A methodology and instrumentation must be developed/defined to measure characteristics listed above (as a minimum) for secondary debris from weapon complete or partial burial. A means must be developed to quickly and accurately take this data and estimate the characteristics listed above for the secondary debris from weapon burial. The models must be developed/modified to account for these projectiles versus both targets and collateral concerns to support lethality, risk estimation, and collateral damage estimation.There may already be finite element tools available that can accurately predict and characterize the crater and wall debris, but these analytic tools run too slowly to be useful for the warfighter and most analysts; models simulating these detonations need to complete in a matter of seconds to a minute or two at most. To validate the accuracy of the new tools, debris data must be accurately and economically collected from live weapon tests and quickly reduced to be usable in models and weaponeering tools. Any software development will be written using good software development processes.
Finally, an implementation plan must be developed to address how the Joint Munitions Effectiveness Manual (JMEM) Weaponeering System (JWS) tools must be updated or redesigned to take this information into account so that the warfighter effectively targets while accounting for these effects.
PHASE I: The contractor will 1) define/quantify parameters to be collected, 2) design/propose collection instrumentation, 3) perform a preliminary design for all modeling efforts to estimate these parameters and the damage the secondary debris will do to targets and non-targets, 4) develop an implementation plan, and 5) deliver a final report.
PHASE II: The contractor will 1) build instrumentation suite, 2) generate software model(s) from the Phase I preliminary design, 3) update the implementation plan from Phase I, 4) collect sufficient data to validate the hardware/support software development, 5) compare the data collected to results from the software model(s), 5) after data collection, any modifications needed to the instrumentation suite will be corrected, and 6) deliver a final report.
PHASE III DUAL USE COMMERCIALIZATION:
Military Application: The contractor will 1) make modifications required from the results of Phase II for software and hardware, 2) deliver an instrumentation suite, 3) deliver the software model(s), 4) deliver a final implementation plan, and 5) deliver a final report.
Commercial Application: Commercialization potential exists for any application of buried explosives. An example would be hazard predictions for blasting to clear a path for roadways and railways.
REFERENCES:
1. M. M. Swisdak, Jr., J. W. Tatom, and C. A. Hoing, “Procedures for the Collection, Analysis and Interpretation of Explosion-Produced Debris – Revision 1,” Final Report, 22-10-2007.
2. X. Ma, Q. Zou, D. Z. Zhang, W. B. VanderHeyden, G. W. Wathugala, and T. K. Hassleman, “Application of an MPM-MFM Method for Simulating Weapon-Target Interaction,” LA-UR-05-5380, 12th International Symposium on Interaction of the Effects of Munitions with Structures, September 13-16, 2005, New Orleans, LA.
KEYWORDS: secondary debris, JWS, test instrumentation, lethality, risk estimation, collateral damage, bomb burial, buried explosives
AF121-098 TITLE: Guided Munition Delivery Accuracy Methodology for Weaponeering Against
Moving Targets (GuMDAM-AMT)
TECHNOLOGY AREAS: Weapons
Technology related to this topic is restricted under the International Traffic in Arms Regulation (ITAR) (DFARS 252.204-7009). As such, export-controlled data restrictions apply. Offerors must disclose any proposed use of foreign citizens, including country of origin, type of visa/work permit held, and the Statement of Work (SOW) tasks to be performed. In addition, this acquisition involves technology with military or space application. Therefore, only U.S. contractors registered and certified with the Defense Logistics Services Center (DLSC), Federal Center, Battle Creek MI 49017-3084, (800) 352-3572, are eligible for award. If selected, the firm must submit a copy of an approved DD Form 2345, Militarily Critical Technical Data Agreement.
OBJECTIVE: Develop software to enhance weaponeering assessments for guided munition attacks against moving targets.
DESCRIPTION: The US military employs the Joint Munitions Effectiveness Manual (JMEM) Weaponeering System (JWS) software to conduct weaponeering assessments for guided munition attacks against moving targets. Current methodologies for generating and assessing delivery accuracy within JWS are limited in that the software is capable of only pairing a single munition against multiple moving targets and then assessing the best results i.e. weapon-to-target pair. Ideally, a more effective methodology would pair all guided weapons of interest against all targets of interest, assess performance for all combinations, and statistically determine the best munition to attack a given moving target. There is a need to research and develop a methodology to assess multiple guided munitions against moving targets.
There are multiple delivery accuracy parameters associated with assessing a guided weapon against a moving target, therefore, there is a need to research, characterize, and quantify these parameters which will then be incorporated into the new methodology. Additionally, research would be necessary to define, characterize and classify a moving target dataset. Key parameters to consider but not limited to would be target mobility, target maneuverability, and Target Location Error (TLE), for all environmental conditions.
Due to the expansive and dynamic nature of the simulation world inside the Air Force, the expected employment strategy envisions software that is not tightly coupled with a specific simulation. It should be flexible so that models developed for one simulation architecture will be usable in another with minimal effort.
As a baseline, the JWS model may then be used to compare the effectiveness of various combinations of guided munition vs. moving target interactions. The resulting research and methodology will provide adequate information to determine the best Standard Conventional Loads (SCL) for the XCAS/XINT (On-call airborne Close Air Support/INTerdiction) arena for moving targets.
Finally, the resulting software module must incorporate a user interface that accommodates the non-expert without hampering the productivity of the dedicated expert. The non-expert should be able to create or adapt models to a specific simulation or scenario without in depth knowledge of the system. However, the frequent user should be able to create new weapon sets quickly and efficiently.
PHASE I: Research and define target sets, develop methodology and parameter requirements, construct roadmap and schedule for the development of the new methodology and data collection toolset. A final report will be delivered detailing the research results.
PHASE II: The contractor shall identify the affected modules in JWS. Using the approach from Phase I, they shall develop the methodology and determine all parameter data required for those modules. The contractor shall develop additional modules as required.
PHASE III DUAL USE COMMERCIALIZATION:
Military Application: Expand software to produce a weaponeering tool for assessing and optimizing guided munition and moving target pairing. A final report and briefing will be delivered.
Commercial Application: Demonstrate non-military uses of the resulting software in fields such as Homeland Security and border safety.
REFERENCES:
1. AAC/ENO, “Delivery Accuracy Working Group Roadmap for Modeling and Developing Delivery Accuracy Parameters For Munitions Attacking Moving Targets”, 6 Aug 2009
2. JWS 2.0.1.
KEYWORDS: Delivery accuracy, weaponeering ,sensors, maneuverability, mobility, moving target ,JTCG/ME, JWS
AF121-102 TITLE: Detection of Hostile Fire from the Remotely Piloted Aircraft (RPA)
TECHNOLOGY AREAS: Sensors
Technology related to this topic is restricted under the International Traffic in Arms Regulation (ITAR) (DFARS 252.204-7009). As such, export-controlled data restrictions apply. Offerors must disclose any proposed use of foreign citizens, including country of origin, type of visa/work permit held, and the Statement of Work (SOW) tasks to be performed. In addition, this acquisition involves technology with military or space application. Therefore, only U.S. contractors registered and certified with the Defense Logistics Services Center (DLSC), Federal Center, Battle Creek MI 49017-3084, (800) 352-3572, are eligible for award. If selected, the firm must submit a copy of an approved DD Form 2345, Militarily Critical Technical Data Agreement.
OBJECTIVE: Develop a lightweight RPA Wide Field of View (WFOV) sensor system to detect, classify, direction of discharge and geolocate weapons fire, with sufficient accuracy and timeliness to support both direct and indirect engagement.
DESCRIPTION: The Air Force has the mission to perform reconnaissance, surveillance, and target acquisition (RSTA) from RPAs. The challenge is to meet a large area of ground coverage in support of persistent Wide Field of View (WFOV) imaging motion detection sensor systems. WFOV imaging motion detection sensors are typically low frame rate (2-30 Frames/s) compared to a fire detection system (1000-1500 frames/s) and may miss weapon fire events. The goal of this effort is to provide an event (enemy and friendly weapons fire) detection system that can provide real-time notification that can be overlaid on WFOV motion imagery by sensor operators. Data to be provided to sensor operators is to include weapons class (i.e., rifle, mortar, RPG, and shoulder fire missile weapons), direction of fire, location/geocoordinates of fire or general explosive events, and high-heat events such as camp fires and building fires. This sensor must be designed such that it can detect from a minimum altitude of 25,000 feet under live fire captive carry test conditions on a benign battlefield.
Basic sensing technologies and signal processing subsystems must have reduced size, weight, and power (SWaP) for a hostile fire detection sensor on a current or near-term RPA platform to perform this mission. RPAs are becoming the primary platform for persistent battlefield surveillance. The requirement for extended time on station determines to a great extent the available weight allocation for any hostile fire sensor system. Future RPA hostile fire sensor systems will take the form of Line Replaceable Units for legacy sensor payloads currently in use on the RPA fleet; therefore, the SWaP consumption of hostile fire sensor systems must emulate that of previous generation sensor systems without hostile fire sensing capabilities.
The hostile fire sensor system must demonstrate the capability to operate with both low false alarm rates and relatively high probability of detection under operational conditions. The additional capability to perform threat geolocation in support of not only direct attack, but indirect attack, necessitate a close coupling between the sensor system and some form of inertial measurement capability either integral to the sensor or available as part of the mission flight package for the aerial platform. The feasibility of meeting various sensor performance metrics using trade-space analysis must be performed using sensor component characteristics and available field measurements of weapon signatures.
The determination of military utility of a hostile fire sensor will be heavily dependent on its capacity to distinguish between friendly and hostile fire in order to avoid fratricide. There are different levels of fidelity currently defined for hostile fire sensor systems; most systems currently differentiate among weapon classes, but lack a significant capability to confidently declare a weapon type within a class.
Modeling and analysis is required to show the efficacy of the approach for different classes of threat systems. The prototype design is expected to be heavier and less capable than an operational sensor, but the design should address SWaP traceability between the captive carry prototype and an ultimate operational configuration for the hostile fire sensor. A Phase I/Phase II activity involving high fidelity scene generation, hardware-in-the-loop simulation (HWIL), operational tower and flight testing is desired. The objective is to demonstrate the technology can provide greater than 99 percent false alarm rejection rate and greater than 95 percent detection rate for urban and battlefield small arms and large arms settings. The hostile fire sensor system should be self contained, with the exception of external power, to operate and collect performance data for both ground and air live fire demonstrations.
PHASE I: Design, model, and analyze components for a WFOV hostile fire sensor system for detection of different classes of threat systems. Laboratory demonstration of the critical technology components is desired.
PHASE II: Develop and demonstrate a prototype hostile fire RPA sensor system to support a WFOV live fire evaluation under benign battlefield conditions. Using methods which may include hardware in the loop, tower, and/or flight testing, demonstrate the technology provides greater than 99 percent false alarm rejection rate and greater than 95 percent detection rate for urban and battlefield small arms and large arms settings.
PHASE III DUAL USE COMMERCIALIZATION:
Military Application: This technology could support Army, Marines and Air Force airborne WFOV Motion Imagery Systems to include Constant Hawk, Gorgon Stare, Angel Fire, Night Stare, and Wide Area Airborne Surveillance systems.
Commercial Application: This capability can also have direct capability for use on police and emergency response aircraft. The sensor can provide geopostional data for high-heat source fires, and urban gun battles.
REFERENCES:
1. Signal-to-Solar Clutter Calculations of AK-47 Muzzle Flash at Various Spectral
Bandpass Near the Potassium D1/D2 Doublet by Karl K. Klett, Jr. ARL-RP-0292 June 2010. A reprint from SPIE Proceedings, Vol. 7697.
2. Michael V. Scanlon and William D. Ludwig, Sensor and information fusion for improved hostile fire situational awareness, Proc. SPIE 7693 Unattended Ground, Sea, and Air Sensor Technologies and Applications XII, Monday 5 April 2010, Orlando, Florida, USA.
3. L. Zhang; F. P. Pantuso; G. Jin; A. Mazurenko; M. Erdtmann; S. Radhakrishnan; J. Salerno High-speed uncooled MWIR hostile fire indication sensor, SPIE Proceedings Vol. 8012 Infrared Technology and Applications XXXVII, Bjørn F. Andresen; Gabor F. Fulop; Paul R. Norton, Editors, 801219, 20 May 2011.
4. S. A. Moroz et.al, Airborne Deployment of and Recent Improvements to the Viper Counter Sniper System, www.urf.com/madl/papers/Psc06ce3.pdf.
5. S. Snarski, et. al., Autonomous UAV-Based Mapping of Large-Scale Urban Firefights, SPIE Defense and Security Symposium Proceedings Vol. 6209, Airborne Intelligence, Surveillance, Reconnaissance (ISR) Systems and Applications III, Orlando, FL, 5 May 2006.
KEYWORDS: sensors, hostile fire detection, Remotely Piloted Aircraft, RPA, Muzzle Flashes, detection and location, InfraRed, IR, Sniper location
AF121-103 TITLE: Remotely Operated Sensor, Beacon, and Navigation Aid for Deep Battlespace
(Remote Sensing)
TECHNOLOGY AREAS: Sensors
Technology related to this topic is restricted under the International Traffic in Arms Regulation (ITAR) (DFARS 252.204-7009). As such, export-controlled data restrictions apply. Offerors must disclose any proposed use of foreign citizens, including country of origin, type of visa/work permit held, and the Statement of Work (SOW) tasks to be performed. In addition, this acquisition involves technology with military or space application. Therefore, only U.S. contractors registered and certified with the Defense Logistics Services Center (DLSC), Federal Center, Battle Creek MI 49017-3084, (800) 352-3572, are eligible for award. If selected, the firm must submit a copy of an approved DD Form 2345, Militarily Critical Technical Data Agreement.
OBJECTIVE: Research the feasibility of developing an expendable, precision deployable, remotely-operated sensor to detect meteorological conditions, vehicle/personnel mobility, and CBRN threats in denied territory.
DESCRIPTION: AFSOC dismounted operators need to clandestinely gather information/intelligence in denied territory to facilitate enroute mission planning, rehearsal, execution, and post mission debriefing. Operators lack modern sensors that can be inserted into denied territory with minimal human risk and be remotely operated to gather/transmit information back to mission planners or operators enroute to the objective. Sensors must be able to pass ground-oriented real-time information (i.e., meteorological data; chemical, biological, and radiological/nuclear [CBRN] threat; and freeze frame imagery) to collection platforms for immediate use. Many unattended ground sensor efforts have been recently conducted but most are too large and heavy for precision deployment from a small UAS platform.
As the operating environment hostility and inaccessibility increases, accomplishing the task of precision placement and removal of sensors, beacons, and navigational aids becomes more difficult; therefore, this SBIR should leverage small unmanned aerial systems for device placement. Previous generation sensors were air dropped, but without precision emplacement. Newer sensors have been parachute dropped, but precision emplacement is lacking. What is needed is precise location emplacement of sensors to within 3 meters of a specific monitoring point. The device also should be camouflaged, expendable, and have a minimal operating “signature” to avoid detection by adversaries. Methodologies within the current defense communication infrastructure for autonomous or polled electronic exfiltration of data and/or remote physical exfiltration of data should be addressed in this design concept. The device should have capabilities for signaling with EO/IR/RF precision location for use in GPS degraded environments.
Communication protocols consistent with Air Force Special Operations Network formats must be included, i.e., multicast UDP/uni-cast TCP and interoperability with the QNT radios. The device should have low energy consumption and be capable of autonomous operation and remote configuration for at least four weeks, but preferably longer, in various operating environments, e.g., high elevation, high heat and humidity, freezing temperatures, rain, etc.
PHASE I: In Phase I, the contractor will address system and sensor level concepts along with validating concepts for data storage and infiltration. Methods of carriage, ejection, safe landing, and auto-righting will be shown by analysis and demonstration. Power requirements and methods will be addressed for up to 4 weeks or longer operation.
PHASE II: The contractor will develop and test prototype sensors with self location and heading data, imagery, acoustic, weather, CBRNE and other data. Successful laboratory and field demonstration will be conducted showing precision emplacement of the sensor probe as launched from small and large UAS platforms. Data and physical exfiltration methods developed will also be demonstrated along with signature management and camouflage techniques.
PHASE III DUAL USE COMMERCIALIZATION:
Military Application: A wide variety of missions in remote and/or denied areas, performed not only by Air Force special operations forces, but also by other services. Potential applications exist in homeland defense monitoring.
Commercial Application: Particular utility in search and rescue missions in remote areas; border patrol; and counter-drug operations. Natural disaster (nuclear/chemical) monitoring in denied areas.
REFERENCES:
1. Correll, J.T., “Igloo White”, http://www.airforce-magazine.com/MagazineArchive/Pages/2004/November%202004/1104igloo.aspx, 2004.
2. AN/GSR-9/10 Unattended Ground Sensors (UGS), http://www.bctmod.army.mil/downloads/pdf/UGS_09-9075.pdf.
3. J. Heyer and L.C. Schuette, Tactical Electronic Warfare Division, Unattended Ground Sensor Network, http://www.nrl.navy.mil/research/nrl-review/2004/remote-sensing/heyer/.
4. U.S. Air Force Fact Sheet, IGLOO WHITE, http://www.nationalmuseum.af.mil/factsheets/factsheet_print.asp?fsID=13048&page=2.
5. Damian Toohey, Development of a Small Parafoil Vehicle for Precision Delivery, Massachusetts Institute of Technology, Thesis, http://dspace.mit.edu/bitstream/handle/1721.1/32457/61751396.pdf?sequence=1.
KEYWORDS: Unattended Ground Sensors, Beacon, Precision Air-Dropped, Sensors, Air Delivered Seismic Intrusion Detector, Acoustic and Seismic Intrusion Detector
AF121-104 TITLE: Feature Representations for Enhanced Multi-Agent Navigation Strategies
TECHNOLOGY AREAS: Information Systems, Sensors, Electronics
Technology related to this topic is restricted under the International Traffic in Arms Regulation (ITAR) (DFARS 252.204-7009). As such, export-controlled data restrictions apply. Offerors must disclose any proposed use of foreign citizens, including country of origin, type of visa/work permit held, and the Statement of Work (SOW) tasks to be performed. In addition, this acquisition involves technology with military or space application. Therefore, only U.S. contractors registered and certified with the Defense Logistics Services Center (DLSC), Federal Center, Battle Creek MI 49017-3084, (800) 352-3572, are eligible for award. If selected, the firm must submit a copy of an approved DD Form 2345, Militarily Critical Technical Data Agreement.
OBJECTIVE: Design, implement, and test novel feature representations in multi-agent autonomous mapping systems for enhanced navigation accuracy/reliability.
DESCRIPTION: Current environmental mapping techniques provide reasonable quality for navigating in traditional battlespace scenarios. However, given the increasing frequency of today’s military operations being conducted in asymmetric hostile environments, the need for more robust mapping methods has become apparent. Techniques capable of obtaining maps with enough fidelity as to aid current navigation methods, without reliance on a priori information, will serve to broaden the operational envelope that currently exists. Future systems will almost surely be required to have the capability to negotiate complex scenarios that are characteristic of the modern battlefield. A few of the more prominent characteristics include, but certainly not limited to, rapid environmental transitions (i.e., moving from indoors to outdoors), feature starved environments, densely cluttered environments, dynamic environments, and atypical feature shapes. The current explosion in multi-agent systems research has demonstrated the promise of such technology in addressing the mapping challenge. Multi-agent Simultaneous Localization and Mapping (MA-SLAM), in particular seems well suited for such a task. However, given that the available sensor suite will most likely be comprised of low-cost sensors, there will be some significant operating constraints that cannot be dismissed. Examples of the type of operating constraints mat include limited processing capabilities and constrained bandwidth requirements to name two. One way to negotiate these operational constraints is through the use of novel compact feature representations. Compact representation provide the benefit of requiring less bandwidth than full valued descriptions, and will require less memory for storage. Needless to say, mapping and feature descriptions will play a vital role in the ability to operate anywhere at any time. Multiagent systems, as defined here, are comprised of two or more sensor platforms capable of communicating and receiving environmental map data from other sensor platforms. The realized solution combining multiple agents, with innovative SLAM feature representation techniques will provide attractive capabilities in both military and civilian applications. Although the physical operating parameters of any prototype design such as, size, weight, and power requirements are of interest, they should not be the primary focus. Clearly, the smaller and more efficient any prototypes design is, the more attractive it may become. However, the technical thrust, and hence the primary source of innovation should reside in the compact feature representation and map sharing methodologies. NOTE: Any proposals submitted must be unclassified.
Share with your friends: |