Download as pdf or txt
Download as pdf or txt
You are on page 1of 78

(D

0 0 0 0 I

z 0

Form SF298 Citation Data


Report Date
("DD MON YYYY")

01041997 Title and Subtitle ECM Techniques Generation Authors

Report Type N/A

Dates Covered (from... to)


("DD MON YYYY")

Contract or Grant Number Program Element Number Project Number Task Number Work Unit Number

Performing Organization Name(s) and Address(es) ASC/ENAD Wright-Patterson AFB, OH Sponsoring/Monitoring Agency Name(s) and Address(es)

Performing Organization Number(s) Monitoring Agency Acronym Monitoring Agency Report Number(s)

Distribution/Availability Statement Approved for public release, distribution unlimited Supplementary Notes Abstract Subject Terms "IATAC COLLECTION" Document Classification unclassified Classification of Abstract unclassified Number of Pages 77 Classification of SF298 unclassified Limitation of Abstract unlimited

REPORT DOCUMENTATION PAGE


1. AGENCY USE ONLY (Leave blank) 4. TITLE AND SUBTITLE 2. REPORT DATE

Form Approved OMB No. 074-0188

Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188), Washington, DC 20503

3. REPORT TYPE AND DATES COVERED

4/1/97 ECM Techniques Generation

Briefing
5. FUNDING NUMBERS

6. AUTHOR(S)

John E. Geise

7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES)

8. PERFORMING ORGANIZATION REPORT NUMBER

IATAC Information Assurance Technology Analysis Center 3190 Fairview Park Drive Falls Church VA 22042
9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING / MONITORING AGENCY REPORT NUMBER

Defense Technical Information Center DTIC-IA 8725 John J. Kingman Rd, Suite 944 Ft. Belvoir, VA 22060
11. SUPPLEMENTARY NOTES

12a. DISTRIBUTION / AVAILABILITY STATEMENT

12b. DISTRIBUTION CODE

13. ABSTRACT (Maximum 200 Words)

The goal of this session is to provide a comprehensive look at functional areas of ECM system and trade-off considerations, i.e. apertures, receivers/processors, counter/measurer techniques generators, and high power sources. Also to a provide comprehensive look at techniques, i.e. generators, system architectures, interaction between jamming and radar processing, trades & drivers, and processes/tools

14. SUBJECT TERMS

15. NUMBER OF PAGES 16. PRICE CODE

EW
17. SECURITY CLASSIFICATION OF REPORT 18. SECURITY CLASSIFICATION OF THIS PAGE 19. SECURITY CLASSIFICATION OF ABSTRACT 20. LIMITATION OF ABSTRACT

Unclassified

UNCLASSIFIED

UNCLASSIFIED

None

INTRODUCTION -1
GOAL, OFSESSZON
. PROVIDE COMPREHENSIVE LOOK AT FUNCTIONAL AREAS OF ECM SYSTEM AND TRADE-OFF CONSIDERATIONS
l l l l

APERTURES RECEIVERS/PROCESSORS COUNTERMEASURERECHNIQUES GENERATORS HIGH POWER SOURCES

GOALOFTOPZC
l

PROVIDE COMPREHENSIVE LOOK AT TECHNIQUES GENERATORS


l l l l

SYSTEM ARCHITECTURES INTERACTION BETWEEN JAMMING AND RADAR PROCESSING TRADES & DRIVERS PROCESSES/TOOLS

AIRCRAFT SURVIVABILITY FACTORS


-1 (EC IS A CONTRIBUTOR TO A/C SURVIVABILITY)

--------------T

: , ELECTRONIC COMBAT ;
I,,,, ---K-ai--7---J

AIRCRAFT OBSERVABLES

ENVIRONMENT

FOG OF WAR

II
VULNERABILITY

pi-G&

AIR CREW

EWRESPONSETOENEMYAIRDEFENSE

-1 '
THREATIADS
h 1

ECFORCEELEMENTS

SEARCH/EARLY WARNING +
(Initial Detection)

4/
ACQUSITION/GCI
(Target Assignment/Initial Track) *

/I
TARGET ENGAGEMENT
(Measure/Predict Target Position) 4 Ii

F COMMAND, CONTROL, COMMUNICATIONS

SURVIVABILITY FACTORS
JA2M TO SIGNM RATIO (J/S) - SELF SCREENING
l
RATIOOFJAMMERPOWERTOTARGETRETURNPOWER

J/S = f (ERP, RANGE, TARGET SIGNATURE, BANDWIDTH MATCH)


J/S = pugs .

4n;R2 . (J. . B,
1 BJ

TGT

for B, > BT

WHERE: PJ = Jammer TX Power G, = Jammer TX Antenna Gain PT = Radar TX Power GT = Radar Antenna Gain R = Range - Jammer to Radar CL= Target Radar Cross Section BT = Radar Bandwidth B, = Jammer Bandwidth

AGENDA

SURVIVABILITYFACI'ORS e ECMSYSTEMARCHITECTURES RADARCOUNTERMEASURES ORANGE .VELOCITY *ANGLE MISSILECOUNTERMEASURES COUNTERMEASURESWRAPUP ECMANALYSIS-TOOLSANDPROCESSES

GENERIC ECM SUITE MODEL

Receive Antenna
FOV/Beamwidth Polarization Gain DF
MODULATOR

Transmit Antenna
FOVlBeamwidth Polarization Gain DF

Receiver/Processor Environment Sorting Parameter Measurement (F, PRI, PW, Amp, Pol) PRI Tracking Frequency Tracking Threat ID/Prioritization Parameter Prediction

Transmitter
High Power Multiple Signal/ Power Sharing
CONTROL COMPUTER

Modulator
Amplitude Freq/Phase Polarization

Memory
Technique Selection Time Delay/Advance Coherent Signal Replication

Signal Source
Receiver Support (e.g., LO) Threat Frequency Replication

-1

ECM SYSTEM ARCHITECTURES


CONSTANT GAlhT
l LINEARAMPLIFICATIONOFINPUTSIGNAL l ELECTRONICGAIN<ISOLATION 4LLOWSRxTO"LOOKOVER"JAMMINGTOSEETHREAT l PROVIDESCONSTANTJ/SUNTILTxSATURATION THENDEGRADESWITHRANGE(-6dB/OCI'AVE)

CONSTANT POWER
.POWERSHARINGvsMULTIPLESIGNALS l TxOPERATESATORNEARSATURATIONREGARDLESSOFINPUT SIGNALLEVEL l ELECTRONICGAINMAYBEGREATERTHANISOLATION .TYPICALLY,TxMUSTSHUTDOWNFORRxTOSEETHREAT .J/SDECREASESWITHRANGE(-6dB/OCTAVE)

\ \ \ \ \ \

ECM SYSTEM ARCHITECTURES


TRADES & DRl-KERS - CONSTANT GMN
4NTENNAISOLATION .LARGEENOUGHTOCOVERTARGETRETURNTOACCEPTABLERANGE l SUFFICIENTGAINMARGINTOALLOWRECEIVERTOACQUIRE/ MAINTAINTRACKOFTHREATRADAR l DIFFICULTTOCOVER LARGECROSSSECTIONTARGETS *LOOK-OVER-GAINMARGINALLOWSRECEIVERTOSEE THREATSIGNALINPRESENCEOFJAMMING
l

LOOK THROUGH -sERVICEOFSPECIALI~EDRECEIVERS

.SYSTEM LOSSES(CABLES,COUPLERS.ETC.)WILLDEGRADEDETECTION RANGEANDJIS .COHERENCYMAINTAINEDBYMEMORIZATION/REPEATING INCOMINGSIGNAL

ECM SYSTEM ARCHITECTURES


TRADES & DRZ-KERS - CONSTANT POWER
l

ANTENNA ISOLATION - MUST SHUT OFF TX ON RECEIVE LOOKTHROUGH 0 ENOUGH TO ALLOW RECEIVERS TO ACQUIRE/MAINTAIN TRACK l SMALL ENOUGH TO PRECLUDE JAMMING DEGRADATION

CHOP *TIMING
l

SPECTRAL SPREADING

SYSTEM LOSSES (CABLES, COUPLERS, ETC.) WILL DEGRADE RANGE AND J/S DIFFICULT TO ACHIEVE/MAINTAIN COHERENCY

SYSTEMAPPROACH - COMBINE CONSTANT GMN JPOWER MODES


l

CONSTANTPOWERMODEVS.NON-COHERENT THREATS CONSTANTGAINMODEVSCOHERENTTHREATS

AGENDA
SURVIVABILITYFACI'ORS ECMSYSTEMARCHITECTSJRES RADARCOUNTERMEASURESTECHNIQUES *RANGE 4ELOCITY .ANGLE MISSILECOUNTERMEASURES COUNTERMEASURESWRAPUP ECMANALYSISTOOLSANDPROCESSES

BASIC RADAR

LAY - RANGE

PROCESSES REFLECTION

FREQUENCY SHtFT - VELOCtlY POtNTtNG ANGLE + AZtMUTWELEVATtON

RADARCOUNTERMEASURES
NON-COHERENT-PULSE RADAR CIURACTERLS
l

RANGE TRACKING PHASE INFORMATION NOT PRESERVED HIGH PEAK POWER l GROUND BASED (- 120 dBm) l AIRBORNE (- 100 dBm) LOW DUTY CYCLE (< 1%) l MAY HAVE NARROW PW (c 1 USEC) l LOW PRF (<SK PPS) INSTANTANEOUS BANDWIDTH (MEGAHERTZ)

RADARCOUNTERMEASURES
RANGE TECHNIQUES VS PULSE RALMR
l

BROADBAND NOISE .. BARRAGE (BARR) l SWEPT SPOT (SSN) POWER MANAGED NOISE l RANGE GATED NOISE (RGN) PULSE REPEATER l RANGE GATE PULL OFF (RGPO) .

~
~

POWER MANAGED TRANSPONDER l RANGE GATE PULL IN & OUT (RANRAP) l RANGE FALSE TARGETS (RFT)

Radar Pulse Input Signal


\
I

Early Gate
I

Amplitude Detector

Early Gate

Range Output

L
t

Late Gate

Gate Generator

Late Gate

Amplitude Detector

AMP

. BARRAGE ACTUAL THREiCI RF

THREAT RANGE

FREOUENCY OR TIME

I-THREba RANGE ~-4

FREOUENCY OR TIME

FREOUENCY OR TIME

AMPLITUDE

AMPLITUDE

AMPLITUDE

AMPLITUDE s a c) 1

m m c

m cn
m Q

W a

I-

IL W (3 2

W v) I

I-

z 0
I
A ml

0 a 0 e
II

cn W 0 z

t a W a W lL

a n

W cn

lJm
0

ob
N N
a LL l

K IL
l

k 0

RADARCOUNTERMEASURES
TRADES & DRIVERS - RANGE TECHNIQUES
l

NOISE FREQUENCY SET ON - ACCURACY & SETTLING TIME BANDwIDTH MATCHING LOOK THROUGH RATE
l l l

REPEATER CONSTANT. GAIN - ISOLATION/GAIN VERSUS TARGET RCS 0 TIME DELAY THROUGH SYSTEM 0 CONSTANT POWER - CHOP RATE/SPECTRAL SPREADING .
l

TRANSPONDER SYSTEM COMPLEXITY SIGNAL SORTING/TRACKING FREQUENCY/TIME SET ON ACCURACY LOOK THROUGH RATE
l l l l

AGENDA
SURVIVABILITYFACTORS ECMSYSTEMARCHITECI'URES RADARCOUNTERMEASURESTECHNIQUES ORANGE *VELOCITY @ANGLE MISSILECOUNTERMEAURES COUNTERMEASURESWRAPUP ECMANALYSIS-TOOLSANDPROCESSES

BASIC RADAR 1

L,_
RECEIVER SIGNAL PROCESSOR

- RANGE

PROCESSES REFLECTION

FREQUENCY SHIFT -) VELOCITY POINTING ANGLE -B AZlMUWELEVATlON

0 n 0

Clorlng -clutter Free Region Discret. Target .I/ Frequency 10 + fcmrx c; 8 ;: :! tj 1. ;: f) . .: v: .I !, .I :I


. I 1

1
.z.:.:i . , .I.a .%&L -J?~L *

RADARCOUNTERMEASURES
KELOCITY TECHNIQUES VS DOPPLER RADAR
.REPEATER W?LOCITYGATEPULL-OFF(VGP0) l VELOCITYFALSETARGETS(VFI') .TRANSPONDER(DRFMTECHNIQUES)

COMBINEDRANGE/VELOCITYPULL-OFF .RANGE/VELOCITYFALSE'TARGETS(R/VFT)

L 4

co 0 )I v)
bLJ
8 w ----; .
---+

z a g ---.

a
W Ic) a

a EC c)
w - m -

a n a a )I z
a
W W

a
m -

m-m-

L .
----

. .

0
x 0 m I

---

---

-T - .I -1 -1 -iI! -;1

--

CL

u,

a
w c -

w---

I-

c)

PC

0 I I 1 n

L LL

c!s

te

3anulduuv

n z a

COMBINED RGPO/VGPO
TARGET SPEEDS UP, OR TURNS INTO THREAT

TARGET SLOWS DOWN, OR TURNS AWAY FROM THREAT

R A N G E BIN* b-b INCREASING TARGET RANGE

i .

c X 5;

AGENDA
SURVIVABILITYFACI'ORS ECMSYSTEMARCHITECTURES RADARCOUNTERMEASURES @RANGE .VELOCITY *ANGLE * MISSILECOUNTERMEASURES . COUNTERMEASURESVVRAPUP ECMANALYSIS-TOOLSANDPROCESSES

BASIC RADAR /

. TRANSMlTlER

i .

RECEIVER
- RANGE

SIGNAL PROCESSOR

PROCESSES REFLECTION

FREQUENCY SHIFT - VELOCITY POINTING ANGLE -m AZIMUTH/ELEVATION

RADARCOUNTERMEASURES
ANGLE TRACHNG CCTEHSTICS
. AZIMUTH/ELEVATION TRACKING IN ADDITION TO RANGE AND/OR VELOCITY
l

UTILIZES ANTENNA BEAM SHAPE FOR ANTENNA POINTING USE RANGE OR DOPPLER (BINS/GATES/CELLS) TO REDUCE NOISE, CLUTTER, JAMMING, INTERFERENCE TO TRACK ONLY SIGNAL SINGLE ANGLE CHANNEL l USES SINGLE ANTENNA BEAM l TARGET POSITION - RETURN @ MAXIMUM AMPLITUDE l SUSCEPTIBLE TO AMPLITUDE MODULATION ECM l ACTIVE/PASSIVE TRACK WHILE SCAN (TWS), CONICAL/SEQUENTIAL SCAN MULTIPLE ANGLE CHANNELS (MONOPULSE) l COMPARES MULTIPLE ANTENNA BEAMS l TARGET POSITION - WHERE ANGLE ERROR IS ZERO l NULLIFIES CONVENTIONAL AM l SUSCEPTIBLE TO MORE SOPHISTICATED TECHNIQUES

IV1EASURMENT

BEAMWIDTH

BEAMWIDTH

x WAVELENGTH 3ciB -7 = ANT DIAMETEFI


AT X-BAND
.

e3dB

85* =d

(FOR TAPERED ILLUM)

70* 83dB =d
(FOR UN-TAPERED)

SIDELOBES

n
0

V z 0 v

W VI

INVERSE GAIN VS TRACK-WHILE-SCAN


-J

T
A

SKIN RETURN

TOT

ADD: ECM

RECEIVED SIGNAL

b TIME

), TIME
RWSSNV DKr173 1.2

u m

El

ZHO9

ZHOS

ZHOS

ZH 09

NV3S EIAISSWI SA JW JiIXMS

-1

RADARCOUNTERMEASURES '
TRADES & DRMZRS - AMTPLITUDE MODULATION
. TECHNIQUE GENERATOR COMPLEXITY
l

DETECTION & TRACKING SIGNAL AMPLITUDE SCAN RATE & PHASE DEPTH OF MODULATION MONITORING OF SIGNAL AMPLITUDE (FOR JOG DETECT)
l l l l

MODULATION i SCAN FREQUENCY SET-Oh ACCURACY PHASE SET-ON ACCURACY DUTY CYCLE DEPTH OF MODULATION
l l l

FOUR SIMULTANEOUSLY RECEIVE BEAMS. l ANGLE ERRORS DERIVED FROM INSTANTANEOUS BEAM COMPARISON -AZIMUTH ERROR = (A + D) - (B + C) -ELEVATION ERROR = (A + B) - (C + D)> l TARGET BORESIGHTED WHEN AmB=C=D TIME INDEPENDENT

SCANNING RADAR
AMPLITUDE ECM

MODULATION

I- COMPLETE SCAN r-1

TIME

AMPLITUDE

MONOPULSE RADAR

MODULATION

AC& ERROR

ANQLE ERROR

ANGLE
ERROR

ANU
ERROR

ERG

gRz

TIME
awu#n om 114

POLARIZATION I
TRANSMITTED POLARIZATION ECM (HORIZONTAL)

7/I

TRANSMITTED RADAR SIGNAL

POLARIZATION CHARACTERISTICS IN A MONOPULSE ANTENNA


BASIC ANTENNA PATTERN MONOPULSE ANTENNA (ONE PLANE) SUH & DIFFERENCE PATTERNS I

BORESITE

k V

0 u

c R 3 c4 c
X 0 2 0 d W b m * v3

0 0 4

E b4

I
.

CROSS-EYE
-~~-

NORMAL RADAR TRACKING

CROSS-EYE

.I. .R TRIES TO ALIGN ANTENNA WITH TILTED PHASE FRONT

Rw61CRO Du#lrn 52

W e4 m
I

s u

n w N J

ti 0

\
\ \ \ \ \

Ir, -,
l

RADARCOUNTERMEASURES
TRADE&DRI-WRS-CHAFFANGLEECM
DISPENSE RATE BLOOM RATE/SIZE VELOCITY OF DIPOLES VS DOPPLER TRACKERS EFFECTIVE CROSS SECTION OF CHAFF CLOUD WEATHER AIRCRAFT MANEUVER

AGENDA
SURVIVABILITYFACTORS ECMSYSTEMARCHITECTURES RADARCOUNTERMEASURES *RANGE .VELOCITY @ANGLE e MISSILECOUNTERMEASURES MISSILECOUNTERMEASURES COUNTERMEASURESWRAPUP ECMANALYSIS-TOOLSANDPROCESSES -

COMMAND MISSILE GUIDANCE / / /

MISSILE COUNTERMEASURES
COMWD GUIDED FVlZAPON JMMINGAPPROA
l

ATTACK MULTIPLE ASPECTS OF WEAPON SYSTEM


l

. FALSE TARGET POSITION VERSUS TARGET TRACK RADAR (ITR) RANGE - FALSE TARGETS (RFT/RANRAP), MASKING - NOISE ANGLE - ANGLE ERROR - AM, XPOL
l

DOVWV LINK JAMTIIMING:


l

FALSE MISSILE POSITION VERSUS MISSILE TRACKING RECEIVER RANGE - FALSE RANGE POSITION ANGLE - LINE OF SIGHT WITH TARGET, NOT WITH MISSILE DENY MISSILE TRACK
l l l

COMMAND LINK - (UPLINK) ISSUES INCORRECT FLIGHT COMMANDS TO MISSILE MISSILE FLYS TO WRONG RANGE/ANGLE FOR INTERCEPT
l l

- r

MISSILE COUNTERMEASURES
TRADES & DRIVERS - COMAMVD GUIDED MISSILE (DOWN LINK JMMING)
l

REQUIRES HIGH POWER TO BE EFFECTIVE JAM TO BEACON (J/B) RATIO APRIORI KNOWLEDGE OF BEACON FREQUENCY OR ABILITY TO MEASURE BEACON FREQUENCY
l l

REQUIRES HIGH DUTY CYCLE FROM JAMMER @MULTIPLE ECM PULSES FOR EACH RADAR PULSE TIME/FREQUENCY MULTIPLEXING TO COVER UNCERTAINTY
l

1L-

POINTING DATA

TARGET TRACKER I

w c)
/ / / / /

z 1
0

MISSILE COUNTERMEASURES
TRADES & DRllXRS - TERRAIN BOUNCE MISSILE
l

ATTACKS SEMI-ACTIVE AND ACTIVE MISSILES THREAT CAPABILITY - TWO TARGET PROCESSING/CCM

(J/S) DIRECT

vs

NJ) INDIRECT/ (J+s)~*~~~)

POWER DENSITY DIMISHES WITH ALTITUDE ANTENNA TRADES MAINLOBE GAIN/BEAMWIDTH DEPRESSION ANGLE SIDELOBE SUPPRESSION
l l l

TERRAIN REFLECTIVITY VARIES WITH TERRAIN TYPE DOPPLER SPREAD TIME DELAY
l l l

MISSILE COUNTERMEASURES
TRADES & DR.M?RS - TOWED DECOYMISSILE CM
*THREATCAPABILITY .TWOTARGETPROCESSINGCCM'S *LETHALRADIUS aFUSING *SALVOSHOT dIRCRAFTSIGNATURETOBEPROTECTED *GEOMETRY-ZONESOFNOPROTECTION
l

TOWEDDECOYAERODYNAMI.CCHARACTERISTICS . @LAUNCHCLEARANCE .DEPLOYMENT/REDEPLOYMENTSPEED/BRAKING l REELOUT/INCAPABILITY .FLIGHTSTABILITY .LINELENGTH/ DROOP

rl

.QUANTITYTOBECARRIED

I
l

MISSILE COUNTERMEASURES
TRADES&DmRS-REPEATERTOWEDDECOY
SIMPLE ARCHITECTURE LIMITED ELECTRONIC GAIN - DUE TO ISOLATION OF CLOSELY SPACED TRANSMIT AND RECEIVE ANTENNAS DOPPLER MODULATION RESULTS IN SPECTXAL SPREADING & LOSS OF J/S THREAT RANGE RESOLUTION LIMITS TOW LINE LENGTH GEOMETRY DELAY
l l

POTENTIAL BEACONING TO UNWANTED THREATS FOR BROADBAND OPERATION

MISSILE COUNTERMEASURES - r
TRADES & DRI-WRS - TRANSSPONDER TOWED DECOY
l

COMPLEX ARCHITECTURE RECEIVE/TECHNIQUE GENERATION ON BOARD REMOTE TRANSMITTER


l l

ELECTRONIC GAIN- HIGHER DUE TO WIDE ANTENNA SEPARATION LONGER TOW LENGTH POSSIBLE GEOMETRY ISSUES REMAIN COMPLEX MODULATIONS POSSIBLE DOPPLER RANGE TECHNIQUES - OVERCOME DELAYS
l l

MINIMIZES BEACONING - USE OF THREAT SPECIFIC TECHNIQUES

AGENDA

SURVIVABILITYFACTORS ECMSYSTEMARCHITECKJRES RADARCOUNTERMEASURESTECHNIQUES *RANGE 4ELOCITY *ANGLE MISSILECOUNTERMEASURES WCOUNTERMEASURESWRAPUP ECMANALYSIS-TOOLSANDPROCESSES

COUNTERMEASURES-WRAPUP
/ REQUlREMENTSAAlD STRATEGYDERI-WD FROM
l

THREAT ENVIRONMENT IADS - C3 VULNERABILITY SIGNAL DENSITY RADAR CAPABILITIES (RANGE, DOPPLER, ANGLE) MISSILE CAPABILITY (CG, SA, A)
l l l l l l

4IRCRAFT SIGNATURE FLIGHT ENVELOPE

COUNTERh4EASURES GOALS
l

DELAY/NEGATE ALL STEPS OF RADAR/MISSILE ENGAGEMENT

COUNTERMEASURES-WRAP UP
SYYSTElk4RCHITECTURE
l l

ISOLATION/SYSTEM GAIN VS TARGET RETURN

l
l

CONSTANT GAIN VS CONSTANT POWER


LOOKTHROUGH,LOOKOVER,CHOP

COHERENCY

COUNTERMEASURES TECHNIQUES
l

COUNTER RANGE, VELOCITY, AND ANGLE

dXADAROPERATION&ECCM'S @OPERATOR *
l

MISSILE VULNERABILITIESAND TECHNIQUES


l

. COMMAND GUIDED ACTIVE / SEMI-ACTIVE

AGENDA

SURVIVABILITYFACTORS ECMSYSTEMARCHITECTURES RADARCOUNTERMEASURES @RANGE .VELOCITY *ANGLE MISSILECOUNTERMEASURES COUNTERMEASURESWRAPUP ECMANALYSIS-TOOLSANDPROCESSES

-ECANALYSIS-TOOLSANDPROCESSES -1
ECANALYSIS TASK
l

EW ENVIRONMENT - COMPLEX COUNTLESS FACTORS AFFECT EC OUTCOME MULTIPLE TOOLS AVAILABLE FOR EC TECHNIQUE ANALYSIS

I--I

WHICH TOOL DO I CHOOSE TO HELP ANALYZE ECM TECHNIQUES PERFORMANCE? DONT DEFINE THE PROBLEM TO FIT THE TOOL THE TOOL MUST FIT THE PROBLEM

ECANALYSIS-TOOLSANDPROCESSES
FACTORS TO CONSIDER IN TOOL CHOICE
~ UNDERSTAND WHAT IS IMPORTANT TO QUESTION BEING ASKED 0 NOT FEASIBLE TO CAPTURE ALL REAL WORLD VARIABLES IN I A MODEL - ASSUMPTIONS ARE INHERENT - WHAT ARE THEY? CHALLENGE - SELECT & ADEQUATELY TREAT PERTINENT VARIABLES IN THE QUESTION TO BE ANSWERED
l l l

CHECK TO SEE IF IT IS THE RIGHT TOOL MODEL MUST MATCH THE PHYSICS OF THE ISSUE USE HARD THREAT.DATA FOR VARIABLES THAT ARE THREAT SENSITIVE REPRESENTATION OF INTELLIGENCE DATA IN THE TOOL MUST ADEQUATELY SUPPORT ADDRESSING THE CRITICAL ISSUE
l l l

UNDERSTAND THE PEDIGREE OF THE TOOL SA-xx or MiG - zz NAMEPLATE - DOES NOT ENSURE FIDELITY WHAT ASPECTS OF TOOL HAVE HIGH FIDELITY?
l l

CONFIDENCEPROCESS/OUTPUT.S

SYSTEM SOURCE DATA (e.g. ) -mE


- SYSIEM DESIGN DOCUMENTS - TEST DATA

SCHEMATICS

7
CIRCUIT ANALYSIS

TRANSFER FUNCTION -MATLAB - ANALYSIS

COMPLETED TEST HIGH CONFIDENCE ANSWER FOR SPECIFIC CONDITION CHECKED

I
I

UPDATE INCONSISTENT SOURCE RE-ENTER CYCLE

CHECK MATH MODEL CONFIRM - SOURCE DATA - scHEMAmcs - TEST DATA

-1

I I I I
I I I

I I
I I I I I I

I
I
I I

I I I I I

I
I

I
I I I

I
I

I
I I

I
I I I I

I
I

I I
I I

I
I I

I I
I

I
I

I I I
I I I

I I I

\ 6

I
I

I I I I I
I I I

I
I

I I I

-1
3 2.5 2 1.5 t! 2? 1 ii? n 0.5

SYSTEMRESPONSEDATA
Hardware Response (Green) vs. Simulation Response (Blue), Target (Red) 3.5

15 Time(s)

25

30

- r

ECMANALYSIS-TOOLSANDPROCESSES
EC EFFECTIVENESS ASSESSMENTS
l

HIGH DEGREE OF COMPLEXITY - NUMEROUS VARIABLES UNCERTAINTY IN INPUT DATA


LIMITATIONS & ASSUMPTIONS IN MODELS/TOOLS

EC TOOLS DO NOT PROVIDE ANSWERS EC TOOLS PROVIDE INSIGHT TO INFORMED ANALYSTS IF THE TOOL, THE INPUT DATA, AND CONSTRAINTS ARE UNDERSTOOD

You might also like