06.01.2015 Views

Army Materiel Systems Analysis Activity - OneSAF Public Site

Army Materiel Systems Analysis Activity - OneSAF Public Site

Army Materiel Systems Analysis Activity - OneSAF Public Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Army</strong> <strong>Materiel</strong> <strong>Systems</strong> <strong>Analysis</strong> <strong>Activity</strong><br />

40 Years of<br />

Excellence in <strong>Analysis</strong><br />

<strong>OneSAF</strong> Survivability Suite (OS2) Overview<br />

Scott Johnson<br />

410-278-2036<br />

scott.c.johnson98.civ@mail.mil<br />

Approved for <strong>Public</strong> Release; Distribution is Unlimited.<br />

1


• Introduction<br />

• Definitions<br />

• OS2 Capabilities<br />

• OS2 Design<br />

• OS2 Verification<br />

• Future Development<br />

• Future Utility<br />

• Summary<br />

Agenda<br />

2


Introduction<br />

• Background<br />

– US <strong>Army</strong> <strong>Materiel</strong> <strong>Systems</strong> <strong>Analysis</strong> <strong>Activity</strong> (AMSAA)<br />

Other Than Armor (OTA) Survivability Team is<br />

dedicated to providing the United States <strong>Army</strong> with<br />

analysis, data and tools to support decisions regarding<br />

OTA survivability technologies<br />

– Modeling & Simulation (M&S) tools exist to evaluate<br />

individual survivability technologies but limited<br />

capability exists to address survivability technologies<br />

at the item level<br />

– AMSAA conducted a study to determine the best<br />

approach to developing a survivability suite analysis<br />

tool and decided to develop this tool with <strong>OneSAF</strong>, a<br />

composable force level simulation<br />

• Objective<br />

– Build a simulation for evaluation of OTA survivability<br />

technologies to support item level analysis<br />

• Purpose<br />

– Inform the <strong>OneSAF</strong> community of OS2‟s capabilities,<br />

design and future utility<br />

M&S Hierarchy<br />

Theater<br />

Force-on-<br />

Force<br />

Few-on-Few<br />

One-on-One/Few<br />

Engineering<br />

AMSAA intends to bridge the gap between engineering<br />

level and force-on-force level models<br />

3


Definitions<br />

• An Other-Than-Armor (OTA) technology is any technology that increases platform and<br />

crew survivability and is not baseline or add-on ballistic armor<br />

• A Defensive Aid Suite (DAS) is a subset of OTA technologies designed to prevent a<br />

munition, once launched, from impacting the platform or to reduce the resulting<br />

penetration when a munition impact does occur<br />

• An Active Protection System (APS) is a DAS technology that relies on the detection of<br />

an incoming munition to trigger a sequence of events designed to eliminate munition<br />

impact or reduce munition lethality on the protected platform<br />

• A Passive Protection System (PPS) is a DAS technology that does not rely on the<br />

detection of an incoming munition and accept munition impact while reducing munition<br />

lethality on the protected platform<br />

Survivability “Onion”<br />

See-Understand-Act<br />

Avoid Detection<br />

Avoid Acquisition<br />

Survivability Taxonomy<br />

Avoid Hit,<br />

Penetration,<br />

Kill<br />

OTA<br />

Avoid Hit<br />

Avoid Penetration<br />

DAS<br />

Non-Lethal<br />

Avoid<br />

Kill<br />

APS<br />

PPS<br />

4


OS2 Capabilities<br />

• Components of OS2<br />

– Enhanced and added<br />

representation of threat<br />

munitions<br />

• Mobility<br />

• Guidance<br />

• Designation<br />

– Enhanced and added<br />

representation of DAS<br />

components<br />

• Sensors<br />

• Controller<br />

• Countermeasures (CM)<br />

• OS2 Development Status<br />

– Iteration One<br />

Munition Sensor Countermeasure<br />

SACLOS Tracking,<br />

Guidance and Flyout<br />

• Completed Spring 2008<br />

• Integrated into <strong>OneSAF</strong> v2.5<br />

– Iteration Two<br />

Missile Warning<br />

Receiver (MWR)<br />

Infrared<br />

Countermeasure<br />

(IRCM)<br />

• Completed Spring 2010<br />

• Expected integration into <strong>OneSAF</strong> v6.0<br />

Munition Sensor Countermeasure<br />

Munition<br />

Fired<br />

Sensor 1<br />

Sensor 2<br />

Controller<br />

CM 1<br />

CM 2<br />

Unguided Direct Fire<br />

Flyout (RPG, KE)<br />

Detection and<br />

Tracking Radar<br />

Hard-Kill APS<br />

DAS<br />

Munition Sensor CM<br />

Repository<br />

5


OS2 Iteration One Design<br />

New model using<br />

direct fire delivery<br />

accuracy data on tick<br />

Designation<br />

Emission<br />

IRCM<br />

CM<br />

Capability<br />

Designation<br />

Capability<br />

Target<br />

Designation<br />

Designation<br />

Manager<br />

Emission<br />

Manager<br />

Intel<br />

Perception<br />

Target List<br />

B.B.<br />

HASC<br />

Weapon<br />

Controller<br />

B.B.<br />

MWR<br />

Target Entity<br />

Vulnerability<br />

Threat Entity<br />

Creates<br />

Physical Component<br />

Behavioral Component<br />

OS2 Development<br />

Mobility<br />

This physical model contains the<br />

Guidance PKAD, IRCM PKAD and<br />

CLOS Mobility PKAD<br />

Detonate<br />

B.B.<br />

Threat Munition<br />

Fuze<br />

Event<br />

Router<br />

Detonation<br />

B.B. – Blackboard<br />

CM – Countermeasure<br />

HASC – Hit Avoidance Suite Controller<br />

IRCM – Infrared Countermeasure<br />

MWR – Missile Warning Receiver<br />

PKAD – Physical Knowledge Acquisition Document<br />

6


OS2 Iteration Two Design<br />

Threat Entity<br />

B.B.<br />

MFRFS/<br />

MWR<br />

Target Entity<br />

Perception<br />

GV<br />

Vulnerability<br />

Dismounted<br />

Infantry<br />

B.B.<br />

Weapon<br />

Controller<br />

Intel<br />

B.B.<br />

Target List<br />

SR/LR<br />

CM<br />

*<br />

IC<br />

Vulnerability<br />

Sensor<br />

Capability<br />

Controller<br />

CM<br />

Capability<br />

*<br />

Creates<br />

Physical Component<br />

Behavioral Component<br />

OS2 Development<br />

Threat Munition<br />

Mobility<br />

Detonate<br />

Detonate<br />

B.B.<br />

EFM<br />

Vulnerability<br />

Fuze<br />

Detonation<br />

Event<br />

Router<br />

Detonation<br />

* Represents<br />

the ability to<br />

model fratricide<br />

B.B. – Blackboard<br />

CM – Countermeasure<br />

GV – Ground Vehicle<br />

EFM – Enhanced Fragment Model<br />

IC – Individual Combatant<br />

SR/LR – Short Range/Long Range<br />

MFRFS – Multi Function Radio<br />

Frequency System<br />

MWR – Missile Warning Receiver<br />

7


OS2 Verification<br />

• Unit Testing<br />

– Focused on single instant in time<br />

– Examined functional areas developed independent of each<br />

other to expose data lookup and algorithm/logic<br />

implementation errors<br />

– Performed side by side comparison of AMSAA‟s expected<br />

versus simulation actual results<br />

• System Integration Testing<br />

– Focused over life of a single engagement<br />

– Examined functional areas developed independent of each<br />

other to expose a broader range of errors<br />

– Analyzed and visualized results to ensure trends met<br />

expectations<br />

• Mock Classified <strong>Analysis</strong> (Iteration 1)<br />

• Timeline <strong>Analysis</strong> (Iteration 2)<br />

Successful verification provided confidence that components<br />

correctly functioned independently and together<br />

8


Future Development<br />

• Smoke/Obscurant technologies<br />

• Surface-mounted technologies<br />

• Documentation<br />

– Verification report to be published Fall 2012<br />

9


Future Utility<br />

• DAS Requirements <strong>Analysis</strong><br />

• DAS Tactics, Techniques & Procedures <strong>Analysis</strong><br />

• DAS Operational Effectiveness <strong>Analysis</strong><br />

• DAS Timeline <strong>Analysis</strong><br />

10


Summary<br />

• AMSAA intends to bridge the gap between<br />

engineering and force-on-force level modeling<br />

• There is a capability to model survivability<br />

technologies at the item-level<br />

• OS2 intends to play a significant role in supporting<br />

the development of DAS technologies<br />

11


Backups<br />

12


Unit Test Case Matrix – MFRFS<br />

MFRFS Unit Test Case Matrix<br />

Case # Sensor SR Tracks LR Tracks<br />

1 OS2MFRFS 0 0<br />

2 OS2MFRFS 1 0<br />

3 OS2MFRFS 2 0<br />

4 OS2MFRFS 0 1<br />

5 OS2MFRFS 0 2<br />

6 OS2MFRFS 1 2<br />

7 OS2MFRFS 2 1<br />

8 OS2MFRFS 2 2<br />

Case /<br />

Result<br />

Factors that Affect the<br />

Model<br />

Notional<br />

Data<br />

13


Unit Test Results - MFRFS<br />

PKAD Data<br />

Verification<br />

List<br />

MFRFS Unit Test Results – Case 3<br />

Radar<br />

Target<br />

Counter Measures<br />

Unit Test – MFRFS<br />

Case 3<br />

Weather Condition<br />

Time of Day<br />

Range of Threat Muntion to Target System (m)<br />

Number of SR Tracks 2<br />

Number LR Tracks 0<br />

Probability of SR Detection<br />

Probability of SR Track<br />

Probability of LR Track<br />

Test Input Expected Actual Pass<br />

OS2MFRFS<br />

SR Search Rate (s) 0.14 0.14<br />

SR Track Rate (s) 0.55 0.55<br />

LR Track Rate (s) 0.55 0.55<br />

Uniform Random Number<br />

Sensed<br />

Notional<br />

Data<br />

Input<br />

Data Lookup<br />

14


Probability of Track<br />

Probability of Track<br />

1<br />

0.9<br />

0.8<br />

0.7<br />

0.6<br />

0.5<br />

0.4<br />

0.3<br />

0.2<br />

0.1<br />

System Integration Test – MFRFS<br />

MFRFS Acquisition and Track - Long Range KE Maintain Track<br />

0<br />

0 200 400 600 800 1000 1200 1400 1600 1800 2000<br />

1<br />

0.9<br />

0.8<br />

0.7<br />

0.6<br />

0.5<br />

0.4<br />

0.3<br />

0.2<br />

0.1<br />

Notional<br />

Results<br />

LRCM Employed<br />

Range to Target (m)<br />

MFRFS Acquisition and Track - Long Range KE Lost Track<br />

Acquisition Probability<br />

Acquisition Draw<br />

Track Probability<br />

Track Draw<br />

MFRFS<br />

lost track<br />

Maximum coast<br />

time exceeded and<br />

track dropped<br />

0<br />

0 200 400 600 800 1000 1200 1400 1600 1800 2000<br />

Range to Target (m)<br />

Scenario:<br />

• KE threat munition launched at<br />

approximately 2000m<br />

• Successful MWR detection<br />

• Visualization of acquisition and<br />

track probabilities<br />

Top Plot:<br />

• MFRFS acquires KE munition on<br />

first acquisition attempt, „time<br />

to acquire‟ never expires<br />

• MFRFS maintains track<br />

throughout engagement, „max<br />

coast time‟ never expires, until<br />

LRCM is employed<br />

Bottom Plot:<br />

• Reduced MFRFS acquisition and<br />

track performance<br />

• MFRFS acquires KE threat on<br />

second acquisition attempt prior<br />

to „time to acquire‟ expiring<br />

• MFRFS track is lost at<br />

approximately 1600m and is<br />

never successfully tracked<br />

thereafter before „max coast<br />

time‟ expires<br />

• KE threat must be detected<br />

again, though in this scenario<br />

another detection will not occur<br />

15


Notional<br />

Results<br />

Timeline <strong>Analysis</strong> – RPG Case (1 of 3)<br />

RPG Engagement Timeline<br />

MWR<br />

MFRFS<br />

Controller<br />

SRCM<br />

2<br />

3<br />

4<br />

Threat Munition Flyout<br />

Threat Munition Intercept<br />

MFRFS Detection<br />

MFRFS Track<br />

HASC Prioritization<br />

SR/LRCM Fire Tick<br />

LRCM<br />

IRCM<br />

149 m/s<br />

200 m/s<br />

135 m/s<br />

1<br />

Mobility<br />

Designation<br />

Guidance<br />

EFM Vulnerability<br />

Max MFRFS Detection Range<br />

Mean Intercept Range (Launcher 3)<br />

0 20 40 60 80 100 120 140 160 180<br />

Range (m)<br />

1. Threat RPG 18 launch from Infantry @ 177m and 91 degree<br />

aspect angle – munition moves every 0.01 seconds<br />

2. MFRFS detects SR threat munition near sensor‟s maximum<br />

range<br />

3. HASC prioritization cycle begins after target list update –<br />

decides to use SRCM launcher 3<br />

4. SRCM checks when to fire its interceptor every 0.01<br />

seconds<br />

16


Notional<br />

Results<br />

Timeline <strong>Analysis</strong> – RPG Case (2 of 3)<br />

RPG Engagement Timeline<br />

MWR<br />

MFRFS<br />

Controller<br />

SRCM<br />

7<br />

6<br />

5<br />

2<br />

3<br />

4<br />

Threat Munition Flyout<br />

Threat Munition Intercept<br />

MFRFS Detection<br />

MFRFS Track<br />

HASC Prioritization<br />

SR/LRCM Fire Tick<br />

LRCM<br />

IRCM<br />

149 m/s<br />

200 m/s<br />

135 m/s<br />

1<br />

Mobility<br />

Designation<br />

Guidance<br />

EFM Vulnerability<br />

Max MFRFS Detection Range<br />

Mean Intercept Range (Launcher 3)<br />

0 20 40 60 80 100 120 140 160 180<br />

Range (m)<br />

5. MFRFS begins threat munition SR tracking –<br />

tracks every 0.03 seconds<br />

– On all successful tracks the HASC reprioritizes<br />

6. SRCM posts interceptor detonation after munition<br />

crosses the intercept range<br />

7. Controller sends a message to MFRFS – stop<br />

tracking threat munition<br />

17


Notional<br />

Results<br />

Timeline <strong>Analysis</strong> – RPG Case (3 of 3)<br />

RPG Engagement Timeline<br />

MWR<br />

MFRFS<br />

Controller<br />

SRCM<br />

7<br />

10<br />

6<br />

5<br />

2<br />

3<br />

4<br />

Threat Munition Flyout<br />

Threat Munition Intercept<br />

MFRFS Detection<br />

MFRFS Track<br />

HASC Prioritization<br />

SR/LRCM Fire Tick<br />

LRCM<br />

IRCM<br />

9<br />

149 m/s<br />

200 m/s<br />

135 m/s<br />

1<br />

Mobility<br />

Designation<br />

Guidance<br />

EFM Vulnerability<br />

8<br />

Max MFRFS Detection Range<br />

Mean Intercept Range (Launcher 3)<br />

0 20 40 60 80 100 120 140 160 180<br />

Range (m)<br />

8. EFM vulnerability assessed – Fragment Induced<br />

Detonation (FID)<br />

- Munition does not detonate<br />

9. Threat munition continues to flyout to the target<br />

10. MFRFS detects threat munition – model rejects<br />

successful detection when threat munition is less<br />

than 10 meters away from target<br />

18

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!