1 / 13

Introduction to Threat Evaluation and Weapon Assignment

Introduction to Threat Evaluation and Weapon Assignment. Jaco Roux * Jan van Vuuren. LEDGER Annual Conference CSIR, Pretoria November 29 th - 30 th , 2007. Presentation Overview. What is GBADS? What is TEWA? Tactical environment & assets Sensors & effectors Threats to the system

koren
Télécharger la présentation

Introduction to Threat Evaluation and Weapon Assignment

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction to Threat Evaluation and Weapon Assignment Jaco Roux* Jan van Vuuren LEDGER Annual Conference CSIR, Pretoria November 29th - 30th, 2007

  2. Presentation Overview • What is GBADS? • What is TEWA? • Tactical environment & assets • Sensors & effectors • Threats to the system • TE DSS hierarchy • Three TE model types • Project Status

  3. Targets Weapon Systems Radar Sensors Assets • Search Radar • Tracking Radar • Guns and Cannons • SAM System HQ • Command and Control • Operators • TEWA System What is GBADS?

  4. What is TEWA?

  5. 60m 300m 250m 30m 30m 300m Point Asset Rectangular Asset Surface Asset Tactical Environment & Assets • Threats are air based • Defended assets land based • Asset attributes • Size • Geometry • Asset priority

  6. Sensors & Effectors • Sensors: • Track management • Sensor and system tracks • Hostility and type classification • Measurable attributes • Derived attributes • Effectors: • Efficiency of effector • WS and tracking sensor • SSHP compute Pkill • Assignment to threats

  7. Threats of the system • Threat movement in 3 dimensions • Approach and attack techniques • Interested in the VSHORAD ranges, i.e. attack techniques • Divided into phases and stages

  8. TE DSS Hierarchy

  9. Deterministic Models • Time-to-DA • Shortest Orthogonal Distance • Bearing • Course

  10. TE DSS Hierarchy

  11. Probability-based Model A H K

  12. Project Status and Future Work • TE Status • Established theoretical background (4 years) • Flagging & Deterministic models implemented • Working on Probability-based model subcomponents • Data from TFDC & OTB • WA Status • Working on theoretical background (2 years) • Greedy WA and AP solutions implemented • Working on all inclusive WA solution for benchmark • Testing and Evaluation Status • Started testing and TE models integrated • Integration with the VGD (collaboration with DPSS) • Growing Knowledgebase • New masters student 2008 – OIL • Collaboration with IMT (work sessions) • TEWA on higher levels (JAD) – (RRS & DPSS) • Future implementations such as Task Force Assignment (SAP)

  13. References [1] Roux JN, 2006, Real-time Threat Evaluation of Fixed Wing Aircraft in a Ground Based Air Defence Environment, MSc Eng Thesis, University of Stellenbosch, Stellenbosch. [2] Roux JN & Van Vuuren JH, 2007, Threat evaluation and weapon assignment decision support: A review of the state of the art, ORiON, to appear. [3] Roux JN & Van Vuuren JH, 2007, Real-time threat evaluation in a ground based air defence environment, submitted. www.tewa.co.za

More Related