Target Analysis and Recommendation

ABSTRACT

An electronic device determines target information about a target and recommends a target based on the target information.

BACKGROUND

Target acquisition, analysis, and selection often rely primarily on auser observing multiple targets and then selecting one of the targetsbased on the observations. This process can be labor intensive sincemultiple moving targets may be involved and since it is time consumingfor a user to analyze and select a target. Furthermore, the user may noteven be aware of other targets.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a method to provide recommendations of targets to users inaccordance with an example embodiment.

FIG. 2 is a method to recommend targets to users in accordance with anexample embodiment.

FIG. 3A is a table for a factor of distance to a target in accordancewith an example embodiment.

FIG. 3B is a table for a factor of different types of weapons inaccordance with an example embodiment.

FIG. 3C is a table for a factor of different types of obstructions inaccordance with an example embodiment.

FIG. 3D is a table for a factor of different types of incoming fire inaccordance with an example embodiment.

FIG. 3E is a table for a factor of different types of targetidentifications in accordance with an example embodiment.

FIG. 3F is a table for a factor of different types of movement oftargets in accordance with an example embodiment.

FIG. 3G is a table for a factor of different types of collateral damagewith targets in accordance with an example embodiment.

FIG. 3H is a table for a factor of different types of verified targetsin accordance with an example embodiment.

FIG. 4A is a table of factors determined for a first user in accordancewith an example embodiment.

FIG. 4B is a table of factors determined for a second user in accordancewith an example embodiment.

FIG. 5 is a method to select a target based on one or more factors inaccordance with an example embodiment.

FIG. 6 is a method to determine a recommendation for a target inaccordance with an example embodiment.

FIG. 7 is a method to determine a recommendation for a target based onobject information in accordance with an example embodiment.

FIG. 8 is a method to determine a recommendation to move to an alternatelocation in accordance with an example embodiment.

FIG. 9A is a score table for a factor of an obstruction in accordancewith an example embodiment.

FIG. 9B is a score table for a factor of weapon penetration locations inaccordance with an example embodiment.

FIG. 10 is a method to adjust a target recommender based on userselection of targets in accordance with an example embodiment.

FIG. 11A is target data for a first target selected by a targetrecommender in accordance with an example embodiment.

FIG. 11B is target data for a second target selected by a user inaccordance with an example embodiment.

FIG. 11C is target data being adjusted per machine-learning inaccordance with an example embodiment.

FIG. 12A is a field of view of a first user and/or first electronicdevice at a geographical location in accordance with an exampleembodiment.

FIG. 12B is a field of view of a second user and/or second electronicdevice at the geographical location in accordance with an exampleembodiment.

FIG. 13A shows an electronic device determining target information on atarget in accordance with an example embodiment.

FIG. 13B shows another electronic device determining target informationon the target in accordance with an example embodiment.

FIG. 14A shows a first electronic device determining and/or providingtarget information in accordance with an example embodiment.

FIG. 14B shows a second electronic device determining and/or providingtarget information in accordance with an example embodiment.

FIG. 14C shows the first electronic device determining and/or providingweapon penetration locations in accordance with an example embodiment.

FIG. 15 is an electronic device system or a computer system inaccordance with an example embodiment.

FIG. 16 is an electronic device in accordance with an exampleembodiment.

FIG. 17 is an electronic device in accordance with an exampleembodiment.

SUMMARY OF THE INVENTION

Example embodiments include systems, apparatus, and methods that includeone or more electronic devices that are configured to acquireinformation about targets, analyze the acquired information, and makerecommendations to users about the targets.

Other example embodiments are discussed herein.

DETAILED DESCRIPTION

Example embodiments include systems, apparatus, and methods that includeone or more electronic devices that are configured to acquireinformation about a target, analyze this information, and recommend orassign a target to one or more users. A display displays therecommendation or the assignment to the users.

Example embodiments increase efficiency and accuracy of acquiringtargets, analyzing target information, selecting targets, and providingrecommendations or suggestions to users. These recommendations caninclude more than which target to select. For example, electronicdevices provide a user with information that assists in seeing ordetermining a location of targets and other users, determining weaponsassociated with targets, determining where weapons are being aimed orfired, determining obstructions, determining weapon penetrationlocations or vulnerabilities on objects or at areas, receivingassistance from other users on a target, preventing duplicate monitoringor firing on a same target, determining activity or movement of atarget, assisting in rapid and efficient selection of targets,determining safe locations for users to move, and sharing informationamong users.

Machine-learning assists in executing one or more example embodiments.For example, machine-learning builds a model and/or one or morealgorithms (such as a target recommender) and executes this model and/oralgorithms to make predictions, decisions, and recommendations. A modeland/or algorithm is dynamic and learns from data in that it changes,adjusts, modifies, and adapts to improve its accuracy and efficiency (asopposed to repeatedly following static, explicit program instructions).

In an example embodiment information is shared among the electronicdevices and provided to build a map of targets, obstructions, users,weapons, weapon penetration locations, and other information that can beshared among the users, displayed, stored, processed, and/ortransmitted. By way of example, this information and/or data canoriginate from an electronic device that determines, monitors, detects,tracks, senses, processes, and/or views the target and/or capturesimages or data of the target. For example, the electronic device can beproximate to the target (e.g., located within a few meters) or located agreater distance from the target (e.g., located more than one hundredmeters or many kilometers). As another example, one of the electronicdevices can be located on the target, be located with the target, bepart of the target, or be the target.

Images of targets, weapons, obstructions, geographical areas, and usersare processed, built, transmitted, stored, and shared to assist inexecuting example embodiments. The image of the target or object caninclude a two-dimensional (2D) image or model, a three-dimensional (3D)image or model, a virtual image, and/or a virtual object. This image ormodel moves to match or emulate real-time movement of the target. Forexample, a displayed image of a target moves in synchronization with theactual, real target that the image represents. Furthermore, an image ofa target includes targets that are obstructed to one or more users. Forexample, an image displayed at an electronic device of a user resemblesan orientation, size, and/or shape of how the target would appear in afield of view of the electronic device or the user of the electronicdevice if the target were not obstructed or if the target were viewablefrom the location of the electronic device or the user.

FIG. 1 is a method to provide recommendations of targets to users.

Block 100 states determine, with one or more electronic devices,information that includes target information about targets, objectinformation about objects, and/or user information about users.

By way of example, a target includes a person, an object, a thing,and/or an area; objects include things that are visible or tangible; andusers include people, robots, machines, and/or electronic devices.Target information can include object information whether or not theobject is the target, is near the target, or is associated with thetarget. For example, target information includes information aboutmoveable objects, immovable objects, small objects (such as weapons),and/or large objects (such as obstructions, vehicles, dwellings, andother structures). For instance, a target includes a person, a weaponthat the person carries, and/or a vehicle in which the person moves.

Object information includes information about moveable objects,immovable objects, areas, people, and other things. For example, anobject can include manmade objects (such as automobiles, buildings, andother structures) and natural or non-manmade objects (such as trees,hills, embankments, foliage, etc.).

User information includes information about one or more people,machines, and electronic devices.

An electronic device captures, obtains, records, provides, receives,and/or transmits information about the targets, objects, and/or users.For instance, a user wears and/or uses an electronic device thatcaptures and/or displays an image and/or video of the target, object,and/or user, determines a distance to the target, object, and/or user,determines a location of the target, object, and/or user, captures aview of the target, object and/or user, senses a heat signature of thetarget, object and/or user, determines an identity of the target, objectand/or user, determines obstructions near a target, object and/or auser, determines weapons of a target, determines an identity of atarget, object and/or user, or communicates with an electronic deviceat, with, or near the target, object and/or user.

Block 110 states provide the information to an electronic device and/oran electronic system.

The determined information is processed, stored, transmitted, displayed,and/or shared between one or more electronic devices. For example, oneor more handheld portable electronic devices (HPEDs) capture targetinformation, object information, and/or user information and wirelesslytransmit this information to one or more other HPEDs (e.g., over anencrypted, private peer-to-peer network), a central server, and/or acomputer or electronic system. For instance, a computer targetacquisition analysis and recommendation system (CTAARS) or a targetrecommender (including hardware and/or software) receives informationfrom multiple electronic devices, analyzes this information, andprovides target recommendations and other information to the electronicdevices and users of the electronic devices.

Targets, objects, and/or users can be determined with information fromone or more electronic devices. As an example, multiple differentelectronic devices at a geographical area sense a person and objects(such as weapons), recognize the people with facial recognition and theobjects with object recognition, and share this information with eachother over a peer-to-peer (P2P) or private network. The electronicdevices or a target recommender in communication with these electronicdevices analyze the collected information, assign users to targets inthe geographical area, and perform other methods discussed herein. Asanother example, a handheld portable electronic device (HPED) capturesimages of an area and transmits these images over a network to acomputer system (such as CTAARS). The computer system analyzes theimages and selects a target that is located in the images and/or thearea. As another example, a user views an area on a display of anelectronic device and interacts with the electronic device through auser interface to select an object being displayed as the target. As yetanother example, an electronic device receives location or coordinateinformation for a possible target, navigates to this location to verifyan identity or existence of the target, and provides the determinedinformation to other electronic devices and/or the target system.

The electronic devices can be located at a common geographical locationand near or proximate each other (e.g., located within several feet fromeach other, located several yards or more away from each other, locatedwithin eye sight of each other, located within several hundred yards ofeach other, etc.). Alternatively, the electronic devices are located atdifferent geographical locations that are far from each other (e.g.,located a kilometer or more apart, located in different cities orstates, located in different countries, etc.).

Block 120 states determine, based on the information, recommendations oftargets.

One or more electronic devices and/or a computer system analyze theinformation and recommend a target that includes one or more of arecommendation, a suggestion, an assignment, an instruction, or aselection of a target for a user. For example, each user is assigned toone or more targets based on one or more of information about a target,information about an object, information about a user, information aboutan area in which the target and/or the user are located, and informationabout an object with or proximate the target and/or the user. As anotherexample, users are provided with recommendations where to move and/orprovided with information about weapon penetration locations and/orweapon vulnerability locations on an object or at an area.

Block 130 states provide the recommendations of the targets to one ormore of the users and/or electronic devices.

Recommendations can be transmitted, displayed, stored, processed, and/ormapped. For example, an electronic device of a user displays arecommendation as to a target selected for the user, a recommendationwhere to physically move, a recommendation on weapon penetrationlocations of a target or object.

Recommendations can include visual images, text, audio, and othermediums to provide information.

Consider an example in which a handheld portable electronic device(HPED) of a user includes a display that displays a plurality ofdifferent targets in a field of view of the user. For example, the userwears a wearable electronic device with a camera that captures the fieldof view of the user. A target acquisition analysis and recommendationsystem (CTAARS) analyzes target information, selects one of the targetsin the field of view of the user, and transmits this selection to theHPED. The HPED displays an image of the target on, over, with, and/ornear the target in the field of view such that the user can see ordistinguish the selected target from the other, non-selected targets inthe field of view. For instance, the display displays or presents one ormore of two-dimensional (2D) images, three-dimensional (3D) images,virtual images, and/or virtual objects over or in place of the selectedtarget such that the user can see on the display a location, a distance,an orientation, a shape, a size, and/or an activity of the target.

Consider an example in which one or more electronic devices (such as ona flying drone, at a satellite, or with a soldier) gather information onmultiple different users and targets at a geographical location. Atarget recommender selects targets and performs other embodimentsdiscussed herein. For example, an electronic scope mounted to a riflecommunicates with the target recommender and displays images of targetsover objects and people that are visible through the electronic scope.These images assist shooters in identifying a target, prioritizingtargets, sighting a target, and engaging a target (e.g., shooting at thetarget, taking photographs of the target with the electronic scope,and/or gathering more information about the target with electricaldevices in the electronic scope).

A recommendation can also include instructions as to what actions totake with regard to the selected target. For example, the instructionsinstruct the user to monitor the target, engage the target, fire uponthe target, apprehend the target, collect information about the target,photograph the target, collect surveillance data about the target (suchas information regarding ambient environment conditions, objectsassociated with the target, other persons or animals proximate to thetarget), communicate with the target, etc.

Consider an example in which soldiers engage numerous combatantsdispersed throughout an urban environment. Each soldier carries a HPEDor wears a wearable electronic device (WED) that collects informationabout targets (the combatants, weapons of the combatants, vehicles ofthe combatants, objects in the urban environment, etc.) and transmitsthis information to a target recommendation system or a targetrecommender (e.g., a target recommender included with the electronicdevices or target recommender that is separate from these electronicdevices). The target recommendation system analyzes the collectedinformation, prioritizes the targets, and assigns each user to one ormore targets and provides each user with instructions. By way ofexample, the instructions includes tasks to complete, such asinstructions to move to a particular location, capture an identifiedcombatant, disable or destroy a vehicle, collect intelligenceinformation about a combatant or building in which a combatant islocated, fire at a target, provide cover fire for another user, provideassistance to another user, etc. The HPEDs and/or WEDs display theinstructions with images, maps, text, indicia, etc.

Consider further the example in which soldiers engage numerouscombatants dispersed throughout the urban environment. The WED and HPEDsassist the soldiers in performing activities in a more efficient,effective, and expeditious manner. By way of example, the targetrecommendation system notifies an electronic device of a soldier when asoldier's weapon has a point of aim on another soldier to prevent anincident of friendly fire. As another example, the target recommendationsystem assigns targets to the combatants so two soldiers are notunnecessarily, accidentally, or unintentionally firing or engaging asame combatant when such duplicative engagement would be unwanted orredundant. As another example, the target recommendation system providesan electronic map to electronic devices of the soldiers. This mapincludes 2D and 3D images and locations of combatants, weapons, othersoldiers, and other objects (such as vehicles, buildings, and otherobjects in the urban environment). As yet another example, the targetrecommendation system analyzes combatant locations and combatant weaponsand recommends locations where soldiers can move. For instance, theselocations provide a better location point to engage a combatant or asafer location with a reduced probability of being injured or targetedwith weapons of the combatants. As yet another example, the targetrecommendation system instructs soldiers when other soldiers request orrequire assistance. For instance, a soldier receives an inordinateamount of incoming enemy fire from a combatant location, and othersoldiers are notified to fire upon the combatant location. As yetanother example, an electronic device of a soldier captures an image ofan individual in the urban environment, identifies the individual as acombatant, and transmits the location and identity of the individual tothe target recommendation system and to electronic devices of othersoldiers. As yet another example, a soldier receives a selection of acombatant and fires on and kills the combatant. The electronic device ofthe soldier notifies the target recommendation system and otherelectronic devices of the death or elimination of the combatant.

Consider an example in which a target recommender builds a 3D map thatdepicts targets (e.g., people) holding the weapons, users, objectsand/or obstructions where each of the targets is located, andassignments of the users to targets (e.g., users can visuallydistinguish which user is assigned to which target).

Recommendations can be based on and/or include user information as wellas target information. Consider an example in which a target recommenderdetermines a location of a combatant (target) four hundred meters (400m) away from a first soldier and five hundred meters (500 m) away from asecond soldier. Both soldiers have an unobstructed line of sight to thecombatant. In considering whether to assign the first soldier or thesecond soldier to the combatant, the target recommender takes intoaccount a factor of training of the soldier, shooting history (such asan amount of previous long-distance shots at or over 500 m),environmental conditions (such as wind speed and wind direction for eachsoldier), and weapon and ammunition type of each soldier. Even thoughthe combatant is closer to the first soldier, the target recommenderassigns the combatant to the second soldier since the second soldier isgraded as a scout sniper and is thus highly skilled in long-rangeprecision fire.

FIG. 2 is a method to recommend targets to users.

Block 200 states determine factors relating to a recommendation of atarget to a user.

By way of example, the factors include, but are not limited to, one ormore of a location of a target and/or a user, a location of a weapon, anidentity of a target and/or a user, an identity of a weapon of a targetand/or a user, a location of an object with or proximate a target and/ora user, an identity of an object with or proximate a target and/or auser, an image of a target and/or a user, prior activity or history of atarget and/or a user, an activity of a target and/or a user, an activityof a weapon and/or object, an obstruction near or proximate a targetand/or a user, a point of aim of a weapon of a target and/or a user, aproximity or distance of a target and/or a user to another target, user,weapon, and/or object, whether a target and/or a user is receivingfiring from a weapon, whether a target and/or a user is firing a weapon,a rate of incoming fire from a weapon, a rate of outgoing fire from aweapon, whether a user requests or desires or needs assistance fromanother user, ammunition or supplies of a target and/or a user, whethera target and/or a user is hit with fire from a weapon (including aperson being wounded or injured), elevation of a target and/or a user,coordinate or GPS of a target and/or a user, movement of a target and/ora user, rate of movement a target and/or a user, size or shape of atarget, priority of a target, cover or protection of a target and/or auser, electronic devices with or near a target and/or a user,transmission of information from or to a target and/or a user, andcommunication or commands or words spoken to or from a target and/or auser. The factors also include information regarding obstructions, suchas including a size of the obstruction, a shape of the obstruction, alocation of the obstruction, an identity of the obstruction, adescription of the obstruction, materials that form or make theobstruction, specifications for the obstruction, drawings of theobstruction, damage to the obstruction, vulnerability or penetration ofthe obstruction to a weapon, movement of the obstruction, and weight ofthe obstruction.

Block 210 states determine information about the factors with respect toone or more targets, objects, and/or users.

One or more electronic devices determine the information about thefactors. For example, electronic devices collect, gather, retrieve,and/or sense the information.

Block 220 states determine, for each target, each object, and/or eachuser, a score or priority for each factor.

For example, a score or a priority is determined for each factor withrespect to each target, each object, and/or each user.

Block 230 states recommend, based on the score or the priority for eachfactor with respect to each target, each object, and/or each user, atarget and/or instructions to each user.

For example, one or more users are provided with instructions withregard to a target and/or recommendations with regard to a target. Forinstance, each user is assigned to one or more targets and provided withactions to take with regard to the assigned target. As another example,an electronic device displays a map that shows a path or coordinates forwhere the user should move. As another example, a display displays 2D or3D images of people, and different colors of these images representdifferent target priorities. For instance, each color is associated witha different priority or target action (e.g., red colored targets meanshoot the target; blue colored targets mean collect more informationabout the target; green colored targets mean follow or track the target;yellow colored targets mean apprehend the target; etc.). As yet anotherexample, a display displays 2D or 3D images of weapon penetrationlocations or weapon vulnerability locations on an object. For instance,each color is associated with a different vulnerability or safety (e.g.,red colored area means a combatant weapon can penetrate through theobject at this location; blue colored area means a combatant can see theuser at this location; green colored area means a safe zone whereweapons cannot penetrate and combatants cannot see; yellow colored areasmean possible danger areas or caution areas; etc.).

Block 240 states process the recommendations and/or the instructions.

For example, process includes, but is not limited to, one or more ofdisplaying the recommendations and/or the instructions, transmitting therecommendations and/or the instructions, storing the recommendationsand/or the instructions, executing the recommendations and/or theinstructions, analyzing the recommendations and/or instructions, andprocessing the recommendations and/or the instructions.

Consider an example in which one or more electronic devices collectinformation on targets, objects, and/or users. A target analysis andrecommendation system receives this information, analyzes theinformation to determine factors that influence assignment of users totargets, and assigns tasks and targets to users based on the analysis ofthe factors. This assignment includes prioritizing multiple targetsamong multiple users and providing assigned priorities to the users.

In an example embodiment, displayed images of targets and/or objectsappear to remain fixed at their locations in the field of view even ifthe users moves his head and/or moves the display of the electronicdevice. For example, from a point of view of a user, an image of atarget remains at a stationary location in the field of view on or overthe actual location of the target. For instance, the image of the targetand the target itself align and remain aligned or superimposed with eachother as the electronic device and/or user moves. Movement of the imagecoincides with movement of the target so the image and the target remainaligned. For example, a location of the image on the display moves sothe image remains fixed or stationary over the target if the targetand/or electronic device move.

FIGS. 3A-3H are tables of example factors that influence a selection ofa target. By way of example, the factors can be evaluated, scored,prioritized, assessed, analyzed, and provided with or withoutinstructions. For illustration, the tables show a first column as asubcategory, definition, or division of the factor and a second columnas a score and/or instructions. The score and/or instructions caninclude, but are not limited to, numbers, percentages, values,priorities, instructions, formula, mathematical equations, andinformation with regard to the factor. Further, the tables show thescore and/or instruction column with letter designations (such as A1,B1, C1, etc.). These designations are shown as letters as an exampleillustration and represent different scores and/or instructions withactual scores and/or instructions being omitted for brevity. Forexample, an “A1” is replaced with an actual score or instruction that isdisplayed and/or provided to a user. As another example, the “A1” is anumerical value or equation that is used to prioritize a target ordetermine an example embodiment. FIG. 3A shows a table 300 for thefactor of the distance to the target. As an example illustration,distances to the target are divided into six rows with a first columnthat shows distances (represented as 0-20 m, 21-50 m, 51-100 m, 101-200m, 201-500 m, and 500+m) to the target and a second column showing thescore and/or instructions for the distance (represented as A1-A6).

The scores and/or instructions can depend on the distance and otherfactors, such as a weapon. Consider an example in which users (soldiers)engage in urban combat with combatants (targets). The soldiers and thecombatants exchange fire with small arms and firearms (such as M16rifles and handguns). Table 300 would show multiple distances tocombatants for the soldiers. Closer targets would have a highernumerical score, and farther targets would have a lower numerical score.For instance, a first armed combatant that is 0-20 m from a soldierwould have a higher priority than a second armed combatant that is 500+mfrom the soldier since the first combatant would pose a greater safetythreat with a firearm to the soldier than the second combatant.

In the tables, rows higher in a table do not necessarily imply a greaterscore since the scores and/or instructions can be designated or assignedaccording to a variety of different situations and scenarios. Consideran example in which users (police officers) monitor and track criminalsuspects (targets). As a target gets farther away, it becomesincreasingly more difficult to gather information about the target andtrack it. Targets farther away can also more easily elude policeofficers. Closer targets would have a lower numerical score, and farthertargets would have a higher numerical score. For instance, a criminalsuspect that is 0-20 m from a police officer would have a lower prioritythan a second criminal suspect that is 101-200 m from the police officersince the second criminal suspect would pose a greater possibility ofescaping or alluding the police officer. Alternatively, the closersuspect could have a higher priority since he or she is more easilycaptured than a farther suspect.

FIG. 3B shows a table 310 for the factor of different types of weapons.As an example illustration, the different types of weapons are dividedinto six rows with a first column showing a type of weapon (representedas Handheld Combat, Small Arms, Explosives, RPG, Heavy, and Unknown) anda second column showing the score and/or instructions for the weapon(represented as B1-B6).

Consider an example in which military officials (users) search forhidden weapons (targets). A rocket propelled grenade (RPG) launchercould have a higher priority than a handheld combat weapon (such as apistol) since the RPG poses a greater security and safety threat than apistol. As such, a priority for B4 (for the RPG) would have a highervalue or greater importance than B1 (for handheld combat weapon).

Consider another example in which “Heavy” weapon in row 5 of table 310is defined as surface to air (SAM) missiles. An electronic deviceanalyzes a satellite photograph of a geographical area and determinesthe existence of a SAM missile. B5 (the associated instructions for“Heavy” weapons that include SAM missiles) designates the followinginstructions: Execute subroutine NOTIFY X21. This subroutine summarizesthe gathered information (such as identification and description of SAMmissiles, location of SAM missiles, time of discover of SAM missiles,and activity or movement of SAM missiles) and sends this information asan email or text to a list of military commanders. The subroutineconverts the gathered information into voice information, places acomputer generated phone call to one of the commanders, and providesthis voice information to the commander during the phone call.

FIG. 3C shows a table 320 for the factor of different types ofobstructions. As an example illustration, the different types ofobstructions are divided into six rows with a first column showing atype of obstruction (represented as None, Partial (Penetrable), Partial(Non-Penetrable), Full (Penetrable), Full (Non-Penetrable) and Unknown)and a second column showing the score and/or instructions for theobstruction (represented as C1-C6).

Consider an example in which a soldier has a .50 caliber rifle withelectronics that communicate with a target recommender. The targetrecommender determines the presences of two targets in a nearby building(the obstruction). A first target located in the building is not visibleto the soldier but could be hit with bullets fired from his rifle, andthe first target is designated as being fully covered but penetrable(i.e., “Full (Penetrable)” with an instruction of C4). A second targetlocated in the building is not visible to the soldier and could not behit with bullets fired from the rifle, and the target is designated asbeing fully covered and non-penetrable (i.e., “Full (Non-Penetrable)”with an instruction of C5). Instructions associated with C4 indicateengage and fire, and instructions associated with C5 indicate monitorbut do not fire. Based on the instructions of C4 and C5, the targetrecommender recommends that the soldier fire at the location of thefirst target and monitor a location of the second target. An electronicscope attached to the rifle displays a 3D image of the first target in afield of view of the soldier at the location of the first target in thebuilding and displays an instruction to “Fire” with the selected firsttarget. The electronic scope also displays a 3D image of the secondtarget in the field of view of the soldier at the location of the secondtarget in the building and displays an instruction “Monitor” with thesecond target. Both images can be simultaneously displayed at theirrespective real or actual locations in the field of view of the soldier.

FIG. 3D shows a table 330 for the factor of different types of incomingfire from weapons to one or more users. As an example illustration, thedifferent types of incoming fire are divided into six rows with a firstcolumn showing a type of incoming fire (represented as None, Yes toUser, Yes to Other Users, Recent Fire, Aiming Weapon, and Unknown) and asecond column showing the score and/or instructions for the obstruction(represented as D1-D6).

Consider an example in which soldiers (users) are equipped withelectronic devices that communicate with each other with a targetrecommendation system or a target recommender. The soldiers engage inheavy smalls arms fire with numerous combatants spread across an urbanenvironment. The target recommendation system determines locations ofcombatants, weapons of combatants, directions of fire from the weaponsof the combatants, locations of fire from the weapons of the combatants,directions of aim of the weapons of the combatants, and other factorsdiscussed herein. Priorities for incoming fire from combatants arearranged in the following hierarchy: Priority one of a soldier is tofire on a combatant currently firing a weapon on the soldier(represented as “Yes to User” with D2); priority two of a soldier is tofire on a combatant currently aiming or pointing a weapon at the soldier(represented as “Aiming Weapon” with D5); priority three of a soldier isto fire on a combatant currently firing a weapon at another soldier(represented as “Yes to Other Users” with D3); priority four of asoldier is to fire on a combatant that recently fired a weapon (e.g., aweapon that has a heat signature as being fired and represented as“Recent Fire” with D4); priority five of a soldier is to fire on acombatant with or near a weapon (represented as “None” with D1); andpriority six of a soldier is to fire on a combatant verified as being acombatant but unknown whether the combatant currently has a weapon(represented as “Unknown” with D6). The target recommendation systemgathers information during the armed engagement with the combatants andprovides soldiers with recommendations on which combatant to fire perthe priorities.

FIG. 3E shows a table 340 for the factor of different types of targetidentifications (IDs). As an example illustration, the different typesof target IDs are divided into six rows with a first column showing atype of target ID (represented as Capture, Kill, Survey/Monitor,Track/Follow, Civilian, Unknown) and a second column showing the scoreand/or instructions for the target IDs (represented as E1-E6).

Consider the example above in which the soldiers (users) are equippedwith electronic devices that communicate with each other with the targetrecommendation system, and the soldiers engage in heavy smalls arms firewith numerous combatants spread across the urban environment.Non-combatants (such as civilians, women, children, and animals) aredispersed throughout the urban environment. Given the various distancesto targets, smoke, haze, movement of targets, and other factors, asoldier may not be able to visually determine whether a target is acombatant, a civilian, a child, an animal, etc. Further, two combatantscan have different instructions. Such as one combatant being identifiedas a terrorist with a kill instruction, and another combatant beingidentified as a wanted criminal with a capture but not-kill instruction.The target recommendation system identifies people, animals, and objectsin the urban environment, builds a map of this information, and providesthe map and instructions to the soldiers based on the identifications.For example, a first target is identified as R.L.L. with a designated“Capture” target ID and E1 instructions to capture but not kill thecombatant. A second target is identified as P.S.L. with a designated“Survey and Monitor” target ID and E3 instructions to collectsurveillance data on this target. A third target is identified as themayor with a designated “Civilian” target ID and E5 instructions to donot harm or monitor this target. A fourth target cannot be identifiedand is designated as “Unknown” target ID with E6 instructions to do notharm but track this target.

FIG. 3F shows a table 350 for the factor of different types of movementof targets. As an example illustration, the different types of movementare divided into six rows with a first column showing a type of movement(represented as None, Stationary, Walk (0-5 feet per second, FPS), Run(5+ FPS), Motorized, and Unknown) and a second column showing the scoreand/or instructions for the movements (represented as F1-F6).

Consider an example in which police officers (users) plan to arrestnumerous suspects (targets) during a raid in a large building.Electronic devices survey, track, and follow movement of the suspects.Each different type of movement is provided with a numerical score from1 to 10. These scores are added with scores from other factors todetermine what action to take on a suspect. By way of example, thescores include the following: a suspect with no movement (represented as“None”) scores a value of 1 (F1); a suspect with little movement butremains at a stationary location (represented as “Stationary”) scores avalue of 2 (F2); a suspect that is walking (represented as “Walk”)scores a value of 4 (F3); a suspect that is running (represented as“Run”) scores a value of 8 (F4); a suspect that is moving in a motorizedvehicle (represented as “Motorized”) scores a value of 10 (F5); and asuspect with unknown movement (represented as “Unknown”) scores a valueof 2 (F6).

FIG. 3G shows a table 360 for the factor of different types ofcollateral damage with targets. As an example illustration, thedifferent types of collateral damage are divided into six rows with afirst column showing a type of collateral damage (represented as None,Structural, Human (Targets), Human (Non-Targets), Human (Unknown), andUnknown) and a second column showing the score and/or instructions forthe collateral damage (represented as G1-G6).

Consider an example in which a soldier (user) considers firing arocket-propelled grenade (RPG) at a building (target). A targetrecommendation system or a target recommender determines information onthe target, the user, the building, the RPG, and other information andprovides the soldier with one of the following instructions: If firingthe RPG on the building will incur no collateral damage (represented as“None”), then fire the RPG (instruction G1); if firing the RPG on thebuilding will incur some structural collateral damage (represented as“Structural”), then the soldier has discretion to fire or not to firethe RPG (instruction G2); if firing the RPG on the building will incurhuman collateral damage but the humans are targets (represented as“Human (Targets)”), then fire the RPG (instruction G3); if firing theRPG on the building will incur human collateral damage but the humansare not targets (represented as “Human (Non-Targets)”), then do not firethe RPG (instruction G4); if firing the RPG on the building will incurhuman collateral damage with unknown identity of the humans (representedas “Humans (Unknown)”), then do not fire the RPG (instruction G5); andif firing the RPG on the building will incur unknown collateral damage(represented as “Unknown”), then fire the RPG only with commandingofficer voice confirmation (instruction G6).

FIG. 3H shows a table 370 for the factor of different types of verifiedtargets. As an example illustration, the different types of verifiedtargets are divided into four rows with a first column showing a type ofverified target (represented as None, Partially Verified, FullyVerified, and Unknown) and a second column showing the score and/orinstructions for the verified target (represented as H1-H4).

Consider an example in which a user interacts with an electronic camerathat includes a processor, a display, a microphone, a network interfaceto wirelessly communicate with the Internet, and a memory storinginstructions that execute a target recommender. The user is instructedto take photographs of “people of interest” in an open market area. Theuser, however, does not know the identity of such people and relies onthe target recommender to provide instructions. When the user points andfocuses the camera at people in market, the target recommender performsfacial recognition of each person and displays instructions to the useras follows: If the target is not verified (represented as “None”) thendo not take a picture or record any information (instruction H1); if thetarget is partially verified (represented as “Partially Verified”) thentake 1-2 photographs and move to next target (instructions H2); if thetarget is fully verified (represented as “Fully Verified”) then takemore multiple photographs, engage microphone to record audio includingcomments of the user, and transmit photos and audio in real-time to overInternet to designated internet protocol (IP) address (instruction H3);and if the target is not able to be verified (represented as “Unknown”)then take 1-2 photographs and move to next target (instructions H4).

Actions of the target recommender can be automatically executed. Forexample, when a user focuses the lens of the camera on a person, thetarget recommender identifies the person and automatically takes apicture of the person per the instructions. For instance, the targetrecommender instructs the camera to take a picture when the person isverified or recognized. In this manner, the user is not burdened withtaking the pictures or deciding when to take a picture. Further, thetarget recommender can make this determination more quickly than theuser and is not subject to human error.

FIGS. 4A and 4B are tables of example user scenarios applied to thefactors in the tables of FIGS. 3A-3H. By way of example, two users (UserA and User B) encounter multiple targets (Target 1 to Target N, where Nis a whole number greater than 1). The factors in FIGS. 3A-3H aredetermined for each user with respect to each target, and one or morerecommendations are determined and provided to the users and/orelectronic devices of the users.

FIG. 4A shows a table 400 in which eight factors (shown in a firstcolumn as distance to target, weapons, obstructions, incoming fire,target identity, target movement, collateral damage, and targetverified, discussed in connection with FIGS. 3A-3H) are determined forUser A with respect to a first target (Target 1) and scored and/orprovided with instructions (shown in a second column as score/instruct).FIG. 4A also shows a table 410 in which the eight factors are determinedfor User A with respect to a second target (Target N) and scored and/orprovided with instructions.

FIG. 4B shows a table 420 in which the eight factors are determined forUser B with respect to the first target (Target 1) and scored and/orprovided with instructions. FIG. 4B also shows a table 430 in which theeight factors are determined for User B with respect to a second target(Target N) and scored and/or provided with instructions.

A target recommender analyzes the information collected with regard tothe factors in tables 400, 410, 420, and 430 and determines a targetrecommendation for User A and User B.

Consider an example in which User A and User B are soldiers that areengaged in a military ground offensive with numerous combatants (Targets1 to Target N).

Electronic devices determine the information in table 400 as follows:Target 1 is 0-20 m from User A; Target 1 has a handgun; no obstructionsexist between User A and Target 1; Target 1 is firing the handgun atUser A; Target 1 is identified with a kill order; Target 1 isstationary; no collateral damage will occur if User A fires his weaponon the Target 1; and Target 1 has an identity that is fully verified.

Electronic devices determine the information in table 410 as follows:Target N is 21-50 m from User A; Target N has a rifle; Target N islocated behind an obstruction but the obstruction is fully penetrablewith the weapon of User A; Target N is firing the rifle at User A;Target N is identified with a kill order; Target N is stationary; nocollateral damage will occur if User A fires his weapon on the Target N;and Target N has an identity that is partially verified.

Based on an analysis of the target information, the target recommenderrecommends that User A prioritize Target 1 over Target N. Thisrecommendation is based on the fact that Target 1 poses a greaterimmediate safety risk to User A since Target 1 is closer to User A thanTarget N, and no obstructions exist between Target 1 and User A.

Electronic devices determine the information in table 420 as follows:Target 1 is 201-500 m from User B; Target 1 has a handgun; Target 1 ispartially obstructed but the obstruction is penetrable with the weaponof User B; Target 1 is not firing the handgun at User B; Target 1 isidentified with a kill order; Target 1 is stationary; collateral damageis unknown if User B fires his weapon on the Target 1; and Target 1 hasan identity that is fully verified.

Electronic devices determine the information in table 430 as follows:Target N is 101-200 m from User B; Target N has a rifle; Target N islocated behind an obstruction but the obstruction is fully penetrablewith the weapon of User B; Target N is firing at other users; Target Nis identified with a kill order; Target N is stationary; no collateraldamage will occur if User B fires his weapon on the Target N; and TargetN has an identity that is partially verified.

Based on an analysis of the target information, the target recommenderrecommends that User B prioritize Target N over Target 1. Thisrecommendation is based on the fact that Target 1 does not pose animmediate safety risk to User B since Target 1 is located 201-500 m fromUser B and has a handgun. Furthermore, Target N poses a greaterimmediate safety risk to other users since Target N is currently firingon other users.

FIG. 5 is a method to select a target based on one or more factors.

Block 500 states activate a target recommender.

By way of example, the target recommender can include one or more of anelectronic device, a computer or electronic system, a computer targetacquisition analysis recommendation system, hardware, and a softwareapplication.

Block 510 makes a determination as to whether a target is active.

A determination is made as to whether the target is active, such asmoving, armed, performing an action, designated as a target (such asdesignated as a combatant or an object or person of interest), proximatea weapon, using a weapon, etc. For example, a determination is made asto whether a user, an electronic device, a machine, and/or an objectreceives incoming fire from a target and/or a weapon, such as roundsfrom a firearm or other projectiles launched from a weapon. As anotherexample, a determination is made as to whether the weapon is activated,being held, used, engaged, or has a particular point of aim, such asbeing aimed at a user, a vehicle of a user, or a location of a user. Asanother example, a determination is made as to whether the target ismoving or performing an action (such as an illegal or criminal action).As another example a determination is made as to whether the target isidentified as a target (such as being recognized as a combatant, aperson of interest, a criminal, a suspect, etc.).

If the answer to the determination in block 510 is “yes” then flowproceeds to block 520 and the target is selected. If the answer to thedetermination in block 510 is “no” then flow proceeds to block 530.

For example, select the target and/or weapon firing or aiming at a user,an electronic device, a machine, an object, and/or a location. Asanother example, select the target and/or weapon providing incoming firefrom the weapon, such as rounds from a firearm or other projectileslaunched from a weapon. As another example, select the target and/orweapon when a determination is made that the weapon is activated, beingheld, used, or engaged, or has a particular point of aim, such as beingaimed at a user, a vehicle of a user, or a location of a user. Asanother example, select the target when the target is identified asbeing on a list of targets (such as utilizing facial recognitionsoftware to identify an individual whose name is stored as being atarget).

Block 540 makes a determination as to whether the selected target isde-active.

For example, a determination is made as to whether the selected targetand/or weapon is killed, neutralized, wounded, terminated,incapacitated, destroyed, struck, moved, no longer active, off,inoperable, non-threatening, etc.

If the answer to the determination in block 540 is “yes” then flowproceeds back to block 510. If the answer to the determination in block540 is “no” then flow proceeds back to block 520.

For example, the target recommender identifies a person and/or an objectas being a target, selects this person and/or object as the target, andprovides this recommendation to an electronic device of a user. When thetarget becomes de-active per block 540, then flow proceeds back to block510 and a new or different target is selected. For instance, a nextactive target is selected for the user. If the target is not de-activeper block 540, then flow loops back to block 520 and the current targetremains selected. For instance, the person and/or object selectedremains selected until the person and/or object becomes de-active.

Block 530 makes a determination as to whether an action is requested.

For example, a determination is made as to whether another user requestsassistance, another user receives fire from a weapon and/or target, auser receives instructions or actions to be completed, a target isselected for a user, or a factor or condition prioritizes or overrides aprevious target selection.

If the answer to the determination in block 530 is “yes” then flowproceeds to block 520, and the target is selected. If the answer to thedetermination in block 530 is “no” then flow proceeds to block 550, anda target is selected based on one or more other factors (such as one ormore factors discussed herein).

The target recommender processes, stores, provides, transmits, and/ordisplays a selected target. For example, an electronic device displaysthe target or indicia to recognize and/or distinguish the target to auser.

Consider an example in which a soldier has a rifle with an electronicscope that communicates with or includes a target recommender. Therifle, the electronic scope, and/or the target recommender determinethat a combatant is located one hundred yards (100 y) from the soldierand is firing a weapon at the soldier. The target recommender selectsthis combatant as the target and provides this selection to the soldier,the rifle, the electronic scope, and/or an electronic device with thesoldier. For example, an HPED with the soldier or the electronic scopedisplays the location of the combatant and the selection of thecombatant as the current target. The combatant is prioritized as atarget since the combatant is firing a weapon on the soldier and henceposes an immediate danger or threat to the soldier.

Consider further the example in which the soldier has the rifle with theelectronic scope that communicates with or includes the targetrecommender. The soldier neutralizes the selected combatant, and noother people and/or weapons are firing at the soldier at this time. Anelectronic device of another soldier detects the presence of multiplecombatants with small arms and other weapons and transmits an assistrequest to the electronic scope, HPED, and/or target recommender. TheHPED with the soldier or the electronic scope of the soldier displaysthe assist request, the location of the multiple combatants, thelocation of the other soldier, and the selection of the multiplecombatants as the current target. The multiple combatants areprioritized as a target in response to the assist request.

Consider further the example in which the soldier has the rifle with theelectronic scope that communicates with or includes the targetrecommender. The target recommender determines that no weapons are beingaimed or fired at the soldier and that no assistance requests areprovided from other soldiers. The target recommender selects targets forthe soldier and provides these selections based on one or more factors,such as distance from the soldier to a combatant, a weapon with or neara combatant, an identity of a combatant, movement of a combatant, anobstruction near a combatant and/or the soldier, or another factordiscussed herein. For instance, satellite image analysis reveals twocombatants are located two hundred yards away from the soldier in acompass direction of one hundred and ninety degrees (190°). The HPED ofthe soldier displays the location of these two combatants and theselection of them as the target. The display also displays a safe routeor a path for the solider to take to a cover location that is closer tothe selected two combatants. With this information, the soldier proceedsto the cover location to engage the two combatants.

Prioritization and/or selection of a target can be based on one or morefactors that have varying degrees of scope, weight, priority, score,influence, instruction, etc. For example, FIG. 5 shows a method in whichpriority includes a hierarchy of first whether a target is active perblock 510, second whether action is requested per block 530, and thirdbased on another factor per block 550. These priorities, however, can bealtered or re-arranged according to selection from a user and/orelectronic device. For instance, blocks 510 and 530 can be switched toalter priority to include a hierarchy of first whether an action isrequested, second whether a target is active, and third based on anotherfactor. These priorities can be further altered or re-arranged, such asselecting one or more of the factors discussed herein to be included orrepresented per blocks 510 or 530.

FIG. 6 is a method to determine a recommendation for a target based onwhere a weapon fires.

Block 600 states determine, based on target information, a locationand/or an identity of a weapon.

A target can include a weapon, be the weapon, or be proximate to theweapon. For example, a person holds or carries a firearm. As anotherexample, a weapon mounts to a vehicle. As another example, a weapon(such as explosives) is located in a building. As another example, aweapon includes an automated or man-operated electronic apparatus orelectronic system that fires a projectile.

An identity of the weapon can be a general identity or recognition (suchas a determination that a weapon exists or likely exists) or a morespecific identity (such as a determination that the weapon is a knife, ahandgun, a rifle, a firearm, a rocket propelled grenade, etc.). Theidentity of the weapon can also include particular and/or distinguishinginformation (such as a determination of a make, a model, a size, aprecise geographical location, and/or a shape of the weapon).

Block 610 states determine, based on the target information, one or moreof whether the weapon is firing or will be firing, a point of aim of theweapon, and where the weapon is firing.

The target information can provide evidence or facts as to whether theweapon is currently firing or recently fired, will be firing (such asfiring in the near or immediate future), a location to where a weapon isaimed (such as a direction of a point of aim), a location to where theweapon is firing or fired. By way of example, this target informationincludes, but is not limited to, a weapon having an elevated temperatureor heat signature (such as a heated barrel), a weapon producing a noiseor a flash (such as a noise and/or a flash associated with a firearmshooting a bullet), a weapon launching or firing tracer ammunition orrounds that are visible and detectable (such as a rifle firing tracerbullets or tracer ammunition), a weapon generating smoke (such as smokeplumes from a launch of a rocket or smoke released from a firearm whenit fires a bullet), a weapon recoiling or moving upon being fired toindicate a direction of fire for the weapon (such as a rifle recoilingin an opposite direction of a line of departure of the bullet beingfired), a point of aim of a weapon (e.g., determined from photo or videoanalysis), visual indications of an impact location of a projectilefired from a weapon (such as bullets hitting objects and making a soundupon impact of the object or leaving a visible mark at the impactlocation), observations from a user indicating firing or aiming of aweapon, and analysis of photographs or video of targets and/or weapons(such as object recognition software determining an existence of aweapon in a photograph or photogrammetry determining weapons, locationsof impact locations of projectiles fired from the weapon, angles oflines of departure or lines of sight, trajectory paths, etc.).

Consider an example in which an electronic device takes photographsand/or video of a target and provides the photographs and/or video to acomputer system, such as a computer vision system. The computer systemexecutes object recognition to identify people, weapons, and points ofaim of the weapons. By way of example, object recognition can include amethod based on one or more of Computer Aided Design-like (CAD-like)object models (e.g., edge detection or primal sketch), appearance-basedmethods (e.g., use templates or exemplars of the objects to performrecognition), feature-based methods, and genetic algorithms.

Block 620 states determine a recommendation for the target based on theone or more of whether the weapon is firing or will be firing, the pointof aim of the weapon, and where the weapon is firing.

Block 630 states provide the recommendation to a user and/or anelectronic device.

For example, the recommendation is processed with a processor orprocessing unit, stored on memory, executed with a computer and/orelectronic device, transmitted over a wireless network, displayed on adisplay of an electronic device, provided to a user and/or an electronicdevice, and/or shared between one or more electronic devices and/orusers.

Consider an example in which a soldier carries an electronic device(such as an electronic scope mounted to a rifle) in a combatenvironment. The electronic device includes a camera that capturesimages in its field of view, a microphone that captures sound, arangefinder that measures distances to objects, a clock, a memory thatstores a target recommender, and a processor that executes the targetrecommender with collected target information from the camera, themicrophone, the clock, and the rangefinder. The camera captures imagesof an unidentified person holding an object that emits a flash of light,and the rangefinder determines that the person and the object are 300meters away. Approximately 0.88 seconds after the flash of light, themicrophone detects a loud sound. The target recommender analyzes thistarget information and determines the following:

-   -   (1) A speed of sound at the geographical location of the        electronic device is 340 meters per second (m/s). According to        the clock in the electronic device, the loud sound occurred 0.88        seconds after detection of the flash of light. Given the formula        of rate multiplied by time equals distance (Rate×Time=Distance),        the distance from the emanation location of the sound at the        flash point is 340 m/s×0.88 s which is 300 meters (the distanced        determined by the rangefinder).    -   (2) The calculated distance of 300 meters from the sound        coincides with the distance determined from the rangefinder that        the person and object are 300 meters away. The likeness of these        two numbers indicates that the loud sound likely originated from        the flash location.    -   (3) The sound wave of the loud sound captured with the        microphone is compared with stored sound waves, and this        comparison reveals a pattern match with a sound of an AK 47        firing from approximately 300 yards away.    -   (4) An image of the flash of light from the object is examined        to determine flash signatures, such as a size, a shape, a color,        an intensity, and an illumination pattern of the flash of light.        The flash signatures of the captured flash of light match a        size, a shape, a color, an intensity, and an illumination        pattern consistent with flash signatures of an AK 47 rifle        firing toward an object. The flash signature of the flash of        light from the object further indicates that the direction of        aim of the AK 47 rifle is at or toward the camera that captured        in the image. Further, a size of the flash is compared with        stored flash sizes, and this comparison confirms that the flash        size corresponds with a flash size from an AK 47 rifle at 300        meters.    -   (5) A speed of a bullet from an AK 47 rifle is approximately 715        meters per second (m/s). A time for a bullet to travel 300        meters is 0.42 seconds. If the object in the image were indeed        an AK 47 rifle that fired at the electronic device, then the        bullet would have passed or impacted 0.42 seconds after the        flash (assuming the speed of light to be instantaneous with        respect to the speed of sound).    -   (6) Sound waves captured with the microphone are examined at a        point in time corresponding to 0.42 seconds after the time of        the flash. These sound waves are compared with known sound wave        patterns of bullets passing by an object. The comparison reveals        a match that indicates a reverberation or sound did occur at        that time.    -   (7) A thermal image of the person and the weapon are compared        with known thermal images or thermal image data, and this        comparison confirms a person holding a rifle that has been fired        numerous times.    -   (8) Object recognition software determines, based on a size and        shape of the object at the given distance (i.e., 300 m), that        the object fits a profile of a rifle.    -   (9) Facial recognition software confirms that the image of the        person holding the object is a person, though an identification        (e.g., name) of the person is not available.    -   (10) An analysis of historical information reveals that six        other electronic devices of other users have determined        combatants firing AK 47 rifles within a radius of one kilometer        of the electronic device and within the last three hours.

Based on this information, the target recommender determines that theperson is a combatant and is holding a weapon (likely an AK 47 rifle).The target recommender further determines that the person is firing theweapon at the soldier of the electronic device and hence provides apriority recommendation to target the person and the weapon. A displayof the electronic device of the soldier displays this recommendation andprovides further collected information (such as a location of theperson, a distance to the person, identification of the weapon of theperson, and an indication that the person is firing at the soldier). Anelectronic scope on a rifle of the soldier automatically adjusts itsreticules or cross-hairs to zero the scope for a target that is 300meters from the soldier.

Analysis of an audio recording of a gunshot provides information as to alocation of the weapon and speed and trajectory of a bullet fired fromthe weapon. For example, a shock wave from a bullet expands with aconical wave front that propagates at the speed of sound with astrongest sound level or amplitude along a direction of fire of theweapon. A direction of the propagating shock wave can be determined withtwo spaced microphones. For instance, these two microphones can belocated on an electronic device (such as two spaced microphones on arifle, on an electronic scope, or on a user) or two microphones atdifferent locations (such as first microphone on an a rifle, on anelectronic device, or on a user and a second microphone on anotherrifle, on another electronic device, or on another user).

Further, a propagating sound wave from a bullet has an inner angle (θ)given by the following formula:

θ=arcsin(1/M),

where M is the Mach number given by velocity of the object divided bythe velocity of sound (Vobject/Vsound or V/c, where c is the velocity ofsound).

This equation further reveals that 0 can be calculated when the speed ofthe object and the speed of sound are known. The speed of the object(e.g., bullets) can be determined from ballistic tables, and the speedof sound can be determined from sound tables for different geographicallocations.

A bullet makes a distinct shockwave recording (e.g., a distinct waveshape) at given distances depending on, for example, reverberations. Forexample, a wave propagates with an “N” shape and with a length ofseveral milliseconds such that the microphones record the original waveand a reflected wave (e.g., a reflected wave from ground surfaces).

Consider an example of an electronic device that includes a targetrecommender with a gunfire locator system that determines and conveys alocation of gunfire. The system includes one or more microphones, one ormore sensors (such as a optical or infrared sensor), memory that storesa gunfire location determiner, a processor, and a display and/or userinterface. An optical and/or infrared sensor detects an optical flash ofthe weapon and/or frictional heat of the bullet through the air, and themicrophone records a bullet bow shockwave (e.g., a sound of theprojectile as it passes the microphone) and/or a muzzle blast (e.g.,sound of the weapon as it fires the projectile). Based on this collectedinformation, the gunfire locator system or target recommender determinesa location of the weapon and a category, characteristic, and/or type ofthe weapon.

Various factors influence assignment of a user to one or more targets,and such factors can be static (such as a set list of factors) ordynamic (such as an evolving list of factors, scores, weights,calculations, instructions, etc.). For example, one or more factorschange in real-time based on determined environmental data, targetinformation, user information, etc.

Consider an example in which combat rules of engagement for a soldierstate that a soldier cannot fire upon a combatant unless the combatantholds a firearm or weapon. If the combatant is not holding a firearm orweapon, the target recommender monitors the combatant as a target butdoes not authorize firing upon the combatant. If the combatant retrievesand holds a firearm or weapon, the target recommender alters theassignment instructions and authorizes firing upon the combatant.Subsequently, a target recommender changes the rules of engagement tostate that a soldier can fire upon a combatant if either the combatantholds a firearm or a weapon or the combatant is identified as aconfirmed combatant.

Additionally, the target recommender provides instructions based onactivity of the combatant. For example, the target recommenderdetermines a first combatant carrying a cold firearm (i.e., one that hasnot been recently fired) and determines a second combatant holding,aiming, and firing a hot firearm (i.e., one that is being fired or hasbeen recently fired). Although both combatants have firearms, the secondcombatant poses a more serious risk or danger than the first combatantsince the second combatant is firing the firearm. In response to thesedifferent activities and different threats, the target recommenderassigns a higher priority to the second combatant or assigns differentinstructions to the second combatant than the first combatant.

Consider an example in which soldiers confront numerous combatants thatare dispersed throughout an urban environment. Soldier A has an optionto engage numerous different combatants that are proximate to him. Adetermination as to which combatant to engage may primarily be based onlocation or proximity (e.g., Soldier A should engage the closestcombatant). The closest combatant, however, may not pose a greatest riskto soldier A since another combatant farther away may actually be aimingor firing a weapon at soldier A. The target recommender determinestarget information (such as points of aim and firing locations of thecombatants) and assigns recommendations based on this targetinformation. For example, soldier A is provided with a recommendation totarget the other combatant since this combatant is aiming a weapon atsoldier A even though this other combatant is farther away than othercombatants. The target information used to make this recommendation isgathered from other soldiers in urban environment, surveillance data(such as data from satellites, drones, etc.), and other individuals.

Consider an example in which two hunters are hunting ducks together. Ina first scenario, the two hunters do not utilize a target recommender. Aflock of ducks flies overhead, and both hunters aim and fire their gunat the same duck. One duck is shot, but the two hunters are not sure whoshot the duck. Now consider a second scenario in which the two huntersutilize a target recommender. A flock of ducks flies overhead, and bothhunters aim their gun at the same duck. The target recommender analyzesimages of the flock and points of aim of the two guns and determinesthat both guns are pointed at the same duck. The target recommenderinstructs the second hunter to move his point of aim to another duck sothe two hunters do not have their points of aim on the same duck. Inresponse to this recommendation, the second hunter moves his point ofaim, and both hunters fire upon the flock. Each hunter shoots adifferent duck, and no discrepancy or confusion exists as to whichhunter shot which duck.

Consider an example in which infantry soldiers are engaged in an activefirefight with numerous combatants. Since many combatants and soldiersare firing, it is difficult for a soldier to determine which combatantis firing at which soldier. A target recommender collects targetinformation from electronic devices of each soldier (e.g., electronicscopes, rifles with electronics, and wearable electronic devices) andother information sources discussed herein. The target recommenderanalyzes this information and determines locations of combatants,locations of the soldiers, weapons of the combatants, points of aim andfiring locations of the combatants, rates of fire of the combatants andsoldiers, distances between combatants and soldiers, movement of thecombatants and soldiers, obstructions between the combatants andsoldiers, and other information discussed herein. Based on thisinformation, the target recommender prioritizes target recommendationsamong the soldiers. By way of example, soldier A receives arecommendation to target combatant 1 since this combatant is firing onsoldier A, and soldier B receives a recommendation to target combatant 2since this combatant is firing on soldier B. Soldier C receives arecommendation to target combatant 3 since this combatant is firing onsoldier D, and soldier C has a better line of sight and higherlikelihood to hit combatant 3. Soldier D is instructed to temporarilytake cover next to an obstruction. Soldiers E and F receiverecommendations to fire upon combatant 4 since this combatant is engagedin heavy arms fire. Soldier G receives a recommendation to launch arocket propelled grenade at an entrance to a building since the targetrecommender confirmed that this entrance houses a large ammunition cashfor the combatants.

FIG. 7 is a method to determine a recommendation for a target based onobject information.

Block 700 states determine object information about an object.

By way of example, object information includes, but is not limited to,an identity of the object (e.g., identifying an object as a tree, abuilding, a vehicle, a structure, etc.), a size of the object, a shapeof the object, a location of the object, a condition of the object(e.g., new, old, partially destroyed, damaged, functional, etc.), animage or video of the object, technical specifications about the object,instructions about the object, data or information about the object,blueprints of the object, engineering drawings of the object,specifications of the object, a proximity or location of the object withrespect to a user and/or a target, movement and/or activity of theobject, a kind of the object (e.g., a make and/or model of the object),and purpose or function of the object.

Block 710 states determine, based on the object information, one or moreweapon penetration locations and/or weapon vulnerability locations onthe object.

The object information provides information about where an object issusceptible to be penetrated, perforated, punctured, pierced, or passedthrough with a projectile fired from a weapon. This information includeslocations where an object is compromised or unfit as a cover or as anobstruction (such as an object providing cover from incoming fire orcover for a person to remain covert). The object information alsoprovides information where an object or a person or thing on, in, ornear the object can be observed, surveyed, or seen by another person oran electronic device.

With regard to the weapon penetration location and/or weaponvulnerability location, an example embodiment determines a size of thelocation, a shape of the location, a location on the object, materialcomposition of the location, and other information (such as apercentage, probability, or likelihood of a projectile penetrating acertain location on the object).

In an example embodiment, a weapon penetration location and/or a weaponvulnerability location includes locations on, in, and/or near an objectthat are susceptible to fire from a weapon or surveillance from a personor an electronic device. For example, the weapon vulnerability locationincludes locations where fire from a weapon previously occurred, isoccurring, or could occur in the future. For instance, an area betweentwo buildings is within a field of view of a combatant and/or withinrange of a weapon of a combatant. This area is a weapon vulnerabilitylocation. As another example, the weapon penetration location includeslocations into which or through which a projectile can penetrate andharm a user at the location. For instance, a wall between a user and acombatant is a weapon penetration location if a bullet fired from a gunof the combatant can pass through the wall and strike the user.

Block 720 states determine, based on the weapon penetration locationand/or weapon vulnerability location, a recommendation for a target.

By way of example, the recommendation includes, but is not limited to,fire on the target, stop or no fire on the target, priority of thetarget, analysis of the target and/or object, locations of the weaponpenetration location and/or weapon vulnerability location, suitabilityof the object as cover from incoming fire, and other recommendationsdiscussed herein.

Block 730 states provide the recommendation to a user and/or anelectronic device.

For example, the recommendation is processed with a processor orprocessing unit, stored on memory, executed with a computer and/orelectronic device, transmitted over a wireless network, displayed on adisplay of an electronic device, provided to a user and/or an electronicdevice, and/or shared between one or more electronic devices and/orusers.

An example embodiment displays weapon penetration locations and/orweapon vulnerability locations on or through an electronic device. Forexample, a target recommender determines certain windows and walls of abuilding are penetrable and/or vulnerable with a bullet fired from arifle. These windows and walls are highlighted on a display to visuallydistinguish them from other windows, other walls, or other locationsthat are not penetrable and/or vulnerable from weapons. As anotherexample, a target recommender determines that an outdoor area can be hitwith fire from a sniper with a gun. Wearable electronic glasses of auser display a 3D zone in a field of view of the user that coincideswith this area. The user can see on or through the display boundaries ofthe area (such as length, width, and height of this area) so the userknows where the area starts and stops.

A recommendation of a target to a user includes a factor of objectinformation. By way of example, this object information includes anobject or an obstruction that is located near, with, or between a userand/or a target. Further, a type of the object and its physicalcharacteristics (such as size, shape, location, material composition,structural integrity, etc.) influence or affect recommendations and/orassignments of users to target. For example, an object with multiplelarge weapon penetration locations would score differently (e.g., worse)as a cover location than another object with small or no weaponpenetration locations. Further, scores or priorities for objects and/orobstructions can be based on a type of the obstruction, weaponpenetration locations, weapon vulnerability locations, physicalcharacteristics of the object, and other factors and information.

Consider an example in which two automobiles are located near a buildingand a soldier seeks to take cover at one of these vehicles. A targetrecommender analyzes these two automobiles, identifies a make and modelof the automobiles, and further determines weapon penetration andvulnerability locations as follows. A first one of these automobiles isa sedan with windows that are broken out (i.e., gone or missing). Thetarget recommender determines angles and locations of potential oractual fire from combatants, and determines that these windows diminishthirty percent (30%) of the cover area of the automobile for thesoldier. A second one of these automobiles is a pickup truck with novisible structural damage. Given the wheel sizes, the pickup truckhowever, is elevated from the ground and hence includes a large, openarea under the vehicle. Given the angle and direction of knowncombatants, the target recommender determines that seventy percent (70%)of the total area of the vehicle cover (i.e., where the soldier wouldseek cover) is vulnerable to incoming fire from weapons. For example,bullets can pass under the pickup truck from the firing side to theother side (i.e., the cover side) and potentially strike the soldierseeking cover. The target recommender recommends that the soldier moveto the automobile instead of the pickup truck since the automobile has alarger safe zone or larger area of cover.

Consider an example in which object recognition software of a targetrecommender determines an identity of several different objects. Thisidentity includes a size of the object, a shape of the object, anapproximate weight of the object, material from which the object is madeor fabricated, a location of the object, and weapon penetrationlocations or weapon vulnerability locations. Ballistic analysis withrespect to the objects further determines whether a projectile firedfrom a weapon can penetrate into or through the object (e.g., penetratethrough the object and strike a person on the other side of the object).

In an example embodiment, a target recommender analyzes ballisticinformation (including terminal ballistics) and object information todetermine whether a projectile can penetrate an object. For example,terminal ballistic information provides information on impact depths ofa bullet from a rifle (such as an AK 47 rifle) on various types ofobjects and materials. This information is stored and retrieved in orderto calculate weapon penetration locations (e.g., where a bullet can passthrough the object) and weapon vulnerability locations (e.g., where abullet could or possibly pass through the object).

By way of example, an approximation of impact depth (D) of a bullet isgiven according to the following equation:

D=L(A/B),

where L is a length of the projectile, A is a density of the projectilematerial, and B is the density of the material of the target.

Consider an example in which a target recommender analyzes photos of atarget and determines that the target includes an AK 47 rifle. Althoughthe target recommender may not know the exact rounds being fired fromthe AK 47 rifle, the target recommender can determine, estimate, orapproximate impact depths on various objects based on standard or knownammunition for the AK 47 rifle. Alternatively, a user finds or capturesa target with an AK 47 rifle, determines the ammunition being used, andprovides this information to the target recommender.

Consider an example in which soldiers engage combatants with firearms inan urban environment. A target recommender determines that a firstcombatant fires a firearm at the soldiers from inside of a house. Thetarget recommender further determines that walls of houses in thisgeographical area are typically made from wood and drywall. Given thedistance of the soldiers from the first combatant and ballisticsinformation of the ammunition and the firearms of the soldiers, thetarget recommender determines that bullets fired from rifles of thesoldiers can penetrate through walls and windows of the house and strikethe first combatant located inside of the house. These locations arerecorded as weapon penetration locations and displayed and/or providedto the soldiers. For example, electronic devices of the soldiers displaya recommendation to fire at first combatant and further display theweapon penetration locations on the house to the soldiers.

Consider the example in which the soldiers engage the combatants withfirearms in the urban environment. A second combatant drives an armedvehicle. The target recommender receives images of the vehicle, analyzesthe images, determines a make and model of the vehicle, and retrievesspecifications for the vehicle. The specifications include weaponpenetration locations that show where the vehicle is susceptible orvulnerable to small arms fire. The target recommender displays theseweapon penetration locations on a display of wearable electronic glassesof a soldier. For example, 2D or 3D images of the weapon penetrationlocations overlay on the display on the actual vehicle and remain onthese locations as the vehicle moves. When the soldier looks at thevehicle, the images are overlaid on the vehicle so the soldier knowswhere to aim and fire his weapon to strike the weapon penetrationlocations on the vehicle.

Consider the example in which the soldiers engage the combatants withfirearms in the urban environment. Some of the soldiers receive anexcessive amount of incoming fire. The target recommender determines twopossible cover locations that are proximate but not readily visible tothe soldiers. A first location consists of a long stonewall, and asecond location consists of a shed. The target recommender analyzesimages of these to cover locations and determines that the stone wall isstructurally intact, approximately five feet tall, and six to eightinches thick; and the shed is formed from sheet metal. Based on thisobject information and a determination of impact depths, the targetrecommender displays recommendations or alerts to the soldiers to takecover at the stonewall. An electronic device of one of the soldiersdisplays a map that shows a location of the stonewall and a path to movefrom his current location to a location at the stonewall.

FIG. 8 is a method to determine a recommendation to move to an alternatelocation.

Block 800 states determine a location of a user and one or more targets.

An example embodiment determines a location of one or more users,targets, weapons, and/or objects at a geographical location and storesthese locations. For example, a distance between each user and eachother target is determined and stored, and a determination is made ofangles, objects, and/or obstructions between each user and each othertarget. These locations and this information are stored and mapped to amap.

Block 810 states determine a score for the location of a user.

The score is based on one or more of target information, userinformation, object information, weapon information, and thedetermination of the location of one or more users, targets, weapons,and/or objects at the geographical location.

Block 820 states determine a score for one or more alternate locationsfor the user.

The score is based on one or more of target information, userinformation, object information, weapon information, and thedetermination of one or more of the location of users, targets, weapons,and/or objects at the geographical location.

Block 830 states determine, based on the score of the location and theone or more scores for the alternate locations, a recommendation thatthe user moves to one of the alternate locations.

For example, the scores are compared, contrasted, examined, processed,and/or subject to one or more statistical or probability calculations orprocesses.

Block 840 states provide the recommendation to the user and/or anelectronic device.

For example, the recommendation is processed with a processor orprocessing unit, stored on memory, executed with a computer and/orelectronic device, transmitted over a wireless network, displayed on adisplay of an electronic device, provided to a user and/or an electronicdevice, and/or shared between one or more electronic devices and/orusers.

An example embodiment determines a safety score for a user at hiscurrent geographical location and a safety score for a plurality ofother geographical locations that are proximate to the user. A safetyscore represents or indicates a level, degree, or amount of safety of auser at a location. For example, this score represents a probability orlikelihood of a user receiving or incurring harm from a target and/orweapon at the location (e.g., the user being hit with a projectile orfired at with a weapon while at the location). As another example, thisscore represents a probability or likelihood of a being or remainingundetected by a target at the location (e.g., the user being unseen orunnoticed while at the location).

The safety scores are based on determining at each location one or moreof a distance from a location to each target and/or user, a distancefrom a location to each object (including each weapon), an obstructionat each location (including a size, shape, material composition, weaponpenetration locations, weapon vulnerability locations, and structuralintegrity of each obstruction), impact depths of a projectile,obstructions along a line of sight from the location to a target,whether a location is receiving or has received fire from a targetand/or weapon, a rate of fire a location is receiving or has receivedfrom a target and/or weapon, an angle from the location to each targetand/or weapon, and other factors discussed herein.

Consider an example in which ground troops equipped with electronicdevices discussed herein engage combatants in an urban environment. Asoldier positions himself behind a tree and fires at combatants locatednear him. A target recommender collects or receives target and userinformation that includes distances to each combatant within firingrange of a current location of the soldier, distances to each combatantwithin firing range of alternate locations of the soldier, angles fromthe current location and the alternate locations to the locations of thecombatants within firing range of the soldier, weapons of the combatantsin this firing range, structures, objects, and/or obstructions at thecurrent location, the alternate locations, and the locations of thecombatants, weapon penetration locations and/or weapon vulnerabilitylocations of the current location and the alternate locations,obstructions and/or objects between the locations of the combatants andthe current location and the alternate locations, where the currentlocation and alternate locations are receiving or received incoming firefrom the locations of the combatants, locations and/or movement of otherusers (e.g., other soldiers), impact depths of objects at variousalternate locations, and other information discussed herein. Based onthis information, the target recommender determines a recommendation asto whether the soldier should remain at the tree or move to a differentlocation.

FIG. 9A is a score table 900 for an obstruction. The obstruction can beevaluated, scored, prioritized, assessed, or analyzed in view of one ormore factors or conditions. By way of example, table 900 shows ninefactors that include identification (a name or identity of anobstruction, such as a vehicle, a bridge, a tree, a building, etc.),dimensions (a size of the obstruction, such as length, width, andheight), shape (such as rectangular, elongated, short, tall, oval,etc.), material (such as wood, polymer, steel, etc.), angle/elevation(such as an angle from the obstruction to one or more targets or adifference in elevation of the obstruction versus one or more targets),structural integrity (such a new, compromised, fully intact, partiallyintact, damaged, etc.), history (such as previous uses of thisobstruction or like obstructions as cover), and weapon penetrationlocations (including impact depths of projectiles on the obstruction).Each factor also includes a score, priority, evaluation, and/orinstruction (shown in the table as O1-O9).

Each factor in a table can be further evaluated, scored, prioritized,etc. By way of example, FIG. 9B shows a score table 950 for the factorWeapon Penetration Locations (shown as the ninth factor in table 900).

Table 950 shows six factors that include shape (such as rectangular,elongated, short, tall, oval, etc.), size (such as measured incentimeters, inches, feet, yards, meters, etc.), number (such as anumber of different locations that can be penetrated with a weapon),percent surface area (such as an amount of surface area of theobstruction that includes weapon penetrations locations versus a totalamount of surface area or an amount of surface area that does notinclude a weapon penetration location), and unknown. Each factor alsoincludes a score, priority, evaluation, and/or instruction (shown in thetable as W1-W6).

Consider an example in which a soldier engages combatants with a riflewhile being one hundred and fifty meters (150 m) to two hundred meters(200 m) away from the combatants. The soldier fires at the combatantsfrom behind a building. A target recommender evaluates the currentlocation of the soldier and current obstruction or cover (i.e., thebuilding) and compares this location and obstruction with alternatelocations and obstructions. The building has a low safety score as avantage point to engage the combatants since it is damaged, includesmultiple entrances through which a combatant could enter, and hasnumerous weapon penetration locations through which combatant bulletscan penetrate. The target recommender determines several abandonvehicles that are located one hundred meters (100 m) to about onehundred and fifty meters (150 m) from the combatants. These vehicleshave a higher safety score as a vantage point to engage the combatantssince they are structurally sound, have few weapon penetration locationsfrom small arms fire from the combatants, offer improved lines of sightto the combatants, and have no blind spots to receive fire from thecombatants. The target recommender provides the soldier and/or anelectronic device of the soldier with a recommendation to move to thevehicles to engage the combatants. For example, a display on theelectronic device displays a map and/or a path from the current locationof the soldier to the vehicles.

FIG. 10 is a method to adjust a target recommender based on userselection of targets.

Block 1000 states a target recommender recommends a target to a user.

For example, the target recommender recommends the target to the user inaccordance with one or more example embodiments discussed herein. Therecommendation can be or include an action or instructions (such as arecommendation to move to a different location or instructions to assistanother user).

Block 1010 makes a determination as to whether the user selects anothertarget different than the recommended target. If the answer to thisdetermination is “no” and the user selects the recommended target, flowproceeds to block 1020. If the answer to this determination is “yes” andthe user selects another target different than the recommended target,flow proceeds to block 1030.

Block 1020 states maintain the target recommender. For instance, nochanges, adjustments, alterations, or modifications are made to thetarget recommender. Flow proceeds from block 1020 back to block 1000.

Block 1030 states compare the target information of the selected othertarget with the target information of the recommended target.

For example, the target recommender compares one or more of a factor,score, instruction, priority, weight, and other target information ofthe selected other target with the recommended target.

Block 1040 states adjust a method of target recommendation of the targetrecommender based on the comparison.

For example, a change, an adjustment, an alteration, or a modificationis made to one or more of an algorithm of the target recommender, asubroutine or programming code of the target recommender, an order orpriority of instruction or execution of the target recommender, and afactor, a score, an instruction, a priority, or a weight of the targetrecommender and/or the target information.

Block 1050 states store and/or execute the adjusted method of targetrecommendation of the target recommender. Flow proceeds back to block1000.

Consider an example in which a target recommender receives targetinformation, user information, and object information and builds a modelor an algorithm based on this input information. The target recommenderexecutes this model or algorithm to make predictions (such asrecommendations for target selection, weapon selection, movementlocations, obstructions or cover, etc.). Further, the model or algorithmcan change in real-time based on receipt of additional information.

Consider an example in which the target recommender determinesinformation and based on this information builds an algorithm thatincludes executable programmable software code (such as code to executea method discussed herein or a variation thereof). The algorithm assignsor recommends targets a first priority to a user based in part onwhether the targets are aiming and/or firing a weapon at the user. Thealgorithm assigns or recommends targets a second priority to a userbased in part on whether the targets are aiming and/or firing a weaponat another user (such as users in a group or a particular user in agroup). In spite of these assignments or recommendations, usersfrequently select a target aiming and/or firing at another user over atarget aiming and/or firing at the user. The target recommender learnsfrom this data and alters or changes the algorithm. This alteredalgorithm assigns or recommends targets a first priority to a user basedin part on whether the targets are either aiming and/or firing a weaponat the user or aiming and/or firing a weapon at another user. In thisexample, the target recommender executes machine learning to modify analgorithm that recommends targets to users.

Machine learning enables a computer program of an example embodiment tolearn from experience (e.g., determined target data) with respect todifferent tasks (e.g., users engaging targets) and different performancemeasures (e.g., whether the tasks were successfully completed). Theperformance measures improve over time as new or more data aredetermined.

Consider an example of supervised learning in which a recommender isprovided with example inputs (such as target information relating tofactors discussed herein) and provided with desired or acceptableoutputs of the example inputs (such as determinations as to whether atarget should have been engaged, a user should have moved, a location toengage a target, etc.). The recommender makes predictions based on knownproperties learned from the example inputs (e.g., training data or alearning data set). The recommender further builds and/or updatesalgorithms and models (such as methods discussed herein) to generateimproved predictions for new input data.

Example embodiments are not limited to supervised learning, but includeother learning methodologies, such as unsupervised learning,reinforcement learning, and semi-supervised learning.

In an example embodiment, a recommender predicts a rating and/or apreference that one or more users would give to an item or an action.The recommender can select the item or the action for the user based onone or more of a prediction of what the user would select, a predictionof what other users would select, and a prediction of what the usershould select. Recommendations can be based on collaborative filtering(such as building a model or algorithm from past behavior, activities,and preferences of one or more users), content-based filtering (such asdetermining discrete characteristics of an action or an item andrecommending additional actions or items with similar characteristics),or a hybrid approach that combines collaborative filtering andcontent-based filtering.

Consider an example in which a target recommender recommends locationsto where a user can move for cover or protection from incoming combatantfire from a weapon. The target recommender retrieves images of objectsor obstructions as possible location to where the user can move.Physical properties of the object or obstruction (such as size, shape,integrity, material composition, location, identity, impact depth, etc.)are compared with object or obstructions with similar physicalproperties (e.g. stored in a database). A determination is made as towhether these previous objects or obstructions provided adequateprotection for the user. For instance, one or more factors of suchobstruction are determined (such as whether previous users were struckwith incoming fire, a length of time the user stayed at the location,incoming firing rate at the location, outgoing firing rate at thelocation, weapon penetration locations of the obstruction, successfultarget engage from the obstruction, etc.). Physical properties of theobjects and obstructions can also be compared with physical propertiesof objects and obstructions previously selected by other users.

FIGS. 11A-11C show an example of machine learning for a targetrecommender that determines information for a target, recommends atarget and/or an action to a user, and adjusts its recommendations basedon actions of the user with regard to recommended targets.

FIG. 11A shows target data for a target (Target 1) selected by a targetrecommender for a user. Table 1100 includes various factors (shown in afirst column) and data determined for the factors (shown in a secondcolumn) with regard to a user and a recommended target (Target 1). Thefactors and data for the recommended target include the following: adistance to target is 100+m; a weapon of the target is a rifle; thetarget is partially obstructed; yes the target has fired his weapon; yesthe target is confirmed; no special instructions exist with regard tothe target; no collateral damage will occur if the user fires his weaponon the target; and the target is located in geographical Area 1.

Based on the target information in table 1100, the target recommenderrecommends Target 1 to the user. The user, however, does not selectTarget 1, but instead selects Target 2. For example, instead of aimingand firing his weapon on Target 1, the user aims and fires his weapon onTarget 2.

The target recommender analyzes or examines the target information anddetermines why the user selected a target (i.e., Target 2) over therecommended target (i.e., Target 1). This analysis or examinationincludes comparing the target data for Target 1 versus the target datafor Target 2. The target data for Target 1 is shown in FIG. 11A, and thetarget data for Target 2 is shown in FIG. 11B. FIG. 11B shows targetdata for a target (Target 2) that was selected by the user but notrecommended to the user by the target recommender. Table 1110 includesvarious factors (shown in a first column) and data determined for thefactors (shown in a second column) with regard to the user and theselected target (Target 2). The factors and data for the selected targetinclude the following: a distance to target is 100+m; a weapon of thetarget is a rifle; the target is partially obstructed; yes the targethas fired his weapon; yes the target is confirmed; no specialinstructions exist with respect to the target; no collateral damage willoccur if the user fires his weapon on the target; and the target islocated in geographical Area 3.

A comparison of the factors and data for table 1100 in FIG. 11A versusthe factors and data for table 1110 in FIG. 11B reveals that the datafor the recommended target is similar to the data for the selectedtarget. The tables have common or equivalent data in seven factors(distance to target, weapons, obstructions, fired weapon?, targetconfirmed?, special instructions?, and collateral damage). The tableshave different data in one factor (location).

For illustration purpose, assume that the eight factors listed in tables1100 and 1110 are the primary factors the user considered to determine atarget. Since seven of the factors for the two targets are similar,selection of Target 2 over Target 1 was based on the eighth factor(location).

FIG. 11C shows tables for priorities assigned to the eighth factor(location). The areas (shown as Area 1-Area 5) represent differentgeographical areas or locations where the targets are located. Forexample, the areas could represent different structures (such asbuildings or houses), different GPS coordinates, different maplocations, different areas (such as different city blocks, differentportions of a village, different areas in an airport, differentgeographical locations across a valley and adjacent mountain, etc.). Apriority is assigned to each area for targets.

Table 1120A shows priorities assigned to targets in the five differentareas (Area 1-Area 5). The target recommender used these priorities toassist in determining the recommendation of Target 1 to the user. Asshown in table 1120A, the priorities are assigned as follows: Area 1 hasa first priority; Area 3 has a second priority; Area 4 has a thirdpriority; Area 2 has a fourth priority; and Area 5 has a restrictedpriority meaning the target recommender cannot recommend targets locatedin this area.

During target determination and recommendation, the target recommenderdetermined and analyzed data in table 1100 of FIG. 11A and table 1120 ofFIG. 11B. The target recommender selected Target 1 over Target 2 becauseTarget 1 was located in Area 1 with a location priority per table 1120Aof FIG. 11C of “First” priority, whereas Target 2 was located in Area 3with a location priority per table 1120A in FIG. 11C of “Second”priority. Target 1 was selected over Target 2 because Target 1 had ahigher or greater location priority than Target 2.

Since the user selected Target 2 over Target 1 and since these twotargets were equivalent except for their locations, the user prioritizeda target in Area 3 over a target in Area 1. This prioritization,however, conflicts or does not coincide with the priorities per table1120A in FIG. 11C. The target recommender determines that the prioritiesin table 1120A are not correct. Specifically, selection of Target 2 inArea 3 over recommended Target 1 in Area 1 signifies that the userprioritizes a target in Area 3 over a target in Area 1 (assuming fordiscussion that other factors are equivalent).

Based on this comparison and discovered difference, the targetrecommender adjusts the priorities assigned to different areas tocoincide with the determination that the user prioritizes targets inArea 3 over targets in Area 1. Table 11208 in FIG. 11C shows anadjustment or change to the priorities to the different areas. Area 3 ismoved up to a higher “First” priority, and Area 1 is moved down to alower “Second” priority when compared with the priorities for these twoareas in table 1120A. This adjustment in priorities reflects thepreference of the user for targets in Area 3 over targets in Area 1.

In subsequent target recommendations, the target recommender consultstable 11208 in FIG. 11C for priorities with regard to targets in theareas. This adjustment or change to the priorities for areas shown inFIG. 11C improves the quality and accuracy of target recommendationsmade by the target recommender for the user.

FIGS. 11A-11C illustrate an example of an adjustment or modification toa single factor (location of a target) from a single user. Suchadjustments and modifications, however, can occur for multiple factors(such as the factors discussed herein) and for multiple users. Forexample, the target recommender continuously, continually, orperiodically makes adjustments in real-time to its methodology inrecommending targets for users based on one or more of preferences of auser, feedback or input from a user, selection of a target by a user,non-selection of a target by a user, recommendation of a target to auser versus selection of a target by the user, changes to targetinformation, changes to user information, and changes to objectinformation.

Adjustments to a target recommender can be stored and executed for aparticular user. For example, each user has his or her own personalizedtarget recommender that includes personal preferences of the user.Adjustments to a target recommender can be stored and executed for agroup of users. For example, multiple different users contribute tochanges to a target recommender for the group.

Consider an example in which a machine-learning target recommenderrecommends a target (a person) to a user based on factors that include,but are not limited to, a distance from the user to the target and anobstruction between the user and the target. In spite of thisrecommendation, the user selects a different person as a target. Forexample, the user aims and fires a firearm at the different person asopposed to the recommended person. In response to the user selecting atarget different than the recommended target, the target recommenderevaluates target information and/or factors of the recommended personversus target information and/or factors of the different person (i.e.,the person selected by the user as the target). This evaluationincludes, but is not limited to, the following: comparing the distancefrom the user to the recommended target to the distance from the user tothe selected target, and comparing a size, shape, location, andcomposition of obstructions between the user and the recommended targetwith obstructions between the user and the selected target. Based onthese comparisons and discovered differences, the target recommenderchanges methods, procedures, or priorities for how targets are assignedto the user based on distances from the user to the targets andobstructions located between the user and the targets.

FIGS. 12A and 12B show targets being recommended to users in a field ofview of the users and/or electronic devices of the users. The figuresshow a geographical location 1200 that includes a first user 1210 withone or more electronic devices 1212 and a second user 1214 with one ormore electronic devices 1216 that are viewing or monitoring a building1218 with a person 1220 in a window of the building and two other people1222 and 1224 near an automobile 1226 and a tree 1228.

FIG. 12A shows a field of view 1230 of user 1210 when this user and/orone or more electronic devices 1212 look at, monitor, or sense thegeographical location 1200. The field of view 1230 of the user 1210shows the person 1220 visually identified as a target on or thru adisplay of one of the electronic devices 1212. For example, the person1220 is highlighted or accented with color or light to distinguish theperson 1220 from other people (such as people 1222 and 1224) and otherobjects (such as building 1218, automobile 1226, and tree 1228) in thefield of view 1230. The one or more electronic devices 1212 also displayinstructions and/or information 1232 to the user 1210.

The instructions and/or information 1232 include an identification (ID)of the target (shown as “ID: R. Lyren”), a distance (D) to the target(shown as “D: 100 m”), and an action to take on the target (shown as“Action: Kill”). By way of example, the instructions and/or information1232 are shown in a box 1234 that includes a tail or extension 1236 thatextends between the box 1234 and the target (i.e., person 1220). Thetail 1236 visually identifies or shows that the information in the box1234 belongs to or is associated with person 1220.

FIG. 12B shows a field of view 1240 of user 1214 when this user and/orone or more electronic devices 1216 look at, monitor, or sense thegeographical location 1200. The field of view 1240 of the user 1214shows the person 1224 visually identified as a target on or thru adisplay of one of the electronic devices 1216. For example, the person1224 is highlighted or accented with color or light to distinguish theperson 1224 from other people (such as people 1220 and 1222) and otherobjects (such as building 1218, automobile 1226, and tree 1228) in thefield of view 1240. The one or more electronic devices 1216 also displayinstructions and/or information 1242 to the user 1214.

The instructions and/or information 1242 include an identification (ID)of the target (shown as “ID: P. Lyren”), a distance (D) to the target(shown as “D: 90 m”), and an action to take on the target (shown as“Action: Track”). By way of example, the instructions and/or information1242 are shown in a box 1244 that includes a tail or extension 1246 thatextends between the box 1244 and the target (i.e., person 1224). Thetail 1246 visually identifies or shows that the information in the box1244 belongs to or is associated with person 1224.

This tails or extensions 1236 and 1246 identify the boxes 1234 and 1244,information, and/or instructions as belonging to or being associatedwith the identified target (as opposed to belonging to or beingassociated with another person and/or object at the geographicallocation 1200). By way of example, these tails or extensions are notlimited to a line or pointer but further includes indicia and/orvisualizations that performs one or more of: following the target as thetarget moves, tracking the target as the target moves, emanating fromthe target, pointing to the target, distinguishing the target from otherpeople and/or objects, identifying the target, and associatinginformation and/or instructions with the target.

Users 1210 and 1214 can easily and quickly determine an existence andlocation of their respective target since the target is visuallydistinguished in the field of view of the user. The users are also lesslikely to become confused as to which target is assigned or recommendedto them as opposed to another target since the assigned or recommendedtarget is visually distinguished to the user. For example, while bothusers 1210 and 1214 look at the same geographical location 1200, user1210 sees person 1220 identified and/or distinguished as the targetwhereas user 1214 sees person 1224 identified and/or distinguished asthe target. Each user sees a different target while looking at the samegeographical location at the same time.

In an example embodiment, a 2D or 3D image of the target is displayedon, over, or with the target. For example, an image of the person 1220is displayed in a field of view of the user 1210 where the person 1220is actually located in the building, and an image of the person 1224 isdisplayed in a field of view of the user 1214 where the person 1224 isactually located in the building. The image of the person can resemblethe actual person. For instance, a target recommender draws a 3D imageof the person to resemble a photograph or an actual image of the personand displays this 3D image at a location in a field of view where theperson is actually located at a geographical location.

Consider an example in which users 1210 and 1214 have respectiveelectronic devices 1212 and 1216 that include wearable electronicglasses that the users wear and a rifle with an electronic scope thatcommunicates with the electronic glasses. The electronic glasses andelectronic scopes determine target information and communicate thisinformation with a target recommender that provides the users and/orelectronic devices of the users with recommendations as to targets,actions to perform, and information. When a user looks at thegeographical location through the electronic glasses or through theelectronic scope, the user sees his or her respective target visuallydistinguished and identified in a field of view. For example, user 1210sees the field of view 1230 shown in FIG. 12A, and user 1214 sees thefield of view 1240 shown in FIG. 12B.

The electronic devices display and/or provide information and/orinstructions to the users that include identification of the target,distance to the target, and action to take with regard to the target.Other information and/or instructions can be included on or thru thedisplay, such as factors, scores, instructions, target information, userinformation, and/or object information discussed herein.

Consider an example in which an electronic device displays additionalinformation to a user. By way of example, this additional informationincludes a compass direction to the target (such as 270°) andenvironmental conditions (such as wind direction and wind speed).

FIGS. 13A and 13B show electronic devices that determine targetinformation and determine an aim of a weapon, a direction of fire of theweapon, and a location where the weapon fired. The figures show ageographical location 1300 that includes a first user 1310 with one ormore electronic devices 1312 and a second user 1314 with one or moreelectronic devices 1316 that are viewing or monitoring a building 1318.The building 1318 includes a person 1320 in a window of the buildingwhile the person 1320 fires a weapon 1322 at the second user 1314 who islocated between two trees 1324 and 1326.

FIG. 13A shows a point of view or a field of view of user 1310 when thisuser and/or one or more electronic devices 1312 look at, monitor, orsense the geographical location 1300. The field of view of the userand/or electronic device of the user shows the person 1320 aiming andfiring the weapon 1322 toward the second user 1314.

FIG. 13B shows a point of view or a field of view of user 1314 when thisuser and/or one or more electronic devices 1316 look at, monitor, orsense the geographical location 1300. The field of view of the userand/or electronic device of the user shows the person 1320 aiming andfiring the weapon 1322 toward the user 1314.

One or more of the electronic devices 1312 and 1316 determine targetinformation that includes a direction of aim of the weapon 1322, adirection of fire of the weapon 1322, a person and/or object at whom theweapon 1322 is aiming and/or firing, and other information discussedherein (such as target information, user information, and/or objectinformation). By way of example, FIG. 13A shows one or more electronicdevices 1312 determining a distance (D1) from the electronic deviceand/or user 1310 to the person 1320 and/or weapon 1322, a distance (D2)parallel to ground from the electronic device and/or user 1310 to a baselocation of the person 1320 and/or weapon 1322, a distance (D3) from theelectronic device and/or user 1310 to the person 1314 and/or electronicdevice 1316 (shown in FIG. 13B), a height (H) of the person 1320 and/orweapon 1322 in the building 1318, an angle (θ) of aim or fire of theweapon 1322 between a vertical line from the person 1320 and/or weapon1322 to ground and a line of sight 1330 of the weapon 1322 and/or a lineof fire of a projectile from the weapon 1322. As another example, FIG.13B shows one or more electronic devices 1316 determining a flash oflight 1340 and a sound wave 1342 emanating from the weapon 1322.

Consider an example in which one or more of the electronic devices 1312and 1316 include a rangefinder that determines a distance from theelectronic device to a location, a compass or directional finder thatdetermines a direction of the electronic device and/or the rangefinder(such as compass direction of a point of aim of the electronic deviceand/or an object connected to or engaged with the electronic device), anelectronic leveler that determines an angle or point of aim with respectto ground of the electronic device, a Global Positioning System (GPS)that determines a location of the electronic device and/or a GPSlocation of a location to where the rangefinder is aimed, a microphonethat captures sound, a camera that captures photographs and/or video, aninfrared sensor that determines heat signatures or elevated temperaturesof objects and/or people, a clock or timer that tracks or times eventsof the electronic devices, a memory that stores a location recommender,and a processor that communicates with the memory and other electronicdevices.

Consider further the example above in which the one or more electronicdevices 1312 and 1316 include electronic devices such as therangefinder. Electronic device 1312 determines and/or measures heights(such as a height of the building 1318, a height (H) of the person 1320and/or weapon 1322, various distances to objects and/or the people (suchas distances (D1, D2, D3)), various angles between objects and/or people(such as angle (θ)), a flash of the weapon 1322 and a time of the flash,a sound of the weapon 1322 and a time of the sound, a photograph and/orvideo of the person 1320 firing the weapon 1322, analysis of thephotograph and/or video with photogrammetry, and an angle of aim or fireof the weapon 1322. Electronic device 1314 determines and/or measuresvarious distances (such as a distance to the person 1320 and/or weapon1322 and a distance along the ground to the building 1318), heights(such as a height of the person 1320 and/or weapon 1322), various angles(such as an angle to the person 1320 and/or weapon 1322), a flash of theweapon 1322 and a time of the flash, a sound of the weapon 1322 and atime of the sound, a photograph and/or video of the person 1320 firingthe weapon 1322, and analysis of the photograph and/or video withphotogrammetry. The electronic device 1314 also determines an angle withrespect to ground with an electronic leveler (such as a level sensor,digital level, a magnetic level and angle locator, a magnetic laserlevel, a tilt sensor or tilt meter, inclinometer, or an accelerometer).For example, an electronic leveler Based on this determined information,one or more of the electronic devices 1312 and 1316 and/or a targetrecommender, determines a location of fire of the weapon 1322 as beingat or near the user 1314 and provides this determination to theelectronic devices, users, other electronic devices, and/or other users.

FIGS. 14A-14C show electronic devices that determine target informationand a move location for a user and weapon penetration locations and/orweapon vulnerability locations of an object or area for a user. Thefigures show a geographical location 1400 that includes a first user1410 with one or more electronic devices 1412 and a second user 1414with one or more electronic devices 1416 that are viewing or monitoringa building 1418. The building 1418 includes two people 1420 and 1422 inwindows of the building while another person 1424 walks near thebuilding. The geographical location 1400 also includes an automobile1426 next to a tree 1428.

FIG. 14A shows an electronic device 1430 of user 1414. A display 1432 ofthe electronic device 1430 displays a recommendation for the user 1414to move from a current location to a different location 1434 (shown byway of example as being next to the automobile 1426). The recommendationto move includes a path or route 1436 that shows where the user to moveto get to the different location 1434. The recommendation also includesinstructions 1438 that include instructions or an action notifying theuser to move (shown as “Action: Move Location”), a description of anddirections to the location to where the user will move (shown as “Where:Car, 54 m, NW), and a time when the user should move (shown as“Countdown: 30 s”).

The instructions 1438 inform the user where to move and how to get tothe suggested or recommended location. As shown in the exampleinstructions 1438, the recommended location is at a car that is locatedfifty-four meters (54 m) away from the user in a compass direction thatis Northwest (NW) from the user. The route 1436 shows the path that theuser should take to move to the location, and the location 1434 includesan area or location (shown as a dashed circle) for where the user shouldstand, sit, crouch, or otherwise locate himself or herself at therecommended location. For example, the path 1436 and location 1434represent safe areas (e.g., areas not within a weapon penetrationlocation and/or weapon vulnerability location).

FIG. 14B shows an electronic device 1450 of user 1410. A display 1452 ofthe electronic device 1450 displays instructions 1454 to the user 1410.The instructions 1454 include instructions or actions for the user 1410to take (shown as “Action: Cover Fire”), a location where to perform theinstructions or the action (shown as “Where: 2nd FI Bldg”), and a timewhen to perform the instructions or the action (shown as “Countdown: 30s”).

The instructions 1454 instruct the user 1410 to fire his weapon in orderto provide covering fire for another user so the other user can move toa different location. The instructions also inform the user where tofire his weapon (i.e., at the second floor of the building 1418). Twoindividuals 1420 and 1422 are visually highlighted on the display 1452to show the user 1410 where to fire his weapon (i.e., fire the weapon atthe two individuals located at the second floor of the building). Theinstructions 1454 further inform the user 1410 when in time to fire hisweapon in the future to provide the covering fire (i.e., fire yourweapon in thirty seconds, 30 s).

The countdown displayed to the user 1410 is synchronized with thecountdown displayed to the user 1414 so both countdowns count down atthe same time. In this manner, both users are instructed to perform anaction at the same time. In thirty seconds, user 1410 will fire hisweapon at the second floor of the building and concurrently user 1414will move to a cover location next to the automobile 1426 while user1410 fires his weapon.

The displays of the electronic devices show a countdown but exampleembodiments can utilize other methods and apparatus to instruct theusers to perform actions. For example, the displays include clocks,counters, or watches that provide a time when both users are instructedto perform the requested action. For instance, display 1432 displays agreen indication to show the user 1414 that it is safe to move to thedifferent location. As another example, one or more electronic devicescan automatically perform the action at the desired time. For instance,a weapon of the user 1410 automatically fires at a certain time or whenthe user 1414 desires to move or begins to move to the differentlocation.

The displays can use one or more of sound, color, highlights, light,indicia, text, arrows, images, visual indications, etc. to show theusers where or when in time to provide or perform the instructions oractions.

FIG. 14C shows the display 1432 of the electronic device 1430 thatdisplays weapon penetration locations 1460 at the location 1434. Theseweapon penetration locations show the user different locations or areaswhere the user could be vulnerable to or struck with incoming fire froma weapon (e.g., from a weapon of the two individuals 1420 and 1422 shownin FIGS. 14A and 14B). For illustration, the weapon penetrationlocations 1460 include various types of visual indications to instructthe user. By way of example, these locations include colored orhighlighted areas 1460A, 1460B, and 1460C (shown as grey areas in FIG.14C) and dashed lines 1462 that instruct a height of the safe area andnon-safe area. For instance, the display 1432 displays that a safe orclear area is from the ground to four feet above the ground (shown withan arrow and “Area Clear 4.0 ft”). An area above four feet is not safeor not clear (shown above the dashed lines 1462 as “Area Not Clear”). Auser can clearly see or distinguish the weapon penetration locationsand/or weapon vulnerability locations.

As shown in FIG. 14C, the display 1432 indicates a weapon penetrationlocation 1460A on the automobile 1426 and weapon penetration locationsaround or proximate to the automobile. When the user 1414 arrives at therecommended location 1434, the user can see where he is vulnerable to behit with weapons from combatants and/or targets. These locations canalso indicate where the user can be seen or monitored by the combatantsand/or targets.

The weapon penetration locations and/or weapon vulnerability locations1460 include two-dimensional (2D) and/or three-dimensional (3D) areas orzones that are displayed and/or provided to the user. For example,weapon penetration locations 1460B and 1460C are 3D colored orhighlighted zones that visually show the user boundaries or perimetersof the weapon penetration locations. These zones show a shape and a sizeof the weapon penetration locations and can further include dimensionsfor size (such as length, width, and height of an area). Forillustration, weapon penetration location 1460C shows a depth or lengthof twenty-seven feet (27 ft).

Consider an example in which a target recommender displays a visualrecommendation on display 1432 for user 1414 to move to location 1434(shown in FIG. 14A). Just before the user 1414 commences to move to thislocation, user 1410 fire his weapon at the second floor of the building1418 and provides covering fire so the user 1414 can safely move to thelocation 1434. As or when the user 1414 arrives to the location 1434,the display 1432 provides various weapon penetration locations as 3Dimages (shown in FIG. 14C). The user 1414 can see where to physicallyposition himself next to the automobile 1426 in order to not be hit withincoming fire from weapons of individuals 1420 and 1422 (shown in FIG.14A). Based on this visual information, the user 1414 positions himselfnext to the automobile 1426 but is aware that bullets or fire fromweapons can penetrate the front and side windows of the automobile(shown as weapon penetration location 1460A in FIG. 14C).

Consider an example in which users 1410 and 1414 wear wearableelectronic glasses or wearable electronic devices that include asee-through display that display the instructions, move location, weaponpenetration locations, etc. For example, highlights appear on or overthe two individuals 1420 and 1422 (shown as darkened outlines of the twoindividuals in FIG. 14B) so the user 1410 can quickly identify theindividuals as targets. As another example, the weapon penetrationlocations 1460 appear as 3D images or 3D zones at their respectivephysical or geographical locations so the user 1414 can see a size,shape, and location of the weapon penetration locations (shown in FIG.14C).

FIG. 15 is an electronic device system or a computer system 1500 (suchas CTAARS) that includes one or more of the following: a target 1510including or in communication with electronics or an electronic device1512, a server and a target recommender (TR) 1520, a database 1530 orother storage or memory, a handheld portable electronic device or HPED1540, a wearable electronic device or WED 1550, wearable electronicglasses or WEG 1560, a plurality of electronic devices (ED) with targetrecommenders 1570A, 1570B, and 1570C that can communicate with eachother (e.g., over a private or secure network), and one or more networks1580 through which electronic devices can communicate (such aswirelessly communicate).

FIG. 16 is an electronic device 1600 that includes one or more of thefollowing: a processing unit or processor 1610, a computer readablemedium (CRM) or memory 1620, a display 1630, one or more interfaces 1640(such as a network interface, a graphical user interface, a naturallanguage user interface, and/or an interface that combines reality andvirtuality), a battery or a power supply 1650, wireless communication1660, a move recommender 1670 (such as an electronic system thatdetermines locations for a user to move), a weapon penetration locator1680 (such as an electronic system that determines weapon penetrationlocations and/or weapon vulnerability locations on objects or at areas),and a target recommender 1690 (such as an electronic system thatexecutes one or more example embodiments discussed herein to determinean orientation of a target). The move recommender 1670, weaponpenetration locator 1680, and target recommender 1690 are shown asseparate boxes but can be included together (such as being providedtogether in the target recommender).

FIG. 17 is an electronic device 1700 that includes one or more of thefollowing: a processing unit or processor 1710, a computer readablemedium (CRM) or memory 1720, a display 1730, one or more interfaces 1740(such as a network interface, a graphical user interface, a naturallanguage user interface, and/or an interface that combines reality andvirtuality), one or more recognizers 1750 (such as object recognitionsoftware, facial recognition software, and/or animal recognitionsoftware), one or more sensors 1760 (such as micro-electro-mechanicalsystems sensor, a motion sensor, an optical sensor, radio-frequencyidentification sensor, a global positioning satellite or system sensor,a solid state compass, gyroscope, an accelerometer, an electronicleveler, and/or a weather sensor), a camera 1770 (including lenses, suchas lenses for an electronic scope that mounts a firearm), a globalpositioning system or GPS 1780, audio 1790 (such as a microphone orspeakers), a distance determiner 1792 (such as a laser, anelectromagnetic wave transmitter/receiver, a rangefinder, and/or acamera), and a direction determiner or an orientation determiner 1794(such as a compass, a magnetometer, a heading indicator, aninclinometer, a gyroscope, an accelerometer, a sensor, or otherelectrical device to determine direction).

FIGS. 16 and 17 show various components in a single electronic device.One or more of these components can be distributed or included invarious electronic devices, such as some components being included in anHPED, some components being included in a server, some components beingincluded in storage accessible over the Internet, some components beingin wearable electronic devices or an electronic scope or an electronicsighting device or a weapon or a projectile, and some components beingin various different electronic devices that are spread across anetwork, a cloud, and/or an electronic device system or a computersystem.

The processing unit or processor (such as a central processing unit,CPU, microprocessor, application-specific integrated circuit (ASIC),etc.) controls the overall operation of memory (such as random accessmemory (RAM) for temporary data storage, read only memory (ROM) forpermanent data storage, and firmware). The processing unit or processorcommunicates with memory and performs operations and tasks thatimplement one or more blocks of the flow diagrams discussed herein. Thememory, for example, stores applications, data, programs, algorithms(including software to implement or assist in implementing exampleembodiments) and other data.

Consider an example in which the electronic device is an electronicscope mounted to a rifle of a user. The electronic scope captures imagesin a field of view of the scope and displays targets to the user whilethe user looks through the scope. For instance, a person visible throughthe scope appears with a red colored outline to visually identify thisperson as the intended target to the user. The red colored outlinefollows or remains fixed on the person as the person moves.

Blocks and/or methods discussed herein can be executed and/or made by auser, a user agent of a user, a software application, an electronicdevice, a computer, and/or a computer system.

Examples of an electronic device include, but are not limited to, aserver, a computer, a laptop computer, a tablet computer, a handheldportable electronic device (HPED), a portable electronic device (PED), awearable electronic device (WED), wearable electronic glasses (WEG), anelectronic scope or an electronic sighting device (such as a scope thatmounts to or engages with a firearm), electronic binoculars, asmartphone, a camera, a non-portable electronic device, a movable orflyable electronic device, and an electronic device with a processor, amemory, and a display.

As used herein, “determine” includes to ascertain, to analyze, toevaluate, to process, to calculate, to decide, to obtain, to discover,to retrieve, to execute, and/or to receive.

As used herein, “field of view” is the extent of the observable worldthat is seen or captured at a given moment.

As used herein, “firearm” is a portable gun, such as a rifle or apistol. As used herein, “line of sight” is a straight line that extendsfrom the scope, camera, or other sighting apparatus to the target.

As used herein, “point of aim” is a visual indication of an electronicdevice that shows where the electronic device is aimed.

As used herein, “target” is one or more of a person, an object, a thing,and an area. A target can include a weapon.

As used herein, “virtual image” or “virtual object” is computer orprocessor generated image or object. This image or object often appearsto a user in the real, physical world (such as a virtual 3D dimensionalobject that the user views in the real world).

As used herein, “weapon” includes firearms (such as portable guns),archery (such as bow and arrows), light weapons, heavy weapons, andother weapons that launch, fire, or release a projectile.

As used herein, “wearable electronic device” is a portable electronicdevice that is worn on or attached to a person. Examples of such devicesinclude, but are not limited to, electronic watches, electronicnecklaces, electronic clothing, head-mounted displays, electroniceyeglasses or eye wear (such as glasses in which an image is projectedthrough, shown on, or reflected off a surface), electronic contactlenses, an eyetap, handheld displays that affix to a hand or wrist orarm, and HPEDs that attach to or affix to a person.

In some example embodiments, the methods illustrated herein and data andinstructions associated therewith are stored in respective storagedevices, which are implemented as computer-readable and/ormachine-readable storage media, physical or tangible media, and/ornon-transitory storage media. These storage media include differentforms of memory including semiconductor memory devices such as DRAM, orSRAM, Erasable and Programmable Read-Only Memories (EPROMs),Electrically Erasable and Programmable Read-Only Memories (EEPROMs) andflash memories; magnetic disks such as fixed, floppy and removabledisks; other magnetic media including tape; optical media such asCompact Disks (CDs) or Digital Versatile Disks (DVDs). Note that theinstructions of the software discussed above can be provided oncomputer-readable or machine-readable storage medium, or alternatively,can be provided on multiple computer-readable or machine-readablestorage media distributed in a large system having possibly pluralnodes. Such computer-readable or machine-readable medium or media is(are) considered to be part of an article (or article of manufacture).An article or article of manufacture can refer to any manufacturedsingle component or multiple components.

Method blocks discussed herein can be automated and executed by acomputer, computer system, user agent, and/or electronic device. Theterm “automated” means controlled operation of an apparatus, system,and/or process using computers and/or mechanical/electrical deviceswithout the necessity of human intervention, observation, effort, and/ordecision.

The methods in accordance with example embodiments are provided asexamples, and examples from one method should not be construed to limitexamples from another method. Further, methods discussed withindifferent figures can be added to or exchanged with methods in otherfigures. Further yet, specific numerical data values (such as specificquantities, numbers, categories, etc.) or other specific informationshould be interpreted as illustrative for discussing exampleembodiments. Such specific information is not provided to limit exampleembodiments.

1.-20. (canceled)
 21. A method comprising: determining, with one or moreelectronic devices, distances from users at a geographical location topeople with firearms at the geographical location; assigning, by anelectronic device and based on the distances from the users to thepeople with firearms, a user at the geographical location to one of thepeople with firearms at the geographical location; and displaying, witha wearable electronic device (WED) worn on a head of the user, a virtualimage that shows the one of the people with firearms assigned to theuser wearing the WED such that the virtual image is displayed in a fieldof the WED where the one the people with firearms is located at thegeographical location, wherein the users are people.
 22. The method ofclaim 21 further comprising: determining, by the one or more electronicdevices, whether or not the one of the people with firearms is holding afirearm; assigning, by the electronic device and based on whether or notthe one of the people with firearms is holding the firearm, a priorityto the one of the people with firearms; and displaying, with the WEDworn on the head of the user, the priority.
 23. The method of claim 21further comprising: determining, by the one or more electronic devices,an obstruction that exists between the user and the one of the peoplewith firearms; determining, by the one or more electronic devices, aweapon penetration location on the obstruction; and displaying, with theWED worn on the head of the user, a virtual image at the weaponpenetration location on the obstruction.
 24. The method of claim 21further comprising: determining that a firearm of the user and a firearmof another user are both aimed at the one of the people with firearms;and displaying, with the WED worn on the head of the user, instructionsto move an aim of the firearm of the user to another one of the peoplewith firearms in response to determining that the firearm of the userand the firearm of the another user are both aimed at the one of thepeople with firearms.
 25. The method of claim 21 further comprising:determining, from a facial image collected with the one or moreelectronic devices, an identity of the one of the people with firearms;and displaying, with the WED worn on the head of the user, the virtualimage to resemble the facial image.
 26. The method of claim 21 furthercomprising: determining, by the one or more electronic devices, thatanother user is firing a weapon at the one of the people with firearms;and assigning a different one of the people with firearms to the user inresponse to determining that the another user is firing the weapon atthe one of the people with firearms.
 27. The method of claim 21 furthercomprising: displaying, with the WED worn on the head of the user, avirtual image that provides a warning when a point of aim of a firearmof the user is aimed at another one of the users.
 28. The method ofclaim 21 further comprising: determining, based on locations of thepeople with firearms at the geographical location, a safe area where theuser can move; and displaying, with the WED worn on the head of theuser, a virtual image at a location where the safe area exists to assistthe user in moving to the safe area.
 29. An electronic system,comprising: a first wearable electronic device (WED) worn on a head of afirst user; a second WED worn on a head of a second user; and one ormore electronic devices that communicate over a wireless network withthe first and second WEDs and that execute code to obtain distances fromthe first and second users to people with firearms, to determine a firstassignment of the first user to a first one of the people with firearmsbased on the distances, to determine a second assignment of the seconduser to a second one of the people with firearms based on the distances,to provide the first assignment to the first WED that displays the firstassignment to the first user, and to provide the second assignment tothe second WED that displays the second assignment to the second user,wherein the first and second users are people.
 30. The electronic systemof claim 29, wherein the one or more electronic devices further executethe code to determine a location for the first user to move to reduce aprobability of being targeted with weapons of the people with firearms,and wherein the first WED displays a virtual image in a field of view ofthe first user at the location for the first user to move to assist thefirst user in navigating to the location.
 31. The electronic system ofclaim 29, wherein the one or more electronic devices further execute thecode to build a virtual map that simultaneously shows the people withfirearms, the first assignment, the second assignment, the first user,and the second user, wherein the first and second WEDs display thevirtual map.
 32. The electronic system of claim 29, wherein the firstand second WEDs display virtual images with different colors over thepeople with firearms, wherein the different colors represent differentpriorities that instruct the first and second users when to shoot thepeople with firearms and that instruct the first and second users whennot to shoot the people with firearms but gather information about thepeople with firearms.
 33. The electronic system of claim 29 furthercomprising: a machine-learning system that assigns targets to the firstuser based on distances from the targets to the first user, weaponslocated with the targets, and whether the weapons located with thetargets are being fired, and wherein the first WED has a see-thrudisplay that displays virtual images at physical locations of thetargets.
 34. The electronic system of claim 29, wherein the one or moreelectronic devices further execute the code to assign scores to thepeople with firearms and to assign the first and second users to targetthe people with firearms based on the scores, and wherein the peoplewith firearms closer to the first and second users are given higherscores than the people with firearms farther away from the first andsecond users.
 35. The electronic system of claim 29, wherein the one ormore electronic devices further execute the code to analyze informationthat includes what type of weapons the people with firearms have,locations of the people with firearms, and locations of the first andsecond users, and to recommend locations where the first and secondusers can move to reduce a probability of receiving fire from the peoplewith firearms, and wherein the first and second WEDs display virtualimages at the locations where the first and second users can move toreduce the probability of receiving fire from the people with firearms.36. A non-transitory computer readable storage medium storinginstructions that cause one or more processors to execute a method,comprising: obtain an image of a first person holding a first firearmand a second person holding a second firearm at a geographical locationhaving a user that wears a wearable electronic device (WED) on a head ofthe user; determine distances from the user to the first person and fromthe user to the second person; determine, based on the distances, arecommendation as to whether the user should target the first personholding the first firearm or target the second person holding the secondfirearm; and display, with a see-thru display of the WED, a virtualimage that shows the recommendation to the user, wherein the user is aperson.
 37. The non-transitory computer readable storage medium storinginstructions of claim 36 further to cause the one or more processors toexecute the method comprising: determine an obstruction between the userand the first person; determine whether a projectile fired from a weaponwith the user can penetrate the obstruction and strike the first person;and display, with the see-thru display of the WED, information thatinstructs the user whether the projectile fired from the weapon with theuser can penetrate the obstruction and strike the first person.
 38. Thenon-transitory computer readable storage medium storing instructions ofclaim 36 further to cause the one or more processors to execute themethod comprising: determine whether the first person is firing thefirst firearm; determine whether the second person is firing the secondfirearm; prioritize the recommendation for the user to target the firstperson when the first person is firing the first firearm; and prioritizethe recommendation for the user to target the second person when thesecond person is firing the second firearm.
 39. The non-transitorycomputer readable storage medium storing instructions of claim 36further to cause the one or more processors to execute the methodcomprising: determine that the first person is firing the first firearm;and display, with the see-thru display of the WED, instructions to theuser to fire at the first person in response to determining that thefirst person is firing the first firearm.
 40. The non-transitorycomputer readable storage medium storing instructions of claim 36further to cause the one or more processors to execute the methodcomprising: display, with the see-thru display of the WED, a virtualimage of a weapon penetration location that shows where a projectilefired from a weapon of the user will strike the first person.