US20120055990A1 - Method of Applying Soft-Kill Deployment, a Soft-Kill Deployment System and a Computer Program Product - Google Patents

Method of Applying Soft-Kill Deployment, a Soft-Kill Deployment System and a Computer Program Product Download PDF

Info

Publication number
US20120055990A1
US20120055990A1 US13/142,490 US200913142490A US2012055990A1 US 20120055990 A1 US20120055990 A1 US 20120055990A1 US 200913142490 A US200913142490 A US 200913142490A US 2012055990 A1 US2012055990 A1 US 2012055990A1
Authority
US
United States
Prior art keywords
decoy
miss
missile
miss distance
parameter set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/142,490
Inventor
Martin Weiss
Franciscus Aloysius Maria Dam
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nederlandse Organisatie voor Toegepast Natuurwetenschappelijk Onderzoek TNO
Original Assignee
Nederlandse Organisatie voor Toegepast Natuurwetenschappelijk Onderzoek TNO
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nederlandse Organisatie voor Toegepast Natuurwetenschappelijk Onderzoek TNO filed Critical Nederlandse Organisatie voor Toegepast Natuurwetenschappelijk Onderzoek TNO
Assigned to NEDERLANDSE ORGANISATIE VOOR TOEGEPAST-NATUURWETENSCHAPPELIJK ONDERZOEK TNO reassignment NEDERLANDSE ORGANISATIE VOOR TOEGEPAST-NATUURWETENSCHAPPELIJK ONDERZOEK TNO ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DAM, FRANCISCUS ALOYSIUS MARIA, WEISS, MARTIN
Publication of US20120055990A1 publication Critical patent/US20120055990A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F41WEAPONS
    • F41HARMOUR; ARMOURED TURRETS; ARMOURED OR ARMED VEHICLES; MEANS OF ATTACK OR DEFENCE, e.g. CAMOUFLAGE, IN GENERAL
    • F41H11/00Defence installations; Defence devices
    • F41H11/02Anti-aircraft or anti-guided missile or anti-torpedo defence installations or systems
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F41WEAPONS
    • F41JTARGETS; TARGET RANGES; BULLET CATCHERS
    • F41J2/00Reflecting targets, e.g. radar-reflector targets; Active targets transmitting electromagnetic or acoustic waves
    • F41J2/02Active targets transmitting infrared radiation
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42BEXPLOSIVE CHARGES, e.g. FOR BLASTING, FIREWORKS, AMMUNITION
    • F42B12/00Projectiles, missiles or mines characterised by the warhead, the intended effect, or the material
    • F42B12/02Projectiles, missiles or mines characterised by the warhead, the intended effect, or the material characterised by the warhead or the intended effect
    • F42B12/36Projectiles, missiles or mines characterised by the warhead, the intended effect, or the material characterised by the warhead or the intended effect for dispensing materials; for producing chemical or physical reaction; for signalling ; for transmitting information
    • F42B12/56Projectiles, missiles or mines characterised by the warhead, the intended effect, or the material characterised by the warhead or the intended effect for dispensing materials; for producing chemical or physical reaction; for signalling ; for transmitting information for dispensing discrete solid bodies
    • F42B12/70Projectiles, missiles or mines characterised by the warhead, the intended effect, or the material characterised by the warhead or the intended effect for dispensing materials; for producing chemical or physical reaction; for signalling ; for transmitting information for dispensing discrete solid bodies for dispensing radar chaff or infrared material
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42BEXPLOSIVE CHARGES, e.g. FOR BLASTING, FIREWORKS, AMMUNITION
    • F42B5/00Cartridge ammunition, e.g. separately-loaded propellant charges
    • F42B5/02Cartridges, i.e. cases with charge and missile
    • F42B5/145Cartridges, i.e. cases with charge and missile for dispensing gases, vapours, powders, particles or chemically-reactive substances
    • F42B5/15Cartridges, i.e. cases with charge and missile for dispensing gases, vapours, powders, particles or chemically-reactive substances for creating a screening or decoy effect, e.g. using radar chaff or infrared material

Definitions

  • the present invention relates to a method of applying soft-kill deployment to mislead an incoming missile directed to a mother platform, the method comprising the steps of evaluating a number of miss distances associated with corresponding particular decoy launch parameter sets, selecting a decoy parameter set having an optimal evaluated miss distance; and transmitting the selected decoy parameter set to a launch unit for launching the decoy.
  • soft-kill measures are an advantageous means, especially when coping with attacks that may not be fully averted by hard-kill means.
  • Soft-kill deployment systems have quicker reaction times than most hard-kill systems, are cheaper and their use is not associated with the risks of collateral damage, or friendly fire that may characterize the use of hard-kill systems.
  • Advanced computing power has been a proven recipe for solving complex problems in combat decision making. For the purpose of deciding when and how to launch a soft-kill decoy, it might be relevant to predict effects of the decoy on the attacking missile. Thereto, a number of miss distances associated with corresponding particular decoy launch parameter sets may be predicted so that an optimal decoy parameter set having an optimal evaluated miss distance can be selected. The selected decoy parameter set can then be transmitted to the launch unit for launching the decoy.
  • much data has to be processed, e.g. data concerning the threat, ship, soft-kill component and the environment.
  • the predicting step in the method according to the invention includes the use of an adjoint algorithm.
  • the method further comprises the step of computing uncertainty data associated with a predicted miss distance, so that an estimate of the inherent uncertainty in the prediction can be taking into account in the decision process of an optimal decoy launch parameter set, thereby further improving the effect of the soft-kill deployment.
  • the method further comprises a step of validating the effect of the launched decoy, the validation step comprising the substeps of predicting a zero-effort miss distance, under platform lock on condition and/or decoy lock on condition, measuring incoming missile data, comparing the measured data with the predicted zero-effort miss distance or distances, and deducing, from the comparison results, on which entity the incoming missile is locked.
  • the deducing step includes the use of computed uncertainty data corresponding with a predicted zero-effort miss distance, thereby using the benefits of the adjoint algorithm another time.
  • the invention also relates to a soft-kill deployment system.
  • a computer program product may comprise a set of computer executable instructions stored on a data carrier, such as a CD or a DVD.
  • the set of computer executable instructions which allow a programmable computer to carry out the method as defined above, may also be available for downloading from a remote server, for example via the Internet.
  • FIG. 1 shows a schematic view of a soft-kill deployment system according to the invention
  • FIG. 2 shows a schematic perspective view of a ship equipped with the soft-kill deployment system of FIG. 1 ;
  • FIG. 3 shows a time line
  • FIG. 4 shows a flow chart of an embodiment of a method according to the invention.
  • FIG. 1 shows a schematic view of a soft-kill deployment system 1 according to the invention.
  • the system 1 is provided on a mother platform, such as a ship, and comprises a launch unit 2 for launching a decoy to mislead an incoming missile directed to the ship.
  • the system 1 further comprises a computer system 3 provided with a processor 4 that is arranged for performing a number of steps thereby enabling a proper control of the launch unit 2 .
  • the computer system 3 has a multiple number of input ports 5 for receiving input data and at least one output port 6 for transmitting data to the launch unit 2 .
  • FIG. 2 shows a schematic perspective view of the ship 10 equipped with the soft-kill deployment system 1 .
  • the ship 10 is provided with multiple sensors, such as an omni-directional radar unit 11 for inputting data to the computer system 3 of the soft-kill deployment system 1 .
  • FIG. 2 further shows a hostile missile 12 attacking the ship 10 .
  • the missile 12 remains locked on the ship 10 , the missile 12 follows a path P 1 and the missile 12 will hit the ship 10 .
  • the soft-kill deployment system 1 works properly, the missile will lock on a launched decoy 14 to follow another pre-determined path P 2 directed to the decoy 14 thereby missing the ship 10 .
  • the missile then passes the ship 10 at a shortest distance, also called the miss distance M.
  • the processor 4 is arranged for performing a number of steps. First of all, the processor 4 signals an incoming missile 12 . After signaling the missile 12 , the processor 4 performs an identifying step of the missile 12 . Such an identifying step may include determining the missile type, position, orientation, speed, path etc. In order to perform the identifying step properly, sensor data are input to the computer system 3 of the soft-kill deployment system 1 .
  • FIG. 3 shows a time line t.
  • the subsequent symbols T 0 , T S and T I denote a launch time of the missile, the signalling time instant of the missile and the identifying instant of the missile, respectively.
  • the processor 4 is further arranged for predicting a number of miss distances associated with corresponding particular decoy launch parameters sets. As an example, several tens of decoy launch parameter sets can be evaluated, each of them corresponding to a particular miss distance. In the predicting step, the use of an adjoint algorithm is included. The predicting step may be based on a large number of data, such as incoming missile parameter data, mother platform parameter data, the corresponding decoy launch parameter set and/or environmental data. Further, the processor is arranged for selecting a decoy parameter set having an optimal predicted miss distance M. The selected decoy parameter set is then transmitted to the launch unit 2 for launching the decoy. Further, control commands can be generated to modify the position and/or orientation of the ship.
  • the processor 4 is further arranged for performing the step of computing uncertainty data corresponding with a predicted miss distance, e.g. a probability area of the path that the missile is assumed to follow.
  • the processor 4 selects the decoy parameter set that corresponds to the largest predicted miss distance M, thereby providing a largest offset between the ship 10 and the missile 12 .
  • the processor also takes into account an uncertainty in the predictions of the miss distance, thereby optionally selecting a decoy parameter set that corresponds to a relatively large predicted miss distance M having a relatively small uncertainty.
  • the launch unit 2 of the decoy system 1 launches a decoy 14 including e.g. flare for influencing any infra-red lock on device in the hostile missile and/or chaff for influencing any radar lock on equipment in the hostile missile.
  • the decoy 14 is intended to cause the missile to deviate from the original direction, away from the ship 10 .
  • the decoy 14 is launched at a time instant T D . Then, the missile lock on the decoy at a later time instant T SD . At a further time instant T V , it is verified or validated whether the decoy works properly and/or whether the missile 12 is now directed to the decoy 14 . Thereto, the processor 4 is also arranged for performing the substeps of predicting a zero-effort miss distance, under platform lock on condition and decoy lock on condition. As a result, using the adjoint algorithm, a zero-effort miss distance is computed assuming that the missile remains locked on the ship.
  • the zero-effort miss distance is dependent on a specific time instant and is defined as the miss distance which will result when at that specific time instant the path of the ship and the missile will remained unchanged. Similarly, a zero-effort miss distance is computed assuming that the missile changes lock on to the decoy.
  • the processor further performs the substeps of measuring data related to the incoming missile and comparing the measured data with one or both predicted zero-effort miss distances. Then, the processor deduces, from the comparison results, on which entity the incoming missile is expected to be locked. Preferably, the deducing step includes the use of computed uncertainty data corresponding with a predicted zero-effort miss distance. After the validation has been performed, the missile enters the miss distance area, closest point of approach, at time instant T CPA and moves away from the ship.
  • the predicting step can be used before launch of the decoy, for finding an optimal launch parameter set. Further, after launch, the effectiveness of the soft-kill can be checked by comparing the predicted effect if the anti-ship missile has been lacked on the decoy or on the ship.
  • the decision for the optimal decoy parameter set and/or the decision in the checking step can be enhanced by using uncertainty data that may be provided by the adjoint algorithm.
  • the adjoint algorithm also known as adjoint method, is based on making a single simulation of a modified model called the Adjoint Model in order to determine the effect of all the perturbation sources that affect the miss distance.
  • the adjoint model can be readily obtained from a linearization of the original model by performing some straightforward block diagram manipulations. Alternatively, the adjoint model can be obtained easily from a state-space representation of the original model. It can mathematically be proven that for deterministically analyzing guidance loops, the separate influence of the initial condition and of the input of the time-varying system on the final value of the output, it is enough to compute one initial-value solution of the adjoint system. Expressions can be derived for assessing the final value using an initial-value solution for an arbitrary initial condition and input.
  • Adjoint Method can be useful in the case of deterministic performance analysis, it can be used with far greater advantage in the case of stochastic performance analysis.
  • adjoint response can be used to compute the variance of the output without lengthy Monte Carlo simulations.
  • the adjoint method includes the steps of constructing an adjoint model and using its response for generating performance data.
  • the adjoint model simulates the dynamical system whose response includes the input sensitivities of the system to be analyzed.
  • the adjoint algorithm is thus suited for evaluating the performance of the decoy process, in particular when the process depends on many variables, is dynamic and time varying.
  • the initial configuration is represented by a guided antiship missile that heads in the general direction of the ship at low altitude, a decoy cloud that is positioned a given displacement from the ship and moves freely with the wind, and a ship that is assumed to keep a constant heading during the engagement.
  • the missile is locked with its seeker on the decoy and uses the seeker data for computing guidance commands. This assumption corresponds to the use of the decoy in distraction mode.
  • the missile is first locked on the ship itself and it changes lock to the decoy only after the decoy becomes active.
  • the missile guides towards the decoy using Proportional Navigation Guidance law until passing the decoy. Subsequently, the missile continues in unguided flight until reaching the closest point of approach with respect to the ship. During the entire engagement, the velocity vector of the wind is assumed to be constant. It is also assumed that the missile speed is constant throughout the engagement, and consequently that only the course of the missile changes as a consequence of guidance commands.
  • a non-linear model is linearized to obtain a linear model and an expression for the miss distance can be formulated depending on an adjoint response that is defined as the solution to an initial value problem. Further, the variance of the miss distance can be expressed as a function of the variances of components of the initial condition. The variances of the initial state vector coordinates in terms of original stochastic quantities can be approximated relatively easily.
  • a post-launch validation can be performed using statistical hypothesis testing algorithms.
  • V s ⁇ ( t ) ⁇ 0 , t ⁇ t man V s , max t > t man , ( 4.9 )
  • t man is the time required to complete the manoeuvre of the ship.
  • is the time constant of the missile describing the response of the missile to the guidance commends represented by the commanded lateral acceleration ⁇ n,c .
  • V c , f ( x f - x m ) ⁇ ( v xf - v xm ) + ( y f - y m ) ⁇ ( v yf - v ym ) ( x f - x m ) 2 + ( y f - y m ) 2 , ( 4.15 ) ⁇ .
  • V c , s ( x s - x m ) ⁇ ( v xs - v xm ) + ( y s - y m ) ⁇ ( v ys - v ym ) ( x s - x m ) 2 + ( y s - y m ) 2 , ( 4.18 ) ⁇ .
  • T e [ cos ⁇ ⁇ ⁇ sin ⁇ ⁇ ⁇ - sin ⁇ ⁇ ⁇ cos ⁇ ⁇ ⁇ ] , ( 5.1 )
  • equation (5.10) is replaced by
  • miss distance is equal to z(t miss ).
  • n , c ⁇ N p ( t miss , f - t ) 2 ⁇ [ y f e - y m e + ( v yw e - v ym e ) ⁇ ( t miss , f - t ) ] , t ⁇ t miss , f - t 0 , 0 , t ⁇ t miss , f - t 0 , ( 5.14 )
  • miss distance [0 ⁇ yom e 0 0 ⁇ y f e ⁇ w e ] T .
  • the miss distance can be written as
  • Proposition 2.2 can be used to estimate the variance of the miss distance as a function of the variances of the components of the initial condition
  • the Adjoint Method can be used to refine the first method of assessing the success of launching the decoy based on the closest point of approach.
  • the idea is to use the Adjoint Method to estimate the closest point of approach for both the case that the missile is locked on the decoy and the case that the missile is locked on the ship. By comparing the computed position based on track data with these estimates and taking into account the variances of these estimates that can equally be determined using the Adjoint Method, it is possible to decide whether the missile has indeed locked on the decoy or not.
  • the linearized model in the case that the missile is locked on the decoy was introduced in the previous section as equation (6.1) and the following.
  • the Adjoint Method can be applied to estimate the Zero-Effort-Miss distance at time t d in case that the missile is locked on the decoy.
  • the value of the Zero-Effort-Miss distance at time t d can also be computed based on track data, and this value is denoted z .
  • z is normally distributed around z, the “true” (based on true geometrical data) ZEMD with variance ⁇ m that can be evaluated based on the accuracy of measurement data that are involved in computing z .
  • the optimal interval Z ⁇ can be obtained from the Neyman-Pearson Lemma. For convenience, we summarize here the main notions and results of statistical hypothesis testing that we use in the sequel.
  • the power of the test is defined as
  • the problem is to determine the decision interval Z ⁇ that maximizes the power of the test, or minimizes the probability of miss, such that the probability of false alarm takes a given value ⁇ .
  • the following classical result can be used to determine the optimal threshold.
  • the Neyman-Pearson Lemma The optimal decision that minimizes the probability of miss subject to a given probability of false alarm ⁇ is obtained by the following criterion based on the likelihood ratio
  • ⁇ ⁇ ( H 1 , H 0 ) p ⁇ ( Z ⁇ H 1 ) p ⁇ ( Z ⁇ H 0 ) ⁇ > ⁇ 0 ⁇ : ⁇ ⁇ ⁇ H 1 ′′ , ⁇ ⁇ 0 ⁇ : ⁇ ⁇ ⁇ H 0 ′′ , ( 7.11 )
  • ⁇ ⁇ ( H 1 ⁇ H 0 ) ⁇ s 2 + ⁇ m 2 ⁇ f 2 + ⁇ m 2 ⁇ ⁇ 1 2 ⁇ ( x ⁇ - x s ) 2 ⁇ s 2 + ⁇ m 2 - ( x ⁇ - x f ) 2 ⁇ f 2 + ⁇ m 2 . ( 7.15 )
  • the probability that this condition is satisfied can be evaluated using the assumption about the conditional distribution of z if H 0 is true. According to the Neyman-Pearson Lemma, this probability has to be equal to ⁇ and ⁇ 0 can be computed using this condition.
  • NormCDF stands for the cumulative distribution function of the standard normal law
  • ⁇ ⁇ 0 ⁇ ⁇ ? . ⁇ ? ⁇ indicates text missing or illegible when filed ( 7.21 )
  • ⁇ C ( ⁇ s 2 + ⁇ m 2 ) ⁇ ( ⁇ f 2 + ⁇ m 2 ) ⁇ ln ⁇ ⁇ ⁇ 0 2 ⁇ ⁇ f 2 + ⁇ m 2 ⁇ ⁇ ? + ⁇ m 2 ⁇ f 2 - ⁇ ⁇ ? , ⁇ ? ⁇ indicates text missing or illegible when filed ( 7.26 )
  • Source Parameter Symbol Value Target sensor Missile initial East [m] x om 6000 Missile initial North [m] y om 6000 Missile velocity [m/s] V m 300 Estimate ⁇ of missile initial East [m] ⁇ xom 46.3 ⁇ of missile initial North [m] ⁇ yom 46.3 ⁇ of missile initial course [rad] ⁇ ⁇ om 0.08 Missile time constant [s] T 0.1 Missile navigation constant [—] N P 3 Missile blind time [s] t b 0.3 Wind velocity [m/s] V w 10 Wind course [rad] ⁇ w ⁇ ⁇ of wind course [rad] ⁇ ⁇ w 0.05 Own platform Ship initial East [m] x om 0 Ship initial North [m] y om 0 Ship velocity [m/s] V e 15 Ship course [rad] ⁇ e 3 ⁇ /2 Decoy relative distance [m] ⁇ f 200 Decoy launch direction [rad
  • the prediction using the adjoint algorithm may thus be applied in two ways. Firstly, before launch, the prediction may be used to optimize the deployment. Secondly, after launch, the prediction may be used to make an assessment on the success of deployment. The latter may be realized by comparing observations and predictions of the closest point of approach under two hypotheses: that the missile is locked on the decoy, i.e. the deployment was successful, and that the missile is locked on the ship, i.e. the deployment failed.
  • the fact that the Adjoint Method can take into account measurement and estimation uncertainties without excessive computational effort leads to advantages, especially for the success assessment.
  • the method of applying soft-kill deployment to mislead an incoming missile directed to a mother platform can be performed using dedicated hardware structures, such as FPGA and/or ASIC components. Otherwise, the method can also at least partially be performed using a computer program product comprising instructions for causing a processor of the computer system to perform the above described steps of the method according to the invention. All steps can in principle be performed on a single processor. However it is noted that at least one step can be performed on a separate processor, e.g. the step of identifying a hostile missile and/or the step of identifying the missile.
  • FIG. 4 shows a flow chart of an embodiment of the method according to the invention.
  • a method is used for applying soft-kill deployment to mislead an incoming missile directed to a mother platform.
  • the method comprises the steps of predicting ( 100 ) a number of miss distances associated with corresponding particular decoy launch parameter sets, selecting ( 110 ) a decoy parameter set having an optimal evaluated miss distance; and transmitting ( 120 ) the selected decoy parameter set to a launch unit for launching the decoy.
  • the predicting step ( 100 ) includes the use of an adjoint algorithm.
  • the soft-kill deployment system according to the invention may be provided with a single launch system or with a multiple launch system. Further, a single missile or a multiple number of missiles directed to the mother platform can be coped with by the soft-kill deployment system according to the invention.
  • the method according to the invention is applied in combating an antiship missile threat
  • the method can also be applied when coping with missiles directed to other mother platforms, such as missiles threatening an airplane or a ground vehicle.

Abstract

The invention relates to a method of applying soft-kill deployment to mislead an incoming missile directed to a mother platform. The method comprises the step of predicting a number of miss distances associated with corresponding particular decoy launch parameter sets. Further, the method comprises the step of selecting a decoy parameter set having an optimal predicted miss distance. The method also comprises the step of transmitting the selected decoy parameter set to a launch unit for launching the decoy. Here, the predicting step includes the use of an adjoint algorithm.

Description

  • The present invention relates to a method of applying soft-kill deployment to mislead an incoming missile directed to a mother platform, the method comprising the steps of evaluating a number of miss distances associated with corresponding particular decoy launch parameter sets, selecting a decoy parameter set having an optimal evaluated miss distance; and transmitting the selected decoy parameter set to a launch unit for launching the decoy.
  • In combating an antiship missile threat, soft-kill measures are an advantageous means, especially when coping with attacks that may not be fully averted by hard-kill means. There are some advantages that soft-kill has over hard-kill. Soft-kill deployment systems have quicker reaction times than most hard-kill systems, are cheaper and their use is not associated with the risks of collateral damage, or friendly fire that may characterize the use of hard-kill systems. There are also disadvantages in using soft-kill systems. As their effects are less localized than those of hard-kill systems, they may affect negatively the sensor and weapon systems of other ships in a task force. Also, the planning of soft-kill systems and evaluating their success/failure is a rather complex task.
  • Obviously, improving the effectiveness of soft-kill by taking the correct decisions during deployment is a relevant aspect. Besides the obvious consequences of incorrect deployment, or deployment of insufficient rounds, an overkill, or the deployment of too many rounds is highly undesirable. Apart from wasting limited ship resources, overkill may add an additional strain on other sensor and weapon systems on board of the ship and diminish their performance. However, improving the effectiveness of soft-kill is not an easy task due to the complexity in taking correct decisions combined with the uncertainty in information that might be available, e.g. regarding the path that the missile follows.
  • Advanced computing power has been a proven recipe for solving complex problems in combat decision making. For the purpose of deciding when and how to launch a soft-kill decoy, it might be relevant to predict effects of the decoy on the attacking missile. Thereto, a number of miss distances associated with corresponding particular decoy launch parameter sets may be predicted so that an optimal decoy parameter set having an optimal evaluated miss distance can be selected. The selected decoy parameter set can then be transmitted to the launch unit for launching the decoy. However, when modeling and/or simulating the combat scenario, much data has to be processed, e.g. data concerning the threat, ship, soft-kill component and the environment.
  • Obviously, the quality of the prediction will have an immediate effect on the performance of the soft-kill deployment. Computational time constraints will necessarily limit the complexity of the effect prediction, so many factors that may influence the effect of the soft-frill measure will need to be approximated, thereby deteriorating the predictions and rendering the decision process less effective.
  • It is an object of the invention to provide a method of applying soft-kill deployment to mislead an incoming missile directed to a mother platform according to the preamble wherein one of the disadvantages identified above is reduced. In particular, it is an object of the invention to provide a method according to the preamble wherein a desired accuracy of the miss distance prediction may be obtained in a relatively short computation time. Thereto, the predicting step in the method according to the invention includes the use of an adjoint algorithm.
  • By including the use of an adjoint algorithm, computations may be simplified, thus leading to fast, accurate solutions. As a result, the computational effort dramatically improves, thereby enabling that a relatively large number of decoy launch parameters sets can be evaluated, eventually leading to an effective choice for an optimal decoy launch parameter set.
  • According to the invention, the method further comprises the step of computing uncertainty data associated with a predicted miss distance, so that an estimate of the inherent uncertainty in the prediction can be taking into account in the decision process of an optimal decoy launch parameter set, thereby further improving the effect of the soft-kill deployment.
  • In a further embodiment according to the invention, the method further comprises a step of validating the effect of the launched decoy, the validation step comprising the substeps of predicting a zero-effort miss distance, under platform lock on condition and/or decoy lock on condition, measuring incoming missile data, comparing the measured data with the predicted zero-effort miss distance or distances, and deducing, from the comparison results, on which entity the incoming missile is locked. By using the adjoint algorithm to perform the zero-effort miss distance predicting step, an effective way of carrying out a validating step can be obtained, so that the effected of a launched decoy can be evaluated. In a particular embodiment, the deducing step includes the use of computed uncertainty data corresponding with a predicted zero-effort miss distance, thereby using the benefits of the adjoint algorithm another time.
  • The invention also relates to a soft-kill deployment system.
  • Further, the invention relates to a computer program product. A computer program product may comprise a set of computer executable instructions stored on a data carrier, such as a CD or a DVD. The set of computer executable instructions, which allow a programmable computer to carry out the method as defined above, may also be available for downloading from a remote server, for example via the Internet.
  • Other advantageous embodiments according to the invention are described in the following claims.
  • By way of example only, embodiments of the present invention will now be described with reference to the accompanying figures in which
  • FIG. 1 shows a schematic view of a soft-kill deployment system according to the invention;
  • FIG. 2 shows a schematic perspective view of a ship equipped with the soft-kill deployment system of FIG. 1;
  • FIG. 3 shows a time line; and
  • FIG. 4 shows a flow chart of an embodiment of a method according to the invention.
  • It is noted that the figures show merely a preferred embodiment according to the invention. In the figures, the same reference numbers refer to equal or corresponding parts.
  • FIG. 1 shows a schematic view of a soft-kill deployment system 1 according to the invention. The system 1 is provided on a mother platform, such as a ship, and comprises a launch unit 2 for launching a decoy to mislead an incoming missile directed to the ship. The system 1 further comprises a computer system 3 provided with a processor 4 that is arranged for performing a number of steps thereby enabling a proper control of the launch unit 2. The computer system 3 has a multiple number of input ports 5 for receiving input data and at least one output port 6 for transmitting data to the launch unit 2.
  • FIG. 2 shows a schematic perspective view of the ship 10 equipped with the soft-kill deployment system 1. The ship 10 is provided with multiple sensors, such as an omni-directional radar unit 11 for inputting data to the computer system 3 of the soft-kill deployment system 1. FIG. 2 further shows a hostile missile 12 attacking the ship 10. When the missile 12 remains locked on the ship 10, the missile 12 follows a path P1 and the missile 12 will hit the ship 10. However, if the soft-kill deployment system 1 works properly, the missile will lock on a launched decoy 14 to follow another pre-determined path P2 directed to the decoy 14 thereby missing the ship 10. The missile then passes the ship 10 at a shortest distance, also called the miss distance M.
  • The processor 4 is arranged for performing a number of steps. First of all, the processor 4 signals an incoming missile 12. After signaling the missile 12, the processor 4 performs an identifying step of the missile 12. Such an identifying step may include determining the missile type, position, orientation, speed, path etc. In order to perform the identifying step properly, sensor data are input to the computer system 3 of the soft-kill deployment system 1.
  • FIG. 3 shows a time line t. Here, the subsequent symbols T0, TS and TI denote a launch time of the missile, the signalling time instant of the missile and the identifying instant of the missile, respectively.
  • The processor 4 is further arranged for predicting a number of miss distances associated with corresponding particular decoy launch parameters sets. As an example, several tens of decoy launch parameter sets can be evaluated, each of them corresponding to a particular miss distance. In the predicting step, the use of an adjoint algorithm is included. The predicting step may be based on a large number of data, such as incoming missile parameter data, mother platform parameter data, the corresponding decoy launch parameter set and/or environmental data. Further, the processor is arranged for selecting a decoy parameter set having an optimal predicted miss distance M. The selected decoy parameter set is then transmitted to the launch unit 2 for launching the decoy. Further, control commands can be generated to modify the position and/or orientation of the ship.
  • Optionally, the processor 4 is further arranged for performing the step of computing uncertainty data corresponding with a predicted miss distance, e.g. a probability area of the path that the missile is assumed to follow.
  • In an embodiment according to the invention, the processor 4 selects the decoy parameter set that corresponds to the largest predicted miss distance M, thereby providing a largest offset between the ship 10 and the missile 12. Alternatively, the processor also takes into account an uncertainty in the predictions of the miss distance, thereby optionally selecting a decoy parameter set that corresponds to a relatively large predicted miss distance M having a relatively small uncertainty.
  • Based on the selected decoy parameter set, the launch unit 2 of the decoy system 1 launches a decoy 14 including e.g. flare for influencing any infra-red lock on device in the hostile missile and/or chaff for influencing any radar lock on equipment in the hostile missile. The decoy 14 is intended to cause the missile to deviate from the original direction, away from the ship 10.
  • Referring to FIG. 3, the decoy 14 is launched at a time instant TD. Then, the missile lock on the decoy at a later time instant TSD. At a further time instant TV, it is verified or validated whether the decoy works properly and/or whether the missile 12 is now directed to the decoy 14. Thereto, the processor 4 is also arranged for performing the substeps of predicting a zero-effort miss distance, under platform lock on condition and decoy lock on condition. As a result, using the adjoint algorithm, a zero-effort miss distance is computed assuming that the missile remains locked on the ship. The zero-effort miss distance is dependent on a specific time instant and is defined as the miss distance which will result when at that specific time instant the path of the ship and the missile will remained unchanged. Similarly, a zero-effort miss distance is computed assuming that the missile changes lock on to the decoy. The processor further performs the substeps of measuring data related to the incoming missile and comparing the measured data with one or both predicted zero-effort miss distances. Then, the processor deduces, from the comparison results, on which entity the incoming missile is expected to be locked. Preferably, the deducing step includes the use of computed uncertainty data corresponding with a predicted zero-effort miss distance. After the validation has been performed, the missile enters the miss distance area, closest point of approach, at time instant TCPA and moves away from the ship.
  • As a result, the predicting step can be used before launch of the decoy, for finding an optimal launch parameter set. Further, after launch, the effectiveness of the soft-kill can be checked by comparing the predicted effect if the anti-ship missile has been lacked on the decoy or on the ship. The decision for the optimal decoy parameter set and/or the decision in the checking step can be enhanced by using uncertainty data that may be provided by the adjoint algorithm.
  • The adjoint algorithm, also known as adjoint method, is based on making a single simulation of a modified model called the Adjoint Model in order to determine the effect of all the perturbation sources that affect the miss distance. The adjoint model can be readily obtained from a linearization of the original model by performing some straightforward block diagram manipulations. Alternatively, the adjoint model can be obtained easily from a state-space representation of the original model. It can mathematically be proven that for deterministically analyzing guidance loops, the separate influence of the initial condition and of the input of the time-varying system on the final value of the output, it is enough to compute one initial-value solution of the adjoint system. Expressions can be derived for assessing the final value using an initial-value solution for an arbitrary initial condition and input. Though if the Adjoint Method can be useful in the case of deterministic performance analysis, it can be used with far greater advantage in the case of stochastic performance analysis. To formulate the relevant mathematical result it can be shown that the adjoint response can be used to compute the variance of the output without lengthy Monte Carlo simulations.
  • As such, the adjoint method includes the steps of constructing an adjoint model and using its response for generating performance data. The adjoint model simulates the dynamical system whose response includes the input sensitivities of the system to be analyzed. The adjoint algorithm is thus suited for evaluating the performance of the decoy process, in particular when the process depends on many variables, is dynamic and time varying.
  • The initial configuration is represented by a guided antiship missile that heads in the general direction of the ship at low altitude, a decoy cloud that is positioned a given displacement from the ship and moves freely with the wind, and a ship that is assumed to keep a constant heading during the engagement. At the start of the scenario it is assumed that the missile is locked with its seeker on the decoy and uses the seeker data for computing guidance commands. This assumption corresponds to the use of the decoy in distraction mode. By contrast, in seduction mode, the missile is first locked on the ship itself and it changes lock to the decoy only after the decoy becomes active.
  • It is assumed that the missile guides towards the decoy using Proportional Navigation Guidance law until passing the decoy. Subsequently, the missile continues in unguided flight until reaching the closest point of approach with respect to the ship. During the entire engagement, the velocity vector of the wind is assumed to be constant. It is also assumed that the missile speed is constant throughout the engagement, and consequently that only the course of the missile changes as a consequence of guidance commands.
  • It is also assumed that the ship is performing an evasive manoeuvre after deploying the decoy and that turning the ship towards the chosen course may take some time.
  • According to an aspect of the invention, a non-linear model is linearized to obtain a linear model and an expression for the miss distance can be formulated depending on an adjoint response that is defined as the solution to an initial value problem. Further, the variance of the miss distance can be expressed as a function of the variances of components of the initial condition. The variances of the initial state vector coordinates in terms of original stochastic quantities can be approximated relatively easily. A post-launch validation can be performed using statistical hypothesis testing algorithms.
  • The motion of the decoy is described as

  • {dot over (x)} fxw ,x f(0)=x of,  (4.1)

  • {dot over (υ)}xw=0,υxw(0)=υxow,  (4.2)

  • {dot over (y)} fyw ,y f(0)=y of,  (4.3)

  • {dot over (υ)}yw=0,υyw(0)=υyow.
  • The equations describing the motion of the ship are

  • {dot over (x)} sxs(t),x s(0)=x os,  (4.5)

  • {dot over (y)} sys(t),y s(0)=y os,  (4.6)

  • where

  • υxs(t)=V s(t)cos φs,  (4.7)

  • υys(t)=V s(t)sin φ2,  (4.8)
  • V s ( t ) = { 0 , t t man V s , max t > t man , ( 4.9 )
  • where tman is the time required to complete the manoeuvre of the ship.
  • The motion of the missile is described as

  • {dot over (x)} m =V m cos φm ,x m(0)=x om,  (4.10)

  • {dot over (y)} m =V m sin φm ,y m(0)=y om,  (4.11)
  • φ . m = a n V m , φ m ( 0 ) = φ om , ( 4.12 ) a . n = - 1 τ a n + 1 τ a n , c , a n ( 0 ) = 0 , ( 4.13 )
  • where τ is the time constant of the missile describing the response of the missile to the guidance commends represented by the commanded lateral acceleration αn,c.
  • For deployment planning purposes, it will be assumed that the missile is permanently locked on the decoy, until it passes the decoy. In this case
  • a n , c = { N p V c , f λ . f , V c , f > 0 , 0 , V c , f 0 , ( 4.14 )
  • with Np, the navigation constant of the missile, Vc,f, the closing velocity between missile and decoy, and λf, the angular rate of the line-of-sight between missile and decoy. If we use for the velocity vector of the missile the notation (υxm=Vm cos φm, υym=Vm sin φm), we have
  • V c , f = ( x f - x m ) ( v xf - v xm ) + ( y f - y m ) ( v yf - v ym ) ( x f - x m ) 2 + ( y f - y m ) 2 , ( 4.15 ) λ . f = ( v xf - v xm ) ( y f - y m ) - ( v yf - v ym ) ( x f - x m ) ( x f - x m ) 2 + ( y f - y m ) 2 . ( 4.16 )
  • For the purpose of post-launch testing of the deployment effectiveness, it is also necessary to consider the case that the missile remains locked on the ship. In this case

  • αn,c =N p V c,s{dot over (λ)}s,  (4.17)
  • where
  • V c , s = ( x s - x m ) ( v xs - v xm ) + ( y s - y m ) ( v ys - v ym ) ( x s - x m ) 2 + ( y s - y m ) 2 , ( 4.18 ) λ . s = ( v xs - v xm ) ( y s - y m ) - ( v ys - v ym ) ( x s - x m ) ( x s - x m ) 2 + ( y s - y m ) 2 . ( 4.19 )
  • To linearize the nonlinear model described in the previous section, it is convenient to introduce a new coordinate system that we call the Engagement Coordinate System, with the origin in the initial position of the missile, with the x-axis along the line-of-sight from missile to ship and the y-axis completing a positively oriented coordinate system. In FIG. 3.1, the axes of this coordinate system are denoted XE and YE. The transformation between East-North coordinates and engagement coordinates is defined by
  • T e = [ cos ψ sin ψ - sin ψ cos ψ ] , ( 5.1 )
  • where ψ=arctan 2(yos−yom,xos−xom).
  • We denote by the superscript all quantities expressed in engagement coordinates. Accordingly, we have
  • [ x m e y m e ] = T e [ x m y m ] , [ v xm e v ym e ] = T e [ v xm v ym ] , ( 5.2 )
  • and the analogues for the ship and decay position and velocity vectors.
  • Since during the engagement, the course of the missile remains close to the xe-axis, the velocity of the missile along the f-axis is approximately constant. Also the range between missile and ship, and between missile and decoy can be approximated by the difference of their x coordinates, whereas the miss distances can be approximated by the difference of their y coordinates. By neglecting the course variations of the missile, we can approximate the lateral acceleration of the missile by
  • [ a nx e a ny e ] [ a nx 0 ] . ( 5.3 )
  • The angular rate of the line-of-sight to the decoy is approximated as
  • λ . f = t [ y f e - y m e R mf ] , ( 5.4 )
  • where the relative range missile-decay is Rmf(t)=Vc,f(tmiss,f−t). We obtain
  • λ . f = y f e - y m e + ( v yw e - v ym e ) ( t miss , f - t ) V e , f ( t miss , f - t ) 2 . ( 5.5 )
  • In a similar fashion, the line-of-sight to the ship is approximated as
  • λ . s = t [ y s e - y m e R ms ] , ( 5.6 )
  • where Rms(t)=Vc,s(tmiss−t). Consequently,
  • λ . s = y s e - y m e + ( v ys e - v ym e ) ( t miss - t ) V c , s ( t miss - t ) 2 . ( 5.7 )
  • From the condition that xm e=xf e at time tmiss,f, we deduce that
  • t miss , f = x of e v xom e - v xw e . ( 5.8 )
  • The time of flight to the closest point of approach with respect to the ship can be approximated from the condition that xm e=xs e as
  • t miss = x os e v xom e - v xos e . ( 5.9 )
  • In conclusion, the linearized model for the case that the missile is locked an the decoy has the form
  • y . m e = v ym e , y m e ( 0 ) = y om e , v . ym e = a n , v ym e ( 0 ) = v yom e , a . n = - 1 τ a n + 1 τ a n , c , a n ( 0 ) = 0 , a n , c = { N p ( t miss , j - t ) 2 [ y f e - y m e + ( v yw e - v ym e ) ( t miss , f - t ) ] , t < t miss , f , 0 , t t miss , f , y . s e = v ys e ( t ) , y s e ( 0 ) = y os e , y . f e = v yw e , y f e ( 0 ) = y of c , v . yw e = 0 , v yw e ( 0 ) = v yow e . ( 5.10 )
  • In the case that the missile is locked on the ship, equation (5.10) is replaced by
  • a n , c = N p ( t miss - t ) 2 [ y s e - y m e + ( v ys e - v ym e ) ( t miss - t ) ] , ( 5.11 )
  • and the equations describing the motion of the decoy may obviously be skipped as they do not influence the outcome of the engagement.
  • In both cases, the resulting model is a linear, time-varying system on [0, tf].
  • The miss distance with respect to the ship is approximated by

  • Miss=y m e(t miss)−y s e(t miss),  (5.12)
  • which is a linear function of the state of the linearized model.
  • For the post-launch effectiveness assessment, we use the Zero-Effort-Miss distance that can be calculated at each time moment t during the engagement as

  • z=y m e −y s e+(t miss −t)(υym e−υys e).  (5.13)
  • Notice that the miss distance is equal to z(tmiss).
  • It is still necessary to modify the linearized model to suit our application. Indeed, it is easy to see that the model (5.10) is singular at time t=tmiss,f. A straightforward way to eliminate this singularity while preserving the linearity of the model, by introducing a “blind time” tb>0 that is a small interval before passing the decoy in which the missile shuts down its guidance loop. With this change, the expression of the commanded acceleration for the case that the missile is locked on the decoy becomes
  • a n , c = { N p ( t miss , f - t ) 2 [ y f e - y m e + ( v yw e - v ym e ) ( t miss , f - t ) ] , t < t miss , f - t 0 , 0 , t t miss , f - t 0 , ( 5.14 )
  • A similar change is necessary for the case that the missile is locked on the ship.
  • Notice that the introduction of the “blind time” is not necessarily affecting the realism of the simulation. Most antiship missiles are turning off the seeker when in the immediate vicinity of the target. This is done in order to avoid confusing the seeker when the target is too large in relation to the field of view.
  • If we introduce the state vector x=[ym e υym e αn ys e yf e υym e]T the linearized model can be written in matrix form as
  • x . = A ( t ) x + w ( t ) , where ( 6.1 ) A ( t ) = [ 0 1 0 0 0 0 0 0 1 0 0 0 c 1 ( t ) c 2 ( t ) - 1 τ 0 c 3 ( t ) c 4 ( t ) 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 ] , ( 6.2 ) w ( t ) = [ 0 0 0 v ys e ( t ) 0 0 ] with ( 6.3 ) c 1 ( t ) = { N p τ ( t miss , f - t ) 2 , t < t miss , f - t b , 0 , t t miss , f - t b , ( 6.4 ) c 2 ( t ) = { - N p τ ( t miss , f - t ) , t < t miss , f - t b , 0 , t t miss , f - t b , ( 6.5 ) c 3 ( t ) = { - N p τ ( t miss , f - t ) 2 , t < t miss , f - t b , 0 , t t miss , f - t b , ( 6.6 ) c 4 ( t ) = { N p τ ( t miss , f - t ) , t < t miss , f - t b , 0 , t t miss , f - t b , ( 6.7 )
  • and the initial condition is x(0)=[0 υyom e 0 0 Δyf e υw e]T. The miss distance can be written as

  • Miss=[100−100]×(t miss).  (6.8)
  • The adjoint response at time tmiss is the solution of the equation

  • {dot over (x)} adj =A T(t miss −t)x adj  (6.9)
  • with initial condition xadj(0)=[100−100]T. Notice that since matrix B in (6.1) is the identity, the state and output adjoint responses coincide.
  • According to Proposition 2.1, the miss distance can be written as
  • Miss = x adj ( t miss ) T x ( 0 ) + 0 t miss [ x adj ( t miss - τ ) ] T w ( τ ) τ = x 2 adj ( t miss ) v yam e + 0 t miss x 4 adj ( t miss - τ ) v ys e ( τ ) τ + x 5 adj ( t miss ) Δ y f e + x 6 adj ( t miss ) v yw e . ( 6.10 )
  • This form is particularly interesting for deterministic performance studies. In case that the initial data contains uncertainties with a stochastic character, Proposition 2.2 can be used to estimate the variance of the miss distance as a function of the variances of the components of the initial condition
  • σ Miss 2 = x adj ( t miss ) T P x ( 0 ) x adj ( t miss ) = [ x 1 adj ( t miss ] 2 σ y om e 2 + [ x 2 adj ( t miss ] 2 σ v yom e 2 ++ [ x 5 adj ( t miss ] 2 σ Δ y f n 2 + [ x 6 adj ( t miss ] 2 σ v yw e 2 , ( 6.11 )
  • where Px(0) denotes the variance matrix of x(0). Since the input of the system (6.1) is deterministic, the integral term in formula (2.6) does not appear in (6.11). Notice that formula (6.11) contains also the term corresponding to yom e that does not occur in (6.10) since yom e=0 by the choice of the coordinate system, but its variance might be non-zero, reflecting uncertainties in the track data available about the missile. Notice also that formula (6.11) in its matrix farm is more general since it may also contain crossvariance terms as well.
  • To apply formula (6.11) in practice, it is still necessary to determine the variances of the initial state vector coordinates in terms of the original stochastic quantities. An exact solution to this question may be difficult to obtain analytically, but fortunately it is easy to write approximations for these variances that are practically acceptable. Far example, let us assume that xom and yom are stochastic variables of mean x om and y om and variances σxom and σyom. Then the variance of yom is obtained as the (2,2) element of the matrix
  • T e [ σ x om 2 0 0 σ y om 2 ] T e T . ( 6.12 )
  • If the error in tracking the course of the missile φm comes with a variance σψm, then the variance of υyom e is approximately

  • συ yom e 2 =V mσψm.  (6.13)
  • This relation does ant take into account the error in the tracking of the missile total velocity. If we want to examine the effect of the dispersion of the decoy cloud, and we model it as a random perturbation on the launch direction, then the variance of yof e can be approximated as

  • σy of e =D fσψf.  (6.14)
  • These estimates were used for the numerical tests with good results. In general, more complicated relations might be necessary to evaluate the terms occurring in (6.11).
  • Let us assume now that the decoy was launched and that at a fixed moment of time td it is required to determine whether the deployment was successful, that is if the missile has locked on the decoy. In case of an active missile there are essentially two ways to perform this function (see [1]). The first applies to active and passive missiles as well and is based on computing the closest point of approach of the attacking missile. The second way to assess if the attacking missile is locked on the ship is based on using the ESM system indication to measure the radar signal used by the missile to track the ship. The second method is considered more reliable as it will also work if the missile performs a dogleg manoeuvre such that the apparent closest point of approach may appear to be very far away. However, as mentioned before, the first method is more widely applicable and, as reported in [1], none of the methods outwits the other in all the possible situations.
  • In this section we will show how the Adjoint Method can be used to refine the first method of assessing the success of launching the decoy based on the closest point of approach. The idea is to use the Adjoint Method to estimate the closest point of approach for both the case that the missile is locked on the decoy and the case that the missile is locked on the ship. By comparing the computed position based on track data with these estimates and taking into account the variances of these estimates that can equally be determined using the Adjoint Method, it is possible to decide whether the missile has indeed locked on the decoy or not.
  • The linearized model in the case that the missile is locked on the decoy was introduced in the previous section as equation (6.1) and the following. The linearized model in the case that the missile is locked on the ship has the same form as (6.1), with x=[ym e υym e αn ys e]T, w(t)=[0 0 0 υys e(t)]T and
  • A ( t ) = [ 0 1 0 0 0 0 1 0 c 1 ( t ) c 2 ( t ) - 1 τ 0 0 0 0 0 0 0 0 0 0 0 0 0 ] , where ( 7.1 ) c 1 ( t ) = N p τ ( t miss - t ) 2 . ( 7.2 ) c 2 ( t ) = - N p τ ( t miss - t ) . ( 7.3 )
  • and the initial condition is x(0)=[0 υyom e 0 0 Δyf e υw e]T. We are interested in the value of the Zero-Effort-Miss distance introduced in (5.13) at time td that can be written as

  • z=[1t miss −t0−1]x+[000−t miss +t]w(t).  (7.4)
  • Clearly, the linear model has the form (2.1) with D not identical zero. To apply Proposition 2.1, let the adjoint response be defined as the solution to the initial value problem

  • {dot over (x)} adj =A T(t d −t)x adj  (7.5)
  • with initial condition xadj(0)=[1 tmiss−td 0 −1]T. We have
  • z ( t d ) = x adj ( t d ) T x ( 0 ) + 0 d [ x adj ( t d - τ ) ] T w ( τ ) τ + [ 0 0 0 - t miss + t d ] w ( t d ) = x 2 adj ( t d ) v yorn e + 0 t d x 4 adj ( t d - τ ) v ys e ( τ ) τ - ( t miss - t d ) v ys e ( t d ) . ( 7.6 )
  • Since the velocity of the ship is not a stochastic variable, the presence of the D term in the linear model does not have any influence on the formula for the variance of the Zero-Effort-Miss distance. According to Proposition 2.2

  • σz 2 =x adj(t d)T P x(0) x adj(t d)=[x 1 adj(t d]2συ om e 2 +[x 2 adj(t d]2συ yom e 2,  (7.7)
  • In a similar fashion, the Adjoint Method can be applied to estimate the Zero-Effort-Miss distance at time td in case that the missile is locked on the decoy.
  • We denote by zs and by σs the average and the variance of the miss distance assuming that the decoy launch was successful and the missile is locked on the decoy, and by zf and by a σf the average and the variance of the miss distance assuming that the decoy launch failed to distract the missile from the ship.
  • The value of the Zero-Effort-Miss distance at time td can also be computed based on track data, and this value is denoted z. We assume that z is normally distributed around z, the “true” (based on true geometrical data) ZEMD with variance σm that can be evaluated based on the accuracy of measurement data that are involved in computing z.
  • The theory of statistical hypothesis testing can be used to provide an optimal interval Zλ(zs, zf, σs, σf, σm) such that if

  • zεZ λ,
  • then the best decision is that the missile is locked on the decoy, and if this condition is not satisfied then the best decision is that the missile is locked on the ship. The optimal interval Zλ can be obtained from the Neyman-Pearson Lemma. For convenience, we summarize here the main notions and results of statistical hypothesis testing that we use in the sequel.
  • First of all, let the null hypothesis H0 be that “the missile is locked on the decoy” and the alternate hypothesis H1 be that “the missile is locked on the ship”. In this case, the type I probability, or the probability of false alarm is that the hypothesis H1 is accepted, whereas H0 is true:

  • P eI =P{“H 1 ”|H 0}.  (7.8)
  • The type II probability, or the probability of miss is that the hypothesis H0 is accepted, whereas H1 is true:

  • P eII =P{“H 0 ”|H 1}.  (7.9)
  • The power of the test is defined as

  • π=P{“H 1 ”|H 1}=1−P eII.  (7.10)
  • The problem is to determine the decision interval Zλ that maximizes the power of the test, or minimizes the probability of miss, such that the probability of false alarm takes a given value α. The following classical result can be used to determine the optimal threshold.
  • The Neyman-Pearson Lemma: The optimal decision that minimizes the probability of miss subject to a given probability of false alarm α is obtained by the following criterion based on the likelihood ratio
  • Λ ( H 1 , H 0 ) = p ( Z H 1 ) p ( Z H 0 ) > Λ 0 : `` H 1 , < Λ 0 : `` H 0 , ( 7.11 )
  • where Z represents the observation, and where Λ0 satisfies

  • P{Λ(H 1 ,H 0)>Λ0 |H 0}=α.  (7.12)
  • In our application, the observation is represented by the computed ZEMD z. Assuming that all the prediction errors are normally distributed, with the notations introduced before we have
  • p ( z ^ H 0 ) = 1 2 π ( σ s 2 + σ m 2 ) - 1 2 ( x ^ - x s ) 1 σ s 2 + σ m 2 , and ( 7.13 ) p ( z ^ H 1 ) = 1 2 π ( σ f 2 + σ m 2 ) - 1 2 ( z ^ - z f ) 2 σ f 2 + σ m 2 , ( 7.14 )
  • and therefore, the likelihood ratio is
  • Λ ( H 1 H 0 ) = σ s 2 + σ m 2 σ f 2 + σ m 2 1 2 ( x ^ - x s ) 2 σ s 2 + σ m 2 - ( x ^ - x f ) 2 σ f 2 + σ m 2 . ( 7.15 )
  • After some straightforward manipulations, the condition Λ(H1|H0)>Λ0 is equivalent to
  • [ ( 1 σ s 2 + σ m 2 - 1 σ f 2 + σ m 2 ) z _ - ( z s σ s 2 + σ m 2 - z f σ f 2 + σ m 2 ) ] × [ ( 1 σ s 2 + σ m 2 + 1 σ f 2 + σ m 2 ) z ^ - ( z s σ s 2 + σ m 2 + z f σ f 2 + σ m 2 ) ] > ln Λ 0 2 σ f 2 + σ m 2 σ s 2 + σ m 2 ( 7.16 )
  • The probability that this condition is satisfied can be evaluated using the assumption about the conditional distribution of z if H0 is true. According to the Neyman-Pearson Lemma, this probability has to be equal to α and Λ0 can be computed using this condition.
  • The solution is particularly simple for the case that σfs=σ. In this case, the previous condition is equivalent to
  • ( z f - z s ) ( z ^ - z s + z f 2 ) > ( σ 2 + σ m 2 ) ln Λ 0 . ( 7.17 )
  • Assume that zs>zf which is physically the most likely case, since it is expected that a successful lock on the decoy will lead to a larger ZEMD than if the missile is locked on the ship. Then the previous relation is equivalent to
  • z ^ < z s + z f 2 - σ 2 + σ m 2 z s - z f ln Λ 0 . ( 7.18 )
  • Now we can evaluate the conditional probability in the Neyman-Pearson Lemma using the conditional distribution of z. We have
  • P { Λ ( H 1 , H 0 ) > Λ 0 H 0 } = ? 1 2 π ( σ 2 + σ m 2 ) ? z = NormCDF ( z f - z s 2 σ 2 + σ m 2 - σ 2 + σ m 2 z s - z f ln Λ 0 ) , ? indicates text missing or illegible when filed ( 7.19 )
  • where NormCDF stands for the cumulative distribution function of the standard normal law
  • NormCDF ( η ) = 1 2 π - η - 1 2 ξ 2 ξ . ( 7.20 )
  • From the Neyman-Pearson lemma, we can readily obtain the value of Λ0 by equating the expression (7.19) to the false alarm rate α. We obtain
  • Λ 0 = ? . ? indicates text missing or illegible when filed ( 7.21 )
  • Introducing this expression in (7.18), we deduce that the optimal decision criterion for accepting hypothesis H1 is that

  • z≦z a+NormCDF−1(α)√{square root over (σ2m 2)}.
  • The power of this criterion can be obtained by evaluating the probability that this condition is satisfied in case that H1 is true. Given the conditional distribution of z, we conclude that
  • π = P { H 1 `` H 1 } = NormCDF ( z s - z f σ 2 + σ m 2 + NormCDF - 1 ( α ) ) ( 7.23 )
  • In the general case, that σf≠σs, it is impossible to obtain closed-form expressions for the optimal decision criterion. However it is possible to propose a numerical algorithm that uses the conditional averages and variances to perform the decision. We explain this algorithm for the case that σfs. With the notations
  • z 1 = ? σ 3 2 + σ m 2 - z f σ f 2 + σ m 2 1 σ s 2 + σ m 2 - 1 σ f 2 + σ m 2 , ( 7.24 ) z 2 = ? σ s 2 + σ m 2 + z f σ f 2 + σ m 2 1 σ s 2 + σ m 2 + 1 σ f 2 + σ m 2 , ( 7.25 ) C = ( σ s 2 + σ m 2 ) ( σ f 2 + σ m 2 ) ln Λ 0 2 σ f 2 + σ m 2 σ ? + σ m 2 σ f 2 - σ ? , ? indicates text missing or illegible when filed ( 7.26 )
  • it is easy to see that relation (7.16) can be rewritten as

  • ({circumflex over (z)}−z 1)({circumflex over (z)}−z 2)>C.  (7.27)
  • The problem of determining Λ0 to satisfy the condition of the Neyman-Pearson Lemma reduces to the problem of finding C such that

  • P{({circumflex over (z)}−z 1)({circumflex over (z)}−z 2)>C|H 0}=α.  (7.28)
  • With this value of C, if the estimate of the Zero Effort Miss distance {circumflex over (z)} satisfies (7.27), then H1 will be accepted, and otherwise H0 will be accepted.
  • Introducing further
  • z _ = z 1 + z 2 2 , ( 7.29 ) C = ( z 1 - z 2 2 ) + C , ( 7.30 )
  • the two solutions of the second degree equation

  • ( z−z 1)( z−z 2)=C  (7.31)

  • are

  • z 1,2 = z±C′.  (7.32)
  • Notice that these two solutions are the limits of the decision interval Zλ. Relation (7.28) is equivalent to
  • 1 - NormCDF ( ? - z s σ s 2 + σ m 2 ) + NormCDF ( z _ 2 - z s σ s 2 + σ m 2 ) = α , ? indicates text missing or illegible when filed ( 7.33 )
  • or equivalently
  • 1 - NormCDF ( z _ - z s σ s 2 + σ m 2 + C σ s 2 + σ m 2 ) + NormCDF ( z _ - z s σ ? + σ m 2 - C σ ? + σ m 2 ) = α . ? indicates text missing or illegible when filed ( 7.34 )
  • This equation reduces to solving the nonlinear equation
  • ln x = C σ ? + σ m 2 ? indicates text missing or illegible when filed
    1−NormCDF(A+x)+NormCDF(A−x)=α,  (7.35)
  • where
  • A = z _ - s ? σ ? + σ m 2 ? indicates text missing or illegible when filed
  • is a known parameter. This equation has a unique positive solution for every value of A and α in the interval (0, 1) since the function on the left hand side is strictly decreasing in x, takes the value 1 for x=0 and converges to 0 for x→∞. Moreover, it is easy to find upper and lower bound for the solution. For example, if A>0, it is easy to see that

  • 1−NormCDF(A+x)<NormCDF(A−x)  (7.36)
  • for each x>0. Now let
  • x 1 = A - NormCDF - 1 ( α 2 ) , ( 7.37 ) x 2 = NormCDF - 1 ( 1 - α 2 ) - A . ( 7.38 )
  • Assume that both x1 and x2 are positive, which is generically true for small values of α. Remember that α is the false alarm rate and it is usually chosen to be very small. Using inequality (7.36), it becomes clear that the left hand side of (7.35) is greater than α for x=x1 and it is smaller than α for x=x2. Because of monotonicity, the solution of (7.35) is guaranteed to be in the interval (x1, x2). Using a bisection method, the solution can be easily determined. This provides the solution C′ for the equation (7.34), which can be used to determine C from (7.30), which in turn is used to check the decision criterion to determine if the antiship missile is locked
  • TABLE 1
    Values of the parameters used in the numerical experiments.
    Source Parameter Symbol Value
    Target sensor Missile initial East [m] xom 6000
    Missile initial North [m] yom 6000
    Missile velocity [m/s] Vm 300
    Estimate σ of missile initial East [m] σxom 46.3
    σ of missile initial North [m] σyom 46.3
    σ of missile initial course [rad] σφom 0.08
    Missile time constant [s] T 0.1
    Missile navigation constant [—] N P 3
    Missile blind time [s] tb 0.3
    Wind velocity [m/s] V w 10
    Wind course [rad] φw π
    σ of wind course [rad] σφw 0.05
    Own platform Ship initial East [m] xom 0
    Ship initial North [m] yom 0
    Ship velocity [m/s] Ve 15
    Ship course [rad] φe 3π/2
    Decoy relative distance [m] Δf 200
    Decoy launch direction [rad] ψf 3.927
    Ship manoeuvre delay [s] t map 5

    on the ship, or on the decoy according to relation (7.27). Moreover, the power of the criterion π=P{“H1”|H1} can be computed as
  • π = 1 - NormCDF ( ? - ? σ f 2 + σ m 2 ) + NormCDF ( ? - ? σ f 2 + σ m 2 ) . ? indicates text missing or illegible when filed ( 7.39 )
  • where ξ1 and ξ2 are given by (7.32).
  • The prediction using the adjoint algorithm may thus be applied in two ways. Firstly, before launch, the prediction may be used to optimize the deployment. Secondly, after launch, the prediction may be used to make an assessment on the success of deployment. The latter may be realized by comparing observations and predictions of the closest point of approach under two hypotheses: that the missile is locked on the decoy, i.e. the deployment was successful, and that the missile is locked on the ship, i.e. the deployment failed. The fact that the Adjoint Method can take into account measurement and estimation uncertainties without excessive computational effort leads to advantages, especially for the success assessment.
  • The method of applying soft-kill deployment to mislead an incoming missile directed to a mother platform can be performed using dedicated hardware structures, such as FPGA and/or ASIC components. Otherwise, the method can also at least partially be performed using a computer program product comprising instructions for causing a processor of the computer system to perform the above described steps of the method according to the invention. All steps can in principle be performed on a single processor. However it is noted that at least one step can be performed on a separate processor, e.g. the step of identifying a hostile missile and/or the step of identifying the missile.
  • FIG. 4 shows a flow chart of an embodiment of the method according to the invention. A method is used for applying soft-kill deployment to mislead an incoming missile directed to a mother platform. The method comprises the steps of predicting (100) a number of miss distances associated with corresponding particular decoy launch parameter sets, selecting (110) a decoy parameter set having an optimal evaluated miss distance; and transmitting (120) the selected decoy parameter set to a launch unit for launching the decoy. The predicting step (100) includes the use of an adjoint algorithm.
  • It will be understood that the above described embodiments of the invention are exemplary only and that other embodiments are possible without departing from the scope of the present invention. It will be understood that many variants are possible.
  • The soft-kill deployment system according to the invention may be provided with a single launch system or with a multiple launch system. Further, a single missile or a multiple number of missiles directed to the mother platform can be coped with by the soft-kill deployment system according to the invention.
  • Though in the embodiments described above the method according to the invention is applied in combating an antiship missile threat, the method can also be applied when coping with missiles directed to other mother platforms, such as missiles threatening an airplane or a ground vehicle.
  • Such variants will be obvious for the person skilled in the art and are considered to lie within the scope of the invention as formulated in the following claims.

Claims (9)

1-9. (canceled)
10. A method of applying soft-kill deployment to mislead an incoming missile directed to a mother platform, the method comprising the steps of:
predicting a number of miss distances associated with corresponding particular decoy launch parameter sets,
selecting a decoy parameter set having an optimal predicted miss distance; and
transmitting the selected decoy parameter set to a launch unit for launching the decoy;
wherein the predicting step includes the use of an adjoint algorithm, wherein the method further comprises the step of computing uncertainty data associated with a predicted miss distance, and wherein, in the step of selecting a decoy parameter set, the computed uncertainty data is taken into account,
further comprising a step of validating the effect of the launched decoy, the validation step comprising the substeps of:
predicting a zero-effort miss distance, under platform lock on condition and/or decoy lock on condition;
measuring incoming missile data;
comparing the measured data with the predicted zero-effort miss distance or distances;
deducing, from the comparison results, on which entity the incoming missile is locked.
11. The method according to claim 10, wherein an predicted miss distance are based on incoming missile parameters, mother platform parameters and the corresponding decoy launch parameter set.
12. The method according to claim 10, wherein the adjoint algorithm includes linearizing a non-linear prediction model.
13. The method according to claim 10, wherein the deducing step includes the use of computed uncertainty data corresponding with a predicted zero-effort miss distance.
14. The method according to claim 10, further comprising the step of signaling an incoming missile.
15. The method according to claim 10, further comprising the step of identifying a signalled incoming missile.
16. A soft-kill deployment system, comprising:
a launch unit for launching a decoy to mislead an incoming missile directed to a mother platform, and
a computer system provided with a processor that is arranged for performing the steps of:
predicting a number of miss distances associated with corresponding particular decoy launch parameter sets,
selecting a decoy parameter set having an optimal predicted miss distance; and
transmitting the selected decoy parameter set to the launch unit for launching the decoy;
wherein the predicting step includes the use of an adjoint algorithm, and wherein the processor is further arranged for performing the step of computing uncertainty data associated with a predicted miss distance, and wherein, in the step of selecting a decoy parameter set, the computed uncertainty data is taken into account,
wherein the processor is further arranged for performing the step of:
validating the effect of the launched decoy, the validation step comprising the substeps of:
predicting a zero-effort miss distance, under platform lock on condition and/or decoy lock on condition;
measuring incoming missile data;
comparing the measured data with the predicted zero-effort miss distance or distances;
deducing, from the comparison results, on which entity the incoming missile is locked.
17. A computer program product for applying soft-kill deployment to mislead an incoming missile directed to a mother platform, the computer program product comprising computer readable code for causing a processor to perform the steps of:
predicting a number of miss distances associated with corresponding particular decoy launch parameter sets,
selecting a decoy parameter set having an optimal predicted miss distance; and
transmitting the selected decoy parameter set to a launch unit for launching the decoy;
wherein the predicting step includes the use of an adjoint algorithm, wherein the computer program product further comprises computer readable code for causing a processor to perform the step of computing uncertainty data associated with a predicted miss distance, and wherein, in the step of selecting a decoy parameter set, the computed uncertainty data is taken into account,
and wherein the computer program product comprises computer readable code for causing a processor to perform the steps of:
validating the effect of the launched decoy, the validation step comprising the substeps of:
predicting a zero-effort miss distance, under platform lock on condition and/or decoy lock on condition;
measuring incoming missile data;
comparing the measured data with the predicted zero-effort miss distance or distances;
deducing, from the comparison results, on which entity the incoming missile is locked.
US13/142,490 2008-12-31 2009-12-30 Method of Applying Soft-Kill Deployment, a Soft-Kill Deployment System and a Computer Program Product Abandoned US20120055990A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP08173134.1 2008-12-31
EP08173134A EP2204632A1 (en) 2008-12-31 2008-12-31 A method of applying soft-kill deployment, a soft-kill deployment system and a computer program product
PCT/NL2009/050837 WO2010077142A1 (en) 2008-12-31 2009-12-30 A method of applying soft-kill deployment, a soft-kill deployment system and a computer program product

Publications (1)

Publication Number Publication Date
US20120055990A1 true US20120055990A1 (en) 2012-03-08

Family

ID=40791362

Family Applications (1)

Application Number Title Priority Date Filing Date
US13/142,490 Abandoned US20120055990A1 (en) 2008-12-31 2009-12-30 Method of Applying Soft-Kill Deployment, a Soft-Kill Deployment System and a Computer Program Product

Country Status (7)

Country Link
US (1) US20120055990A1 (en)
EP (2) EP2204632A1 (en)
JP (1) JP2012514179A (en)
AU (1) AU2009333968B2 (en)
CA (1) CA2748832A1 (en)
IL (1) IL213837A0 (en)
WO (1) WO2010077142A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140015704A1 (en) * 2011-03-28 2014-01-16 Peter Huber Method and apparatus to protect a target against a minimum of one attacking missile
US20150138534A1 (en) * 2013-11-18 2015-05-21 Elta Systems Ltd. Multiband flash detection system
WO2015185416A1 (en) * 2014-06-04 2015-12-10 Dcns Soft-kill method, soft-kill device and associated naval vessel
US11181346B1 (en) * 2019-09-30 2021-11-23 Bae Systems Information And Electronic Systems Integration Inc. Methods for enhanced soft-kill countermeasure using a tracking radar
US20220026181A1 (en) * 2018-12-10 2022-01-27 Rheinmetall Waffe Munition Gmbh Method for protecting moving or stationary objects from approaching laser-guided threats
US11478931B2 (en) * 2019-06-25 2022-10-25 Disney Enterprises, Inc. Computational vibration suppression for robotic systems

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9915506B1 (en) 2016-08-31 2018-03-13 W.R. Davis Engineering Limited System and method of coordinated infrared suppression and flare launch
KR102546720B1 (en) * 2022-11-28 2023-06-22 국방과학연구소 Optical Testbed System for Jamming of Image Tracking Threats

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050040280A1 (en) * 2003-08-19 2005-02-24 Hua Cuong Tu Multi-sensor guidance system for extreme force launch shock applications
US20070159379A1 (en) * 2003-10-02 2007-07-12 Heinz Bannasch Method and apparatus for protecting ships against terminal homing phase-guided missiles
US20090128394A1 (en) * 2007-11-19 2009-05-21 Dong Cho Shin Active RF Decoy Simulation Apparatus
US20120211562A1 (en) * 2007-06-08 2012-08-23 Raytheon Company Methods and apparatus for intercepting a projectile

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3421734A1 (en) * 1984-06-12 1985-12-12 Buck Chemisch-Technische Werke GmbH & Co, 7347 Bad Überkingen METHOD FOR PROTECTING INFRARED RADIATING DESTINATIONS, ESPECIALLY SHIPS, FROM AIRCRAFT EQUIPPED WITH INFRARED STEERING HEADS
DE4238038C1 (en) * 1992-11-11 1994-06-16 Buck Chem Tech Werke Method of providing a dummy target
JPH08271196A (en) * 1995-03-30 1996-10-18 Mitsubishi Electric Corp Decoy control equipment
JPH0942895A (en) * 1995-07-28 1997-02-14 Mitsubishi Electric Corp Method for preventing missile
AUPQ413299A0 (en) * 1999-11-18 1999-12-09 Metal Storm Limited Forming temporary airborne images
JP2001221595A (en) * 2000-02-10 2001-08-17 Mitsubishi Electric Corp Radio disturbing device
JP2001263998A (en) * 2000-03-23 2001-09-26 Mitsubishi Electric Corp Decoy device and method for its use

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050040280A1 (en) * 2003-08-19 2005-02-24 Hua Cuong Tu Multi-sensor guidance system for extreme force launch shock applications
US20070159379A1 (en) * 2003-10-02 2007-07-12 Heinz Bannasch Method and apparatus for protecting ships against terminal homing phase-guided missiles
US20120211562A1 (en) * 2007-06-08 2012-08-23 Raytheon Company Methods and apparatus for intercepting a projectile
US20090128394A1 (en) * 2007-11-19 2009-05-21 Dong Cho Shin Active RF Decoy Simulation Apparatus

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140015704A1 (en) * 2011-03-28 2014-01-16 Peter Huber Method and apparatus to protect a target against a minimum of one attacking missile
US20150138534A1 (en) * 2013-11-18 2015-05-21 Elta Systems Ltd. Multiband flash detection system
US9612089B2 (en) * 2013-11-18 2017-04-04 Elta Systems Ltd. Multiband flash detection system
WO2015185416A1 (en) * 2014-06-04 2015-12-10 Dcns Soft-kill method, soft-kill device and associated naval vessel
FR3022035A1 (en) * 2014-06-04 2015-12-11 Dcns RIPPING METHOD, RANDING DEVICE AND NAVAL EQUIPMENT THEREFOR
US20220026181A1 (en) * 2018-12-10 2022-01-27 Rheinmetall Waffe Munition Gmbh Method for protecting moving or stationary objects from approaching laser-guided threats
US11478931B2 (en) * 2019-06-25 2022-10-25 Disney Enterprises, Inc. Computational vibration suppression for robotic systems
US11181346B1 (en) * 2019-09-30 2021-11-23 Bae Systems Information And Electronic Systems Integration Inc. Methods for enhanced soft-kill countermeasure using a tracking radar

Also Published As

Publication number Publication date
AU2009333968A1 (en) 2011-07-21
JP2012514179A (en) 2012-06-21
CA2748832A1 (en) 2010-07-08
AU2009333968B2 (en) 2012-06-07
EP2382438A1 (en) 2011-11-02
WO2010077142A1 (en) 2010-07-08
IL213837A0 (en) 2011-07-31
EP2204632A1 (en) 2010-07-07

Similar Documents

Publication Publication Date Title
US20120055990A1 (en) Method of Applying Soft-Kill Deployment, a Soft-Kill Deployment System and a Computer Program Product
US9712553B2 (en) System and method for developing a cyber-attack scenario
Kim et al. Cyber attack vulnerabilities analysis for unmanned aerial vehicles
ES2345782T3 (en) PROVISION AND PROCEDURE TO GENERATE INPUT INFORMATION FOR A SIMULATION DEVICE.
US9836990B2 (en) System and method for evaluating cyber-attacks on aircraft
US8781802B2 (en) Simulation device and simulation method
US7487933B1 (en) Homing missile guidance and estimation algorithms against advanced maneuvering targets
US9240001B2 (en) Systems and methods for vehicle survivability planning
US9030347B2 (en) Preemptive signature control for vehicle survivability planning
KR101378887B1 (en) Apparatus and system for identifying friend or foe
Mendes et al. Effects of GPS spoofing on unmanned aerial vehicles
US8831793B2 (en) Evaluation tool for vehicle survivability planning
US10677879B2 (en) Depression angle reference tracking system
Ma et al. Path following identification of unmanned aerial vehicles for navigation spoofing and its application
KR100994518B1 (en) Flight simulator apparatus capable of virtual radar warning receiver operation
KR102265381B1 (en) Real-time effect analysis device for radio wave interference of unmanned vehicles and method thereof
Simard et al. Central level fusion of radar and IRST contacts and the choice of coordinate system
Vanek et al. Vision only sense and avoid: A probabilistic approach
Kim Engagement-scenario-based decoy-effect simulation against an anti-ship missile considering radar cross section and evasive maneuvers of naval ships
Weiss et al. A novel concept for scheduling and effect assessment of soft-kill against an antiship missile based on the adjoint method
US10401170B2 (en) Systems and methods for providing automatic detection of inertial sensor deployment environments
Higgins et al. Simulation-based undersea warfare assessment
KR102066228B1 (en) Method to recommend emergency destruct based on abnormal scenarios during flight tests
KR102401940B1 (en) Apparatus and method for operating measuring deceptive devices
US7013808B1 (en) Method and system for determining a bounding region

Legal Events

Date Code Title Description
AS Assignment

Owner name: NEDERLANDSE ORGANISATIE VOOR TOEGEPAST-NATUURWETEN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WEISS, MARTIN;DAM, FRANCISCUS ALOYSIUS MARIA;REEL/FRAME:026749/0568

Effective date: 20110720

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION