Randomized path optimization for the mitigated counter-detection of UAVs
Kutzer, Michael D.M.
MetadataShow full item record
UAVs provide exceptional capabilities and a myriad of potential mission sets, but the ability to disguise where the aircraft takes off and lands would expansively advance the abilities of UAVs. This thesis describes the development of a nonlinear estimation algorithm to predict the terminal location of an aircraft and a trajectory optimization strategy to mitigate the algorithm's success. Vehicle paths are generated using a matrix-based quadratic trajectory computation method. The paths are then tracked by recursively updating time-based observations of vehicle position using Bayesian filtering. The KL divergence is used to compare the probability density of aircraft termination to a normal distribution around the true terminal location. Results show that the optimal conditions to obfuscate path include waypoints at or beyond the vehicle terminal location, variations in velocity throughout the time of flight, and the minimal use of an aircraft's maximum potential time of flight.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Wodele, Ryan (Monterey, California: Naval Postgraduate School, 2013-12);Special Operations Air Mobility Vehicle (SOAMV) is the military term used to describe the Weight Shift Control (WSC) aircraft. The WSC aircraft is a type of Light-Sport aircraft that has certain characteristics that ...
Washington, Craig J. (Monterey, California. Naval Postgraduate School, 1996-06);Since 1991, the cost and schedule of the F-14 Tomcat Standard Depot Level Maintenance (SDLM) Program has doubled. Additionally, the requirements for In-Service Repair (ISR) have grown at a exponential rate as SDLM deferrals ...
Ricks, W. Alan (Monterey, California. Naval Postgraduate School, 1997-12);Since the U.S. does not have the largest military force in the world, it relies on force multipliers to achieve victory. One of these force multipliers is stealth technology. However, when stealth technology is used in ...