document - Simulation Australasia

Assessment of Ship Air Defence Performance
by Modelling and Simulation
Stephen J. Chapman and Kurt K. Benke
BAE SYSTEMS Australia
677 Victoria St
ABBOTSFORD VIC 3067
Keywords: Ship Air Defence Modelling, System Integration, Probability of Survival
ABSTRACT: Ship air defence performance is characterised by a complex interaction between the platform, detection
systems, airborne threats, countermeasures and environment. Air defence modelling is described in the context of
performance assessment of various system configurations with the objective of improving the probability of ship survival.
This paper describes a PC-based Ship Air Defence Model (SADM) developed by BAE SYSTEMS Australia, and used
within BAE SYSTEMS Australia and the Electronic Warfare Division of DSTO. The model includes soft-kill modelling
with active decoys, chaff, and jammers; hard-kill modelling with missiles, guns, and fire-control systems; and a
Command and Control System to assign targets and coordinate soft-kill and hard-kill responses. SADM also models the
interaction between the hard-kill and soft-kill systems deployed on the ship. Typical results are presented and it is shown
how the model can be used to perform hard-kill/soft-kill tradeoffs during the ship design process.
1. Performance Modelling
1.1
Introduction
Ship air defence modelling plays an important role in
the development of modern maritime tactics. A primary
concern in joint air/sea operations is the protection and
optimal deployment of expensive surface assets. The
increasing sophistication of threats, such as anti-ship
cruise missiles, suggests room for continuing model
development in order to identify the appropriate ship
fits, tactics, and countermeasures.
Prediction of ship self-defence performance is a
necessary input for the ongoing process of planning,
budgeting and weapons-fit evaluation for new ship
designs. Changing the configuration of existing weapon
systems and countermeasures also requires assessment
of potential performance under various combat
scenarios. Modelling and simulation represent a costeffective approach to the problem of performance
prediction and tactics assessment under a range of
possible conditions.
1.2
Motivations for Modelling
Assessment of ship air defence performance provides
a base-line for hard-kill/soft-kill options associated with
ship combat systems, quantifies performance and
identifies key system elements responsible, and aids in
the integration and optimisation of these elements [1].
Furthermore, the trade-off between performance and
cost can be investigated in a systematic and quantitative
manner.
The issue of system integration is covered by finding
the best combination of resources (e.g. radar, fire
control, soft-kill, hard-kill etc) that maximises a
measure of effectiveness, such as the probability of
survival. Various measures of effectiveness have been
studied and their relationship to systems analysis and
performance assessment documented [2,3]. In this
paper, we treat the problem from a systems viewpoint
and where necessary provide generic examples only,
due to the classified nature of some inputs.
In addition to finding the best combination of
resources to include on a ship, modelling is used to
derive optimal tactics for employing those resources
against specific threats.
An especially important
instance of this is the optimal coordination of the hardkill and soft-kill assets on a ship.
2. A Ship Air Defence Model
2.1 Model History
The Ship Air Defence Model (SADM) is a software
tool designed to simulate the defence of a single ship
against one or more attacking cruise missiles [4]. It
simulates soft-kill, hard-kill, and the interactions
between them. It is part of a family of tools, another
version of which models the defence of multiple ships
in a task group.
The model was derived from an Anti-Ship Capable
Missile Engagement Model, which was originally
developed by the Electronic Warfare Division (EWD)
of the Defence Science and Technology Organisation
(DSTO) in Australia.
The SADM program has been extensively developed
and enhanced compared to the capabilities of its
ancestral program. The front end of the SADM is
written in MATLAB, and the back end (the
computational core) is written in structured Fortran 95.
The front end provides a graphical user interface (GUI)
to enter scenario data and to display results, whilst the
back end performs the actual simulation of the missileship engagement. The front end provides the ability to
customise more than 250 individual ship, radar, ESM,
weapon, threat, and environmental parameters for each
scenario.
An important feature of the model is its ability to run
well on a standard desktop PC. It is able to produce
results in a timely fashion without requiring an
expensive hardware platform.
2.2 Model Function
The Ship Air Defence Model is a low-level ship,
threat, and countermeasure engagement simulation. The
basic cycle time of the model is the integration interval
of the threat missile seeker. A typical missile seeker
might have a PRF of 5000, with 100 pulses being
integrated before each track loop update, so the typical
update rate of the model is about 50 Hz.
At the beginning of each integration interval, the
positions of the ship and all other players (decoys, chaff
clouds, jammer, and hard-kill weapons) are updated. At
the end of the integration interval, the model calculates
the power contributions seen by each threat seeker from
all ship and countermeasure sources, and builds an
overall signal envelope. The seeker then performs range
and angle tracking on the signal, and the missile model
updates the threat missile position based on the range
and angle errors. This process is repeated until the
threat missile is either destroyed or reaches its closest
point of approach (CPA) to the ship. If the CPA is
within a user-defined ellipse centred on the ship, then
an intercept has occurred, and the missile is considered
to have made a kill. Otherwise, the missile has missed
the ship. The status of all sensors is updated once per
integration interval, with appropriate detections and
track updates supplied to the ship’s Command and
Control system at the proper rates for each type of
sensor.
The Command and Control (C2) System model
contains two principal components. The first portion of
the C2 system processes detections, target reports, etc.
on an interrupt-driven basis. This part of the C2 system
classifies threats, and performs immediate processing
such as the release of automatic countermeasures, if
appropriate. The second portion of the C2 system runs
at a fixed 1 Hz rate. This part of the C2 system works
with the Weapons Control System (WCS) to prioritise
the targets, and to produce an engagement schedule
describing the hard-kill and soft-kill assets used to
attack them. The engagement schedule can include both
hard-kill and soft-kill engagements.
Hard-kill weapons are launched at the times specified
by the C2/WCS, and their flyout models update at the
same 50 Hz rate as the threats. Weapon behaviour will
vary depending on the type of weapon. For missile
weapons such as ESSM, the flyout model consists of a
pitchover manoeuvre, followed by an inertial midcourse phase, and concluded by a terminal homing
phase using proportional navigation. The probability
that a weapon will kill a threat is determined by usersupplied PK tables, which are indexed by the range at
intercept and the manoeuvring capability of the threat.
The model includes a batch processing feature that
allows multiple sets of Monte Carlo simulations to be
defined and executed as a unit. Within a single batch
run, the following parameters may be adjusted: Threats
(number, starting ranges and angles); Decoys (launcher
number, speeds and flight offsets); Chaff (launcher
number, cloud range/angle, radar cross-section, and
jammer coordination); Fire Control Radars (number of
channels); Illuminators (number of channels, start time
and duration); and wind speed and direction.
More than 200 additional ship, threat, weapon, and
decoy parameters can be varied from batch to batch, but
they must remain fixed within a single batch run. All
model inputs are entered using the MATLAB graphical
user interface. When the SADM is started, a series of
input screens allow the user to specify the initial
conditions for either one run or a batch of runs. The
results of one or more runs can be displayed graphically
using the MATLAB front end.
2.3 Model Overview
The SADM model consists of the following cooperative
sub-models (see Figure 1):
• Ship Models:
Trajectory, motion (heave, pitch, roll), radar crosssection (time dependence and aspect angle), electronic
support measures (ESM), search radar detection and
tracking, infrared search and track (IRST), IFF model,
fire control radars, illuminators, command and control
/ weapons control systems (C2/WCS).
• Soft-Kill Models:
Decoy Models – trajectory, payload
Chaff Models – cloud trajectory, radar cross-section
Jammer Models – trajectory, payload response
• Hard-Kill Models:
Missile Models – Flyout models, probability of kill
CIWS Models – detection, kill performance
• Threat Models:
Threat Seeker Model - with range / angle tracking, etc
Threat Trajectory Model – supports both sea skimmers
and high divers
• Environment Models:
Sea state (wind speed and direction), signal
propagation (including effects of multipath, incoherent
scattering, shadowing etc), infrared atmospheric
propagation using LOWTRAN/MODTRAN results.
3.
Selected Component Sub-Models
This section provides more detail about a few of the
component sub-models within SADM. Space limitations prevent a more detailed discussion of the submodels contained within the program.
3.1
C2/WCS Model
The C2/WCS Model mimics the operation of a
Command and Control System / Weapons Control
System. This model interfaces with all of the sensor and
weapons systems on the ship. It implements the Threat
Evaluation and Weapons Assignment (TEWA) process.
Because the TEWA process varies dramatically from
ship class to ship class, the C2/WCS Model has been
structured as a separate dynamic link library (DLL) that
is plugged into the model at run-time. Since the C2/
WCS model is separate and independently compiled, it
is possible to create versions of the model containing
the TEWA for each ship class of interest, and then to
select the one to use for a particular run by selecting the
DLL to load at run-time.
The generic C2/WCS system supplied with the model
can be divided into two portions, an interrupt-driven
portion and a scheduled portion. The interrupt-driven
portion of the system executes in response to a message
from the outside world, such as a track update or an
ESM detection. This portion of the system updates the
appropriate track files, classifies the threat, and orders
immediate actions such as an IFF request or immediate
soft-kill countermeasures. The scheduled portion of the
system runs at a 1 Hz rate. This portion prioritises all
confirmed threats, and schedules hard-kill and soft-kill
assets to engage them.
A state diagram for targets in the C2 system is shown
in Figure 2. When a new threat detection is received, a
track is established for it and its state becomes
IN_TRACK. Each time that a track update occurs, the
track is evaluated to see if it meets the potential threat
criteria. If it does, the state becomes POTENTIAL_
THREAT. Then, the track is evaluated to see if meets
the confirmed threat criteria. If it does, the state
becomes CONFIRMED_THREAT. All confirmed
threats are prioritised, and an engagement schedule is
computed once per second. This schedule can include
both hard-kill and soft-kill assets. Each engagement in
the schedule is committed as the required resources
become available.
Kill assessment is performed after an engagement is
completed. If the kill assessment is positive, the state of
the threat changes to NO_TRACK. If the kill
assessment is negative, the sate of the threat reverts to
CONFIRMED_THREAT, and a new engagement is
planned. The criteria for potential threat evaluation,
confirmed threat evaluation, and hard-kill/soft-kill
coordination are all under user control.
3.2
Search Radar Model
The Search Radar Model supports conventional 2D
radars, conventional 3D radars, or phased array radars.
The user can control parameters such as field of view,
antenna height, sweep rate, resolutions, processing
modes (conventional, MTI, or MTD), and PD as a
function of target RCS and altitude. The starting
azimuth for a search radar is determined randomly
during each Monte Carlo trial. There can be up to two
search radars on a ship.
The model supports either 2D or 3D search radars. If
the radar is a 2D system, then only the x and y
components of target position are reported to the data
fusion engine and the C2 System, and fire-control radar
acquisition times will be increased.
The observations that the search radars send to the
data fusion engine are corrupted in range and angle by
noise. The standard deviation of each measurement is a
function of the range and angle resolution of the radar
divided by the square root of the signal-to-noise ratio.
The search radar models may optionally include
multipath and diffraction in their signal strength
calculations.
3.3
IRST Model
The Infrared Search and Track (IRST) Model has
four components: a Transmittance Model, a Fog
Transmittance Model, a Beam Spreading Model, and a
Target Detection Model.
The IR transmittance curves for standard aerosol and
fog atmospheres are derived from LOWTRAN
atmospheric code. The transmittance data set is
currently stored as a 4-D look-up table of regression
coefficients corresponding to the equation for the BeerLambert Law.
When the IRST looks at a given azimuth, the model
checks to see if any targets are present within the field
of view. If so, it calculates the incident IR energy at the
sensor by starting with the radiance of the target in
watts per steradian, and correcting for range and
atmospheric transmittance. Then, the received signal
strength is compared to a user-specified threshold to
determine if detection occurs.
Observations from the IRST are sent to the data
fusion engine, where they may be optionally used to
improve track quality.
3.4
Weapon Flyout Models
The Ship Air Defence Model is designed to support
up to six types of weapons, each with its own flyout
model. The flyout model is designed to mimic the
operation of a specific weapon, such as a point-defence
missile, and each model has behaviour appropriate to
the weapon it is modelling. For example, a flyout model
may have a pitchover manoeuvre, followed by an
inertial mid-course segment, followed by a proportional
navigation homing segment. These flyout models are
approximate, not full 6DOFs, so they can be used to
determine approximate missile position but not the
actual probability of kill Pk . The probability of kill is
determined by user-supplied Pk tables that are a
function of intercept range and the threat
manoeuvrability. Each flyout model is a separate
dynamic link library, so it is relatively easy to create
new flyout models for new types of weapon systems.
3.5
Threat Seeker Model
The Threat Seeker Model is a model of the missile
seeker’s radar system. It is a rather complicated model
with several discrete components. The major
components of the Threat Seeker Model are the Search
Mode Component, Range Track Component, Angle
Track Component, AGC Component, Loss-of-Lock
Component, and the Chaff Discrimination Component.
Threat seeker and trajectory parameters are set on the
GUI screen shown in Figure 3.
3.6
Threat Trajectory Model
The Threat Trajectory Model models the dynamics of
a representative threat missile that is capable of speeds
from Mach 0.8 to Mach 3.0. The dynamic constants of
the model are automatically adjusted for proper
behaviour depending on the user-specified missile
speed.
The model uses a proportional navigation law in
azimuth. It uses a height-keeping law in elevation
during cruise, and a constant-angle navigation law
during dives.
The inputs to the Threat Trajectory Model are the
smoothed azimuth and (optionally) elevation sightline
rates from the Threat Seeker Model, and height
measurement from the missile’s on-board altimeter.
4. Measures of Effectiveness
The principal measure of effectiveness for any ship
air defence system is the probability of ship survival PS
against a threat or a raid consisting of many threats.
The batch features of the SADM program permit a user
to vary the number, type, and characteristics of threats
in a raid, and see the effect on ship survivability.
Figure 4 shows a typical PS versus number of threats
plot for a subsonic raid against a ship with a 2D search
radar, two channels of fire, and generic semiactive
terminal homing missiles. Note that this plot was
created for the case of weaving subsonic threats and a
shoot-look-shoot fire policy.
Since the SADM model allows a user to easily
change radars, numbers of fire control channels, and
types of weapons, many batch runs can be created and
appropriate PS values can be calculated for each
configuration. The resulting data can be used in system
cost-versus-performance trade-offs.
Figure 5 shows a typical output that can be produced
from the model. It illustrates the effects of changing
search radar types, the number of fire control channels,
and the presence or absence of decoys on the ship PS
against generic weaving subsonic and supersonic
threats. These results are for a ship having only
medium-range semi-active terminal homing missiles
and active decoys. In this case, the ship did not have a
close-in weapons system or short-range point-defence
missiles.
Another use of the model is to optimise self-defence
tactics for maximum PS against a given threat once a
ship configuration has been established. The SADM
model allows a user to modify weapon mixes and fire
policy, providing the PS , the number of rounds
expended, and the cost of the expendables for each
engagement. These output permit a user to optimise
tactics for maximum PS , for maximum time on station,
or even (beware the bean counters!) for minimum cost.
Finally, the model permits a user to explore the
interaction between hard-kill and soft-kill systems, and
to determine how to employ the two complementary
systems together in an optimal manner.
5. Summary and Conclusion
Computer modelling represents a cost-effective
approach to the problem of performance prediction and
tactics assessment under a range of conditions for predefined threat scenarios. A salient feature of the SADM
program is that the modelling process captures the
interaction among the naval platform, surveillance
systems, airborne threats, countermeasures, and the
environment in a low-cost PC-based simulation.
The SADM program provides a tool for supporting
studies in system integration for new or existing ships,
tactics evaluation, countermeasures coordination, and as
a training aid for operators of naval combat systems. It
provides an analytic tool for comparative trials of naval
platforms. Optimisation of ship air defence against
anticipated or future threats is an application where
computer modelling is the only recourse [1,2]. Threat
simulation also leads to the assessment of the most
appropriate tactics for ship defence and survival based
on soft-kill, hard-kill or a combination of both.
6. References
1.
2.
3.
4.
Polk, J., McCants, T. and Grabarek, R., Ship SelfDefense Performance Assessment Methodology,
Naval Engineers J., 209-219, May (1994).
Carling, R.L., A Knowledge-Base System for the
Threat Evaluation and Weapon Assignment
Process, Naval Engineers J., 31-41, Jan. (1993).
Rains, D.A., Methods for Ship Military
Effectiveness Analysis, Naval Engineers J., 127135, March (1994).
Chapman, S.J., A Brief Introduction to the Ship Air
Defence Model, British Aerospace Australia,
Abbotsford, VIC, Australia (1998).
7. Author Biographies
Stephen Chapman is Manager of Technical Systems
and a senior radar engineer at BAE SYSTEMS
Australia (Missiles and Decoys). He has extensive
experience in modelling and simulation of air defence
systems. Mr. Chapman’s experience has included 10
years of radar research at Massachusetts Institute of
Technology Lincoln Laboratory, Lexington, MA, USA,
plus 3 years of seismic signal processing research at
Shell Development Laboratory in Houston, TX, USA.
Kurt Benke is a senior systems analyst with BAE
SYSTEMS Australia. His project experience includes
air defence modelling, infrared search and tracking
(IRST), IR atmospheric propagation, ship trajectory
kinematics and mapping in littoral warfare
applications.
Ship Models
IRST Model
Search Radar
Model
Threat Models
Data Fusion
Model
Threat
Trajectory
Model
IFF Model
Fire Control
Radar Model
Threat Seeker
Model
Illuminator
Model
C2/WCS
Chaff Models
Ship ESM
Model
Decoy Models
Jammer
Models
Weapon Flyout
Models
Wind Model
Ship Trajectory
Model
CIWS Model
Ship Motion
Model
Ship RCS
Model
Figure 1. Major relationships among component models. Arrows show the directions of data flow among the
models.
Potential
Threat
t
rea
Th
tial tion
n
e
a
t
Po valu
E
Con
firm
Eva ed Th
r
lua
tion eat
Confirmed
Threat
sm
en
t
As
se
ss
m
en
itm
mm e
Co Tim
en
t
t
Su
cc
e
Pl ssf
an ul
Rep
lan
Ne
ga
tiv
e
Ki
ll
at 1
As
se
s
Ta
Det rget
ect
ed
Ki
ll
Plan Engagement
Engagement
Planned
Engaging
Figure 2.
Target state diagram for the generic C2/WCS System.
to
le
ab n
Un Pla
No Track
Po
si
tiv
e
s in
terv
als
In Track
NonEngagable
Figure 3. The Threat Data Screen. This is a typical input data screen for the SADM model.
Figure 4. A typical Scenario Summary Screen illustrating PS versus raid size. This output screen allows a user
to plot any two variables in a batch of runs versus each other.
Scenario A
(subsonic threat)
Radar F + 3 FCS + Decoys
Radar E + 3 FCS + Decoys
Radar D + 3 FCS + Decoys
Radar C + 3 FCS + Decoys
Radar B + 3 FCS + Decoys
Radar A + 3 FCS + Decoys
Radar F + 3FCS
Radar F + 2 FCS
Radar E + 3 FCS
Radar E + 2 FCS
Radar D + 3 FCS
Radar D + 2 FCS
Radar C + 3 FCS
Radar C + 2 FCS
Radar B + 3 FCS
Radar B + 2 FCS
100
P s (%)
80
60
40
20
0
1
3
5
Radar A + 3 FCS
7
9
Radar A + 2 FCS
11
13
15
Number of Threats
Figure 5a.
Probability of survival PS versus number of threats for Scenario A (weaving subsonic cruise missiles).
The value PS is plotted versus the number of threats for different combinations of specified radars, fire
control systems and decoys.
Scenario B
(supersonic threat)
Radar F + 3 FCS + Decoy
Radar E + 3 FCS + Decoy
Radar D + 3 FCS + Decoy
Radar C + 3 FCS + Decoy
Radar B + 3 FCS + Decoy
Radar A + 3 FCS + Decoy
Radar F + 3 FCS
Radar F + 2 FCS
Radar E + 3 FCS
P s (%)
Radar E + 2 FCS
Radar D + 3 FCS
Radar D + 2 FCS
100
Radar C + 3 FCS
80
Radar C + 2 FCS
60
Radar B + 3 FCS
40
Radar B + 2 FCS
20
Radar A + 3 FCS
0
1
Figure 5b.
Radar A + 2 FCS
3
5
7
Number of
Threats
Probability of survival PS versus number of threats for Scenario B (weaving supersonic cruise
missiles). The value PS is plotted versus the number of threats for different combinations of specified
radars, fire control systems and decoys.