Evaluating the Benefit of Networked EW Systems

Slides:



Advertisements
Similar presentations
Testing Relational Database
Advertisements

Combining Analysis strands in a Main Gate Submission.
NATO UNCLASSIFIED NIAG/SG-76: C2 Interoperability Slide 1HWP May 03 Battlespace Objects Hans Polzer 19 May 2003.
Sensors and location technologies – the front end of ISR
Gaia: A Middleware Platform for Active Spaces Summarized by Dongjoo Lee, IDS Lab., Seoul National University.
Integrated Systems Understanding using Bayesian Networks: Measuring the Effectiveness of a Weapon System Pretoria Defence, Peace, Safety & Security Alta.
Tadiran Electronic System A member of the Elisra Group Operates as a system House for: Intelligence & EW systems (Electronic Warfare) Spectrum Management.
1 CISR-consultancy Challenges “Customer ask us what to do next” Keywords: “Customer ask us what to do next” From Policy to Practise The world is going.
NATO Network Enabled Capabilities
Think. Learn. Succeed. Aura: An Architectural Framework for User Mobility in Ubiquitous Computing Environments Presented by: Ashirvad Naik April 20, 2010.
Empowering Staff Through Institute Planning (ESTIP) Executive Workshop Institute Name: XXXXXX Presenter: XXXXXX Date: XXXXXX.
1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious.
Tools and Services for the Long Term Preservation and Access of Digital Archives Joseph JaJa, Mike Smorul, and Sangchul Song Institute for Advanced Computer.
Defence spectrum use Changing technologies and applications CAPT Paul Scott, RAN Chief Information Officer Group Department of Defence.
Module 8: Monitoring SQL Server for Performance. Overview Why to Monitor SQL Server Performance Monitoring and Tuning Tools for Monitoring SQL Server.
November 2008 Michael Smith (SAIC) Steve Lockwood (PB Consult) NCHRP Project SP20-59 (17) CAPTA Costing Asset Protection: An All Hazards Guide for Transportation.
C4ISR via OA Mike Danjczek November, 2014 Copyright GTS 2014.
2009 M&S LEADERSHIP SUMMIT REGIONAL INITIATIVES IN MODELING & SIMULATION FAR WEST John Illgen Sector Director, Modeling & Simulation Northrop Grumman Information.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
NATO VIZ-N/X Custom Ontologies for Expanded Social Network Analysis Amy K. C. S. Vanderbilt, Ph.D. and J. Andrew Skene 4465 Brookfield Corporate Drive,
ACL: Introduction & Tutorial
Developing Business Practice –302LON Using data in your studies Unit: 5 Knowledgecast: 2.
Sluzek 142/MAPLD Development of a Reconfigurable Sensor Network for Intrusion Detection Andrzej Sluzek & Palaniappan Annamalai Intelligent Systems.
-UNCLASSIFIED- Missile Defense Exercise Planning Presented By: Mr. Ohad Elbahar Israel Missile Defense Organization May First Annual Israel Multinational.
Brigadier Peter Short – DGLD Land Environment Working Group.
Joint Dynamic Engagement Model JDEM 14 August 2008 Henry Neimeier.
Chapter 13 Architectural Design
UAS Combat Threat Survivability SURVICE Engineering Company
Page 1 WWRF Briefing WG2-br2 · Kellerer/Arbanowski · · 03/2005 · WWRF13, Korea Stefan Arbanowski, Olaf Droegehorn, Wolfgang.
Information Systems Engineering. Lecture Outline Information Systems Architecture Information System Architecture components Information Engineering Phases.
Event Log View and Sentry Event Log Management Copyright 2002 Engagent, Inc.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Engineering e-Business Applications for Security DISCUSSANT GERALD TRITES, FCA, CA*IT/CISA.
Framework for MDO Studies Amitay Isaacs Center for Aerospace System Design and Engineering IIT Bombay.
© Copyright 2009 All Rights Reserved 1 Measuring DLoD impacts in trials David Hathaway 26 th ISMOR.
Topics Covered: Software testing Software testing Levels of testing Levels of testing  Unit testing Unit testing Unit testing  Integration testing Integration.
K nowledge E ngineering, S oftware E ngineering, and M anagement ©Copyright KESEM International BattleModel: Simulation Based Decision Support Dr. Gil.
The use of scenarios to develop Concepts of Operation for unmanned vehicles 19 ISMOR 30th August Michael Tulip.
Assessing the Military Benefits of NEC Using a Generic Kill-Chain Approach David Nevell QinetiQ Malvern 21 ISMOR September 2004.
23 July 2003 PM-ITTS TSMOTSMO Information Assessment Test Tool (IATT) for IO/IW Briefing by: Darrell L Quarles Program Director U.S. Army Threat Systems.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Air Operations Research Branch. Objectives of AOR Branch To provide Effective Operational Analysis to ADF Air Assets in all Environments for: Capability.
PM UA Networks System Integration 2004 Combat Vehicles Conference
E VALUATING YOUR E - LEARNING COURSE LTU Workshop 11 March 2008.
Boeing-MIT Collaborative Time- Sensitive Targeting Project July 28, 2006 Stacey Scott, M. L. Cummings (PI) Humans and Automation Laboratory
JNTC Joint Management Office
Defence and Communications Systems © EADS 2006 – All rights reserved EADS Confidential page 1 SEC Intelligent urban environment observation.
Measure of System Effectiveness Missile Defense System By Alfred Terris UNCL:ASSIFIED1.
Lecture 3 : Hard Systems Modelling UFCE8V-20-3 Information Systems Development SHAPE Hong Kong 2010/11.
Fuego Core 2005/7 Possible Directions Kimmo Raatikainen Principal Scientist Helsinki Institute for Information Technology
MIT Lincoln Laboratory Dynamic Declarative Networking Exploiting Declarative Knowledge To Enable Energy Efficient Collaborative Sensing Daniel J. Van Hook.
Assessment without Levels. Assessment without levels What to assess?
Network Centric Planning ---- Campaign of Experimentation Program of Research IAMWG Dr. David S. Alberts September 2005.
Atos, Atos and fish symbol, Atos Origin and fish symbol, Atos Consulting, and the fish symbol itself are registered trademarks of Atos Origin SA. June.
FLTLT Matthew Murphy Growler Transition Office – Air Force Headquarters UNCLASSIFIED.
Simulation in Operational Research form Fine Details to System Analysis.
11 Copyright © 2009, Oracle. All rights reserved. Enhancing ETL Performance.
Self Healing and Dynamic Construction Framework:
Name of the idea Description and Military Application Maturity
DoD Architecture Tools, Commercial Tools
Name of the idea Description and Military Application Maturity
RCN presentation to 15th INET WG
UNCLASSIFIED MASA Sword UNCLASSIFIED.
13 November 2018.
Information Systems Analysis and Design
Counter UAV program within NATO Joint Capability Group on Ground Based Air Defence by Fred Klumpers (NLD-MoD) Chairman JCGGBAD NATO UNCLASSIFIED.
Electronic Warfare.
Bush/Rumsfeld Defense Priorities/Objectives A Mandate For Change
Optimising Capacity and Competence ISMOR August 2002
Matteo Merialdo RHEA Group Innovative aspects in cyber range solutions.
Presentation transcript:

Evaluating the Benefit of Networked EW Systems Greg Chalmers and Keith Mason

Networked EW for the ADF The focus of ADF EW procurements for many years has been on EW self protection as a last resort in missile defence. The 2009 Defence White Paper has put increased emphasis on networked operations, including EW operations. For example, the sharing of EW sensed information across force elements for situational awareness Evaluating the capability benefit of EW for networked operations is a very different activity to that of EW for platform self protection. DSTO has developed a methodology and analysis tool to evaluate the benefit of EW systems to support force level ADF operations. This methodology and tool provides a means of comparing EW technologies, force-mix options, and CONOPS to measure mission success.

OA Methodology 1. Define the problem 2. Develop analysis plan 3. Define Measures 4. Produce results 5. Analyse results 6. Prove the results 7. Communicate & document results

Force Level EW Synthetic Environment Analysis Tool Force Level EW Synthetic Environment FLEWSE Architecture

Modeling Infrastructure Analysis Tool - FLEWSE Modeling Infrastructure STAGE: COTS reconfigurable simulation framework for developing tactical synthetic environments. Includes simple platform, EW systems, sensor & weapons models CSMI (Combined Sensor Modeling Infrastructure): In-house developed EW sensor/effector models to enable computation of EW system performance Limitations: - Effects based modeling - Does not model detail of tactical engagements

Analysis Tool - FLEWSE OA Module Structure Data Extraction Analysis Relational Database (MySQL) STAGE/CSMI Executes individual simulation runs Simulation events Logged to database Selected data queried from database for sequence of runs POST PROCESSING TOOL Creates reports CONTROL (Stage Batch Runner) Controls a sequence of simulation runs Reports Data Extraction Analysis

How does it work: Hypothetical example Awareness of inbound air threats currently relies on radar surveillance. Could an EW sensor help? Ground Based ESM (GBESM) offers: Earlier warning than ground based radar Emitter type, platform type, intent Use OA methodology and tool to compare: Realistic ADF missions with current ADF capabilities Same missions with additional GBESM capability

Evaluation Process 1. Define the problem 2. Develop analysis plan 3. Define Measures 4. Produce results 5. Analyse results 6. Prove the results 7. Document results

Evaluation Process 1. Define the problem 2. Develop analysis plan 3. Define Measures 4. Produce results 5. Analyse results 6. Prove the results 7. Document results Liaise with RAAF and identify issue(s) requiring analysis: What is the threat? What is the effectiveness of current ADGE systems in detecting, locating and identifying threat systems, and how a GBESM may help Select a scenario as a context for the evaluation through elaboration of the RAAF and Adversary’s: Objectives ORBAT CONOPS Doctrine

Evaluation Process 1. Define the problem 2. Develop analysis plan 3. Define Measures 4. Produce results 5. Analyse results 6. Prove the results 7. Document results Define alternative options for analysis that will discriminate the issues under consideration: effectiveness of ADGE systems GBESM technologies Develop vignettes appropriate for studying each alternative in the context of the scenario

Evaluation Process 1. Define the problem Sensor Measures: 2. Develop analysis plan 3. Define Measures 4. Produce results 5. Analyse results 6. Prove the results 7. Document results Sensor Measures: Detection/ID range Time to detect/ID Number of entities detected Location error at first detect Location error at engagement Sensor settings Engagement Measures: Number of threats destroyed Number of RAAF units destroyed Loss Exchange Ratio

Evaluation Process 1. Define the problem 2. Develop analysis plan 3. Define Measures 4. Produce results 5. Analyse results 6. Prove the results 7. Document results Use FLEWSE to run through each alternative of the scenario a large number of times and log measures to file

Evaluation Process 1. Define the problem 2. Develop analysis plan 3. Define Measures 4. Produce results 5. Analyse results 6. Prove the results 7. Document results Compare the results for each alternative and evaluate effectiveness of AGDE systems Develop confidence measure over range of runs

Evaluation Process 1. Define the problem 2. Develop analysis plan 3. Define Measures 4. Produce results 5. Analyse results 6. Prove the results 7. Document results Undertake sensitivity analysis and prove statistical significance

Evaluation Process 1. Define the problem 2. Develop analysis plan 3. Define Measures 4. Produce results 5. Analyse results 6. Prove the results 7. Document results Brief client, write report

Summary The focus of ADF EW procurements for many years has been on EW self protection as a last resort in missile defence. The 2009 Defence White Paper has put increased emphasis on networked operations, including EW operations. For example, the sharing of EW sensed information across force elements for situational awareness Evaluating the capability benefit of EW for networked operations is a very different activity to that of EW for platform self protection. DSTO has developed a methodology to evaluate the benefit of EW systems to support force level ADF operations. This methodology ant tool provides a means of comparing EW technologies, force-mix options, and CONOPS to measure mission success.

QUESTIONS??