Search for a stealthy flight path through a hostile radar defense network
Leary, John J.
Rasmussen, Craig W.
MetadataShow full item record
This thesis develops a method for quickly selecting a good flight path for an aircraft flying from its base to its mission objective when the flight path must be over a geographic area containing hostile radar installations. Several models are developed in detail and then integrated permitting a shortest path algorithm to be used to find a route from a starting location to a goal that approximately minimizes probability of detection. Fuel, time and distance constraints are incorporated indirectly, but one strong assumption is made: Detections are assumed independent across network edges and among different radars. A test program is written in FORTRAN and run on a desktop PC using a battery of tests to validate the model. Problems designed with predictable paths having zero probability of detection are solved in a few hundred or thousand seconds for the predicted, optimal paths. Results on problems having non-zero probabilities of detection are less conclusive, but indicate that the method has promise. Errors due to computations and assumptions, as well as their bounds, are discussed, as are recommendations for further model development.
Showing items related by title, author, creator and subject.
Cheng, Chun Chieh (Monterey, California: Naval Postgraduate School, 2016-09);The Brownian bridge movement model (BBMM) models target movement between two known points as a Brownian bridge. This thesis extended the BBMM to account for multiple starting and ending points and to account for intelligence ...
Developing an operational and tactical methodology for Incorporating existing technologies to produce the highest Probability of detecting an individual wearing an IED Minukas, Michael (Monterey, California. Naval Postgraduate School, 2010-06);Among the many weapons currently used by terrorist organizations against public welfare and coalition forces in Iraq and Afghanistan, human-born Improvised Explosive Devices (IEDs) present a significant threat. Commonly ...
Dikmen, Iskender (Monterey, California. Naval Postgraduate School, 2006-03);Improvements in technology have enabled the development of cost-effective, low-power, multifunctional wireless sensor nodes, which are used in various applications including surveillance and intrusion detection. We have ...