiple potential AOs can be detected and numbered for reference and classified in this wayand the storing and setting weights engine 216 facilitates to assign and store weights for each threat index parameter determined for each AOs 106. Final threat index may be computed based on summing of each weight assigned to each threat index parameter for anAO 106. Based on the final threat index a priority is assigned to each of the AOs. AOmay be assigned a priority based on a predefined range of final threat index of an AO. First priority level of 01 is assigned to AOs which have threat index in highest predefined range. Second priority level of 02 is assigned to AOs which have threat index in medium predefined range; Third priority level of 03 is assigned to AOs which have threat index in lowest predefined range. AOs which are assigned first priority level of 01 are to be tackled first as they may pose highest threat to cause damage to a protected zone. AOs which are assigned second priority level 02 are to be tackled at second priority as they may pose medium risk to cause damage to a protected zone. Accordingly, third priority level of 03 is assigned to AOs which are to be tackled last as they may pose lower risk to cause damage when compared to the threat index of all AOs in a group of AOs.
[00079] In an embodiment, based on the final threat index determined for each AO, AOs are assigned to a group associated with a fire control solution implemented by a fire control engine 218. The fire control solution may contain rules of engagement with the AO assigned to a particular group. For example,AOs with threat index in range of 1-5 are grouped as G1. In an embodiment, the rules of engagement may depend on the threat index range in which the AO may lie. The fire control solutions mayhave categories such as butnot limited to include investigation patrol, infantry support, stationary firing zone, asset protection, sniper suppression, defensive withdrawal, peacekeeping patrol, firing suppression with area fire and non-lethal intervention. For each category of fire control solution there may be specific rules of engagement and within each set of rules there may be escalating levels of response leading to a lethal firing of a weapon.
[00080] In an embodiment, fire control solution may support user input if required by the user. The user input may over-ride the rules of engagement for individual AOs before an engagement commences.
[00081] In an embodiment, the choice of AOs to target and their engagement sequence is made based on the group and priority assigned to each AO by the system 102.
[00082] FIG. 3 illustrates an exemplary representation 300 of a table defining multiple AOs, their threat index and group information.
[00083] In an embodiment, each AO identified as a threat by the system 102 may be assigned a reference number. A final threat index is computed for each AOs 106 based on which a priority is assigned to each AO. The AOs are grouped as per which the AO is assigned to the fire control system.
[00084] In an exemplary scenario, anAO identified by reference number 021 has been assigned a threat index of 3 and has been assigned to fire control system under group 2. Further, the AOidentified by a reference number of 023 has a threat index of 01 and has been assigned to fire control system under group 2. In an embodiment, the fire control system may take appropriate action defined under group 2 for AOs based on the threat index. Accordingly, first AOs 023 and 045 will be handled as they have 01 priority level and a fire control solution for group 2 would be implemented to tackle the AOs.
[00085] Second, AO with reference number 034 will be handled at second priority after AOs 023 and 045 in accordance to fire control solution for group 2. Lastly, AO with reference number 021 would be in accordance with the fire control solution for group 2.
[00086] In an embodiment, priority may be assigned to AOsbased on a probabilitybased models.
[00087] In an embodiment, the higher the threat index assigned to anAO, the higher the threat posed by the AO to cause damage. Hence, the AOs with higher threat index are tackled or destroyed first to protect from causing any damages.
[00088] FIG. 4 is a high-level flow diagram 400 illustrating a method for classifying, computing and prioritizing of threat posed by one more AOs 106, in accordance with an embodiment of the present disclosure.
[00089] In an embodiment, as is illustrated in the FIG. 4, the method can include at block 402 a step of receiving an input data from one or more sensors associated to an AO.
[00090] At block 404, extracting a first set of data packets pertaining to a classification information of the AOs associated with the received input data. At block 406, computing a second set of data packets pertaining to threat information associated with the received input data. Further, at block 408, determining a final threat index for each of the AOs based on the threat information computed for each of the AOs. Next at block 410, maintaining a dataset based on the computed second set of data packets. The dataset includes a plurality of groups, and each of the plurality of groups corresponds to a range of a final threat index values.
[00091] At block 412, a priority level based on the final threat index computed for each of the AOs is assigned.
[00092] As per the disclosure, a technical advantage of the system pertains to enabling an operator to take confident decisions to neutralize hostile air objects in the defended area using data gathered from the sensors and categorizing the AO under one of a category automatically. This avoids a need of investing additional manual effort to determine and categorize the AO and then take a preventive action. The method disclosed facilities an operator at the control centre to take quick and accurate decisions. Further, the operator is provided with a complete air situation picture and situational awareness of the defended area to facilitate in making and helping an operator at a control centre to make better decision during a combat scenario.
[00093] FIG. 5 illustrates an exemplary computer system to implement the proposed system in accordance with embodiments of the present disclosure.
[00094] As shown in FIG. 5, computer system can include an external storage device 510, a bus 520, a main memory 530, a read only memory 540, a mass storage device 550, communication port 760, and a processor 770. A person skilled in the art will appreciate that computer system may include more than one processor and communication ports. Examples of processor 570 include, but are not limited to, an Intel® Itanium® or Itanium 2 processor(s), or AMD® Opteron® or Athlon MP® processor(s), ARM Cortex processor(s), Motorola® lines of processors, FortiSOC™ system on a chip processors or other future processors. Processor 770 may include various modules associated with embodiments of the present invention. Communication port 560 can be any of an RS-232 port for use with a modem based dialup connection, a 10/100 Ethernet port, a Gigabit or 10 Gigabit port using copper or fiber, a serial port, a parallel port, or other existing or future ports. Communication port 560 may be chosen depending on a network, such a Local Area Network (LAN), Wide Area Network (WAN), or any network to which computer system connects.
[00095] Memory 530 can be Random Access Memory (RAM), or any other dynamic storage device commonly known in the art. Read only memory 540 can be any static storage device(s) e.g., but not limited to, a Programmable Read Only Memory (PROM) chips for storing static information e.g., start-up or BIOS instructions for processor 570. Mass storage 550 may be any current or future mass storage solution, which can be used to store information and/or instructions. Exemplary mass storage solutions include, but are not limited to, Parallel Advanced Technology Attachment (PATA) or Serial Advanced Technology Attachment (SATA) hard disk drives or solid-state drives (internal or external, e.g., having Universal Serial Bus (USB) and/or Firewire interfaces), e.g. those available from Seagate (e.g., the Seagate Barracuda 7102 family) or Hitachi (e.g., the Hitachi Deskstar 7K1000), one or more optical discs, Redundant Array of Independent Disks (RAID) storage, e.g. an array of disks (e.g., SATA arrays), available from various vendors including Dot Hill Systems Corp., LaCie, Nexsan Technologies, Inc. and Enhance Technology, Inc.
[00096] Bus 520 communicatively couples processor(s) 570 with the other memory, storage and communication blocks. Bus 520 can be, e.g. a Peripheral Component Interconnect (PCI) / PCI Extended (PCI-X) bus, Small Computer System Interface (SCSI), USB or the like, for connecting expansion cards, drives and other subsystems as well as other buses, such a front side bus (FSB), which connects processor 570 to software system.
[00097] Optionally, operator and administrative interfaces, e.g. a display, keyboard, and a cursor control device, may also be coupled to bus 520 to support direct operator interaction with computer system. Other operator and administrative interfaces can be provided through network connections connected through communication port 560. External storage device 510 can be any kind of external hard-drives, floppy drives, IOMEGA® Zip Drives, Compact Disc - Read Only Memory (CD-ROM), Compact Disc - Re-Writable (CD-RW), Digital Video Disk - Read Only Memory (DVD-ROM). Components described above are meant only to exemplify various possibilities. In no way should the aforementioned exemplary computer system limit the scope of the present disclosure.
[00098] Embodiments of the present disclosure may be implemented entirely hardware, entirely software (including firmware, resident software, micro-code, etc.) or combining software and hardware implementation that may all generally be referred to herein as a "circuit," "module," "component," or "system." Furthermore, aspects of the present disclosure may take the form of a computer program product comprising one or more computer readable media having computer readable program code embodied thereon.
[00099] Thus, it will be appreciated by those of ordinary skill in the art that the diagrams, schematics, illustrations, and the like represent conceptual views or processes illustrating systems and methods embodying this invention. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software. Similarly, any switches shown in the figures are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the entity implementing this invention. Those of ordinary skill in the art further understand that the exemplary hardware, software, processes, methods, and/or operating systems described herein are for illustrative purposes and, thus, are not intended to be limited to any particular named.
[000100] As used herein, and unless the context dictates otherwise, the term "coupled to" is intended to include both direct coupling (in which two elements that are coupled to each other contact each other) and indirect coupling (in which at least one additional element is located between the two elements). Therefore, the terms "coupled to" and "coupled with" are used synonymously. Within the context of this document terms "coupled to" and "coupled with" are also used euphemistically to mean "communicatively coupled with" over a network, where two or more devices are able to exchange data with each other over the network, possibly via one or more intermediary device.
[000101] It should be apparent to those skilled in the art that many more modifications besides those already described are possible without departing from the inventive concepts herein. The inventive subject matter, therefore, is not to be restricted except in the spirit of the appended claims. Moreover, in interpreting both the specification and the claims, all terms should be interpreted in the broadest possible manner consistent with the context. In particular, the terms "comprises" and "comprising" should be interpreted as referring to elements, components, or steps in a non-exclusive manner, indicating that the referenced elements, components, or steps may be present, or utilized, or combined with other elements, components, or steps that are not expressly referenced. Where the specification claims refers to at least one of something selected from the group consisting of A, B, C …. and N, the text should be interpreted as requiring only one element from the group, not A plus N, or B plus N, etc.
[000102] While the foregoing describes various embodiments of the invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof. The scope of the invention is determined by the claims that follow. The invention is not limited to the described embodiments, versions or examples, which are included to enable a person having ordinary skill in the art to make and use the invention when combined with information and knowledge available to the person having ordinary skill in the art.
| # | Name | Date |
|---|---|---|
| 1 | 202041047623-STATEMENT OF UNDERTAKING (FORM 3) [31-10-2020(online)].pdf | 2020-10-31 |
| 2 | 202041047623-FORM 1 [31-10-2020(online)].pdf | 2020-10-31 |
| 3 | 202041047623-DRAWINGS [31-10-2020(online)].pdf | 2020-10-31 |
| 4 | 202041047623-DECLARATION OF INVENTORSHIP (FORM 5) [31-10-2020(online)].pdf | 2020-10-31 |
| 5 | 202041047623-COMPLETE SPECIFICATION [31-10-2020(online)].pdf | 2020-10-31 |
| 6 | 202041047623-FORM-26 [22-12-2020(online)].pdf | 2020-12-22 |
| 7 | 202041047623-Proof of Right [23-03-2021(online)].pdf | 2021-03-23 |
| 8 | 202041047623-RELEVANT DOCUMENTS [25-10-2024(online)].pdf | 2024-10-25 |
| 9 | 202041047623-POA [25-10-2024(online)].pdf | 2024-10-25 |
| 10 | 202041047623-FORM 18 [25-10-2024(online)].pdf | 2024-10-25 |
| 11 | 202041047623-FORM 13 [25-10-2024(online)].pdf | 2024-10-25 |