Академический Документы
Профессиональный Документы
Культура Документы
James Llinas
Center for Multisource Information Fusion
State University of New York at Buffalo
Buffalo, New York, USA
llinas@eng.buffalo.edu
Introduction
2
2.1
Tracking
Errors
Many-to
Many
Association
Problem
Necessary
For
Analysis
2.2
ACTUAL
ACTUALRISK
RISK
COUNTERMEASURES
INHERENT
INHERENTRISK
RISK
EFFECTIVENESS
INTENT
INTENT
LETHALITY
LETHALITY
R >90OC
R >90OC
RF MODE
AI ASPECT
TIME TO
LETHAL
ENVELOPE
R <90 C
R >90 C
R <90OC
R >90OC
O
R <90 C
FOV
Hostile Ship
(TTA-based Truth track)
VEH
VTH A
RE
Hostile Ship
(Estimated)
F2
VTO
VTO
D
VEH
F1
RT
Own Ship
(Truth track)
R <90 C
VTH
Range Vector
Sensors
SUT RF Mode
L1
SUT
Truth
SUT Tracks
And ID
Declarations
L1 Tracks
SUT His w
Attributes
L3 SUT
Inherent Risk =
Fct (RF, AI, TTLE)
Search
Track
Lock-On
Search
P(S|S)
P(S|T)
P(S|LO)
Track
P(T|S)
P(T|T)
P(T|LO)
Lock-On
P(LO|S)
P(LO|T)
P(LO|LO)
Unknown
P(U|S)
P(U|T)
P(U|LO)
VT
VEH
VEH
RE
Rmax
(missile)
~ 15km
VTO
Rationale
--can deal best w vague data
--quantitative
--existing software, experience
--computationally fast
RT
Design Options
--Bayesian Network
--Figure of Merit
--Fuzzy Logic
--etc
Estimated Hi AI Aspect
from Friendly j
Estimated Hi TTLE
from Friendly j
SUT TTLE
Estimated Hi RF Mode
from Friendly j
Actual Mode
Declaration
SUT AI Aspect
VTO
search
11 med med Unknow
n or
search
12 med low Unknow
n or
search
13 med large Track
14 med med Track
2.3
6 low low
Track
hi
20
AI TTLE RF Threat
med low Track high
high
Lock
high
L4/RM SUT
Inherent Risk =
Fct (RF, AI, TTLE)
high
Fuzzy Logic
AFFTC-provided approach
Other
Lock
L3 SUT
med med
AI TTLE RF Threat
1 low large Unknow low 15
n or
search
2 low med Unknow low 16
n or
search
3 low low Unknow med 17
n or
search
4 low large Track low 18
5 low med Track med 19
low
high
low
CM Optimizer
Select CMi
low
med
med
high
high
167
2 G
4
then J=
PJ GJ 2 G
.
4R 2 BJ LJ
A jammer can be
lossj
Pt * 1010 **BJ * 10 10
4.0**PJ *
GJ
1010
*Br *
L
1010
* R*1000.0
S/J tells what the effect of the jammer on the radar is. The
jamming power from the platform is a one-way
transmission while the target signal power is a two way
transmission. So, the jamming power is generally greater
than target signal power (S/J < 1). But as the target comes
closer there will certain range at which S/J ratio equals 1,
and it is called as cross-over range and is given as:
LJ
1000.0
(A)
(B)
(C)
The blue and red fighters are both initially in search mode
for each other. Once the reds detect they turn off
emissions and execute their pre-planned maneuvers to
achieve near simultaneous launch on the projected blues.
The reds all turn on their radars to lock-on to blues just
after their last turn towards the projected blue position.
The reds launch radar guided missiles at their closest blue
targets as soon as possible. Red 5/6 should pull delaying
turns together then turn towards an intercept with US 1
(i.e., highest closure rate) once their radar acquires.
The blues split and turn towards the outside threats to take
advantage of their longer range AMRAAM shots at each
of outside red pairs. They support their launches until both
outside reds are killed or until second shots are needed. In
the baseline scenario shown, US2 achieves 2 kills with its
first launches then turns towards reds 5/6 that have
engaged US1 while taking its second shot at the surviving
red 4. US1 will leave this second AMRAAM once it has
acquired red 4, then pulls defensive maneuvers and
countermeasures against the reds 5/6 missile launches
while US2 completes red 5/6 kills.
Design of Experiments
S
S
S
S
S
S S
S
S
S
S
S
S
S S
S
S
S
S
Track 1 to truth
Track 2 to truth
169
Aspect
ESM
TTLE
Threat
Aspect
ESM
TTLE
Threat
Aspect
ESM
TTLE
S
S
S
S
S
Threat
Aspect
ESM
TTLE
Threat
Aspect
ESM
TTLE
Threat
Aspect
ESM
TTLE
Threat
Track1 to truth
Track 2 to truth
A B C AB AC BC ABC
S
S
S
S
S S
S S
S
S
S
S
S
S
S
S
A A A B B C AB AB AC BC ABC
B C D C D D C D D D
D
Track Aspec
to track t
ESM
S S S
TTLE
Threat
S S
S S
TTLE
Threat
Track2 Aspec
to truth
t
Track1 Aspec
S S S S S S
to truth
t
ESM
Acknowledgment
S S
References
S
S
ESM
S S
TTLE
Threat
Conclusions