97 research outputs found

    General use of UAS in EW environment--EW concepts and tactics for single or multiple UAS over the net-centric battlefield

    Get PDF
    With the development of technology, Electronic Warfare has been increasing for decades its importance in modern battles. It can even be referred to as the heart of today's net-centric battlefield. Unmanned Aerial Systems are gaining more importance every single day. Nations are working on more complex and more effective UAS in order to accomplish missions that are very difficult, or even impossible for manned aircraft. Electronic Warfare missions are often dangerous and risky. Mounting Electronic Warfare equipment on a UAS and using it to conduct the EW mission is the most rational solution, since it does not endanger human life. This thesis will examine the possible ways in which UAS can be paired with EW equipment. These two technologies can be integrated into a single mission over the net-centric battlefield. Furthermore, this thesis will try to explain the concepts and tactics required to use these integrated technologies more effectively. At the end of the thesis, a scenario will be run to help the reader understand the applicability of these tactics in the real environment.http://archive.org/details/generaluseofuasi109454512Turkish Air Force author.Approved for public release; distribution is unlimited

    Statistical assessment on Non-cooperative Target Recognition using the Neyman-Pearson statistical test

    Get PDF
    Electromagnetic simulations of a X-target were performed in order to obtain its Radar Cross Section (RCS) for several positions and frequencies. The software used is the CST MWS©. A 1 : 5 scale model of the proposed aircraft was created in CATIA© V5 R19 and imported directly into the CST MWS© environment. Simulations on the X-band were made with a variable mesh size due to a considerable wavelength variation. It is intended to evaluate the Neyman-Pearson (NP) simple hypothesis test performance by analyzing its Receiver Operating Characteristics (ROCs) for two different radar detection scenarios - a Radar Absorbent Material (RAM) coated model, and a Perfect Electric Conductor (PEC) model for recognition purposes. In parallel the radar range equation is used to estimate the maximum range detection for the simulated RAM coated cases to compare their shielding effectiveness (SE) and its consequent impact on recognition. The AN/APG-68(V)9’s airborne radar specifications were used to compute these ranges and to simulate an airborne hostile interception for a Non-Cooperative Target Recognition (NCTR) environment. Statistical results showed weak recognition performances using the Neyman-Pearson (NP) statistical test. Nevertheless, good RCS reductions for most of the simulated positions were obtained reflecting in a 50:9% maximum range detection gain for the PAniCo RAM coating, abiding with experimental results taken from the reviewed literature. The best SE was verified for the PAniCo and CFC-Fe RAMs.Simulações electromagnéticas do alvo foram realizadas de modo a obter a assinatura radar (RCS) para várias posições e frequências. O software utilizado é o CST MWS©. O modelo proposto à escala 1:5 foi modelado em CATIA© V5 R19 e importado diretamente para o ambiente de trabalho CST MWS©. Foram efectuadas simulações na banda X com uma malha de tamanho variável devido à considerável variação do comprimento de onda. Pretende-se avaliar estatisticamente o teste de decisão simples de Neyman-Pearson (NP), analisando as Características de Operação do Receptor (ROCs) para dois cenários de detecção distintos - um modelo revestido com material absorvente (RAM), e outro sendo um condutor perfeito (PEC) para fins de detecção. Em paralelo, a equação de alcance para radares foi usada para estimar o alcance máximo de detecção para ambos os casos de modo a comparar a eficiência de blindagem electromagnética (SE) entre os diferentes revestimentos. As especificações do radar AN/APG-68(V)9 do F-16 foram usadas para calcular os alcances para cada material, simulando uma intercepção hostil num ambiente de reconhecimento de alvos não-cooperativos (NCTR). Os resultados mostram performances de detecção fracas usando o teste de decisão simples de Neyman-Pearson como detector e uma boa redução de RCS para todas as posições na gama de frequências selecionada. Um ganho de alcance de detecção máximo 50:9 % foi obtido para o RAM PAniCo, estando de acordo com os resultados experimentais da bibliografia estudada. Já a melhor SE foi verificada para o RAM CFC-Fe e PAniCo

    SYNTHETIC APERTURE RADAR PROCESSING USING UWB OFDM SIGNALS

    Get PDF

    Unmanned Aircraft Systems in the Cyber Domain

    Get PDF
    Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions. This second edition discusses state-of-the-art technology issues facing US UAS designers. It focuses on counter unmanned aircraft systems (C-UAS) – especially research designed to mitigate and terminate threats by SWARMS. Topics include high-altitude platforms (HAPS) for wireless communications; C-UAS and large scale threats; acoustic countermeasures against SWARMS and building an Identify Friend or Foe (IFF) acoustic library; updates to the legal / regulatory landscape; UAS proliferation along the Chinese New Silk Road Sea / Land routes; and ethics in this new age of autonomous systems and artificial intelligence (AI).https://newprairiepress.org/ebooks/1027/thumbnail.jp

    DRONE DELIVERY OF CBNRECy – DEW WEAPONS Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD)

    Get PDF
    Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD) is our sixth textbook in a series covering the world of UASs and UUVs. Our textbook takes on a whole new purview for UAS / CUAS/ UUV (drones) – how they can be used to deploy Weapons of Mass Destruction and Deception against CBRNE and civilian targets of opportunity. We are concerned with the future use of these inexpensive devices and their availability to maleficent actors. Our work suggests that UASs in air and underwater UUVs will be the future of military and civilian terrorist operations. UAS / UUVs can deliver a huge punch for a low investment and minimize human casualties.https://newprairiepress.org/ebooks/1046/thumbnail.jp

    An Evaluation Schema for the Ethical Use of Autonomous Robotic Systems in Security Applications

    Get PDF
    We propose a multi-step evaluation schema designed to help procurement agencies and others to examine the ethical dimensions of autonomous systems to be applied in the security sector, including autonomous weapons systems

    Electronic warfare self-protection of battlefield helicopters : a holistic view

    Get PDF
    The dissertation seeks to increase understanding of electronic warfare (EW) self-protection (EWSP) of battlefield helicopters by taking a holistic (systems) view on EWSP. It also evaluates the methodologies used in the research and their suitability as descriptive tools in communication between various EWSP stakeholders. The interpretation of the term "holistic view" is a central theme to the dissertation. The research methodology is bottom-up – which is necessary since no previous work exists that could guide the study – and progresses from analysis to synthesis. Initially several methods are evaluated for presenting findings on EWSP, including high-level system simulation such as Forrester system dynamics (FSD). The analysis is conducted by a comprehensive literature review on EW and other areas that are believed to be of importance to the holistic view. Combat scenarios, intelligence, EW support, validation, training, and delays have major influence on the effectiveness of the EWSP suite; while the initial procurement decision on the EWSP suite sets limits to what can be achieved later. The need for a vast support structure for EWSP means that countries with limited intelligence and other resources become dependent on allies for support; that is, the question of EWSP effectiveness becomes political. The synthesis shows that a holistic view on EWSP of battlefield helicopters cannot be bounded in the temporal or hierarchical (organizational) senses. FSD is found to be helpful as a quality assurance tool, but refinements are needed if FSD is to be useful as a general discussion tool. The area of survivability is found to be the best match for the holistic view – for an EWSP suprasystem. A global survivability paradigm is defined as the ultimate holistic view on EWSP. It is suggested that future research should be top-down and aiming at promoting the global survivability paradigm. The survivability paradigm would give EWSP a natural framework in which its merits can be assessed objectively.reviewe

    Space Security 2008

    Get PDF
    Provides data and analysis on space activities in 2007 and their cumulative impact on security issues, including space laws, policies, and doctrines; civil space programs and global utilities; commercial uses; and environmental and military issues
    corecore