VTK 7.0 Release

DSIAC is now pleased to offer Vulnerability Toolkit, version 7.0.  This software package includes the latest version of the Computation of Vulnerable Area Tool (COVART), version 7.0, as well as a suite of other software tools beneficial to the vulnerability modeler.  

Request VTK 7.0 here.

COVART 7.0 provides a number of additional features and addresses a number of Software Change Requests (SCRs).  Some of the more notable changes include:

  1. Changes to COVART processing to facilitate threat penetration employing 6 degrees of freedom;  COVART handling of FATEPEN and ProjPen now supports threat orientation in pitch, yaw, and roll (as opposed to just pitch) and plate orientations are now described in terms of pitch and yaw.
  2. Revision and expansion of features to report average results for a number of initial threat orientations.  This used to be supported by a negative YAW input in the threat file but is now supported by PROJORI (for projectiles) and FRAGORI (for fragments) records in the MASTER file.  Allowing this capability to be used with projectiles is an expansion over the feature provided with previous versions.
  3. The ability to return shotline trace diagnostic information in a comma-separated value (CSV) format.  This is a throwback to the shotline diagnostic reporting that was provided in versions of COVART prior to version 6.0.  The user can generate shotline trace information in both the COVART6 and CSV formats for a particular run; however, the CSV-formatted file will only include data up to the "TERSE" level of verbosity.
  4. An improved feature for investigating the sensitivity of total target results due to errors in penetration outputs.  This feature replaces the old PENSEN capability originally implemented in COVART 6.1.1 and COVART 6.5.  With this feature, COVART samples normal error distributions provided for residual mass, velocity, and orientation, applies these errors to penetration results, and then returns the average shotline PK across a number of iterations.
  5. An additional feature for investigating the sensitivity of total target results to threat inputs.  This feature allows the user to conduct multiple runs while change a key input between runs.  With this feature, COVART runs a deviate for a selected input parameter, generates a set of results for each deviate, and then provides summary information across the iterations that were executed.
  6. Addressed COVART SCRs related to random number seeds and plate combining necessary to properly implement the abovementioned features.
  7. Addressed FASTGEN SCRs related to intersection normal reporting.

This version of COVART uses a number of loadable libraries (or shared objects) to perform many functions.  Here is the current list of libraries integrated into COVART 7.0:

  • Ray Tracing
    • FASTGEN 7.3
    • BRL-CAD (librt) 7.24.4
  • Penetration
    • ProjPen 3.0.1
    • FATEPEN 3.3.18
    • SCJPen 1.1.0
  • Damage
    • FLASH 3.0
    • IGNITE 1.1.0
    • COD 1.0.1
  • Fault Tree, Pk/d, and Total Target Results
    • VulnArea 6.1.0

COVART 7.0 includes executables that run under Windows and the Red Hat family of Linux operating systems.  The Vulnerability Toolkit provides 64-bit executables for both operating systems.

This release includes the following special notes:

  1. COVART no longer supports the COVART legacy mode or FASTGEN legacy modes supported in previous releases.  All runs must now use the integrated mode of COVART.
  2. It is advisable that users not use restart files generated with previous versions of COVART with this release.  Errors were found in FASTGEN's reporting of intersection normals with the previous version, which have been addressed in this release.  Using a restart file generated with an older version of FASTGEN will result in these older errors propagating into current analyses.
  3. Results are expected to change noticeably with COVART 7.0.  For most targets, EZJA observed less than 5% change in the reported vulnerable areas.  Users should be aware, though, that the behavior of CBAR elements (deprecated) has changed considerably in FASTGEN 7.3, leading to potentially large changes in results for targets using this legacy element type in COVART 7.0.
  4. Normals reported for CLINE elements have been changed to reflect their curved nature. Targets using these elements can expect noticeable changes in reported obliquities between COVART 6.9 and 7.0.
  5. MTK is provided with this release, but there was not sufficient time to update it to handle the changes that were made to inputs for COVART 7.0.  The tool will still work if the user develops their MASTER file correctly, but they will likely need to ignore reported record errors in MTK for the items that changed between COVART 6.9 and 7.0


For any questions about the Vulnerability Toolkit or COVART, please email contact@dsiac.org.