Author : U. S. Military
Publisher : Independently Published
ISBN 13 : 9781718003606
Total Pages : 80 pages
Book Rating : 4.0/5 (36 download)
Book Synopsis Drone Defense System Architecture for U.S. Navy Strategic Facilities - Systems Engineering Capstone Project Report - Threat from Commercially Availabl by : U. S. Military
Download or read book Drone Defense System Architecture for U.S. Navy Strategic Facilities - Systems Engineering Capstone Project Report - Threat from Commercially Availabl written by U. S. Military and published by Independently Published. This book was released on 2018-07-31 with total page 80 pages. Available in PDF, EPUB and Kindle. Book excerpt: Small, commercially available unmanned aerial systems (UAS) are an emergent threat to Navy continental U.S. (CONUS) military facilities. There are many counter unmanned aerial system (C-UAS) tools focused on neutralization, and many sensors in place. A system-of-systems, defense-in-depth approach to C-UAS requires a central system to connect these new and existing systems. The central system uses data fusion and threat evaluation and weapons assignment (TEWA) to properly address threats. This report follows a systems engineering process to develop a software architecture for that central system, beginning with a requirements analysis, a functional baseline, and the resulting module allocation. A series of simulations in ExtendSim derives the performance requirements by examining the overall C-UAS scenario with currently available technology. Through a sensitivity analysis, the simulation shows that effective engagement range (combination of initial target range, detection range and neutralization range) is the dominant factor driving response time. The architecture modeled in Innoslate provides a discrete event simulation for system performance expectations. I. INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. SCOPE * D. SYSTEMS ENGINEERING PROCESS * E. SUMMARY * II. CONCEPT REFINEMENT * A. REQUIREMENTS ANALYSIS * B. STAKEHOLDER REQUIREMENTS ANALYSIS * C. CONCEPT OF OPERATIONS * D. CONSTRAINTS * E. SYSTEM FIELDING * F. SUMMARY * III. PRELIMINARY DESIGN * A. ARCHITECTURE DESIGN * B. FUNCTIONAL ALLOCATION * 1. Fuse Data * 2. Assess Threat * 3. Provide Decision Support * C. REQUIREMENTS ALLOCATION * IV. DETAILED DESIGN * A. MODULE ALLOCATION * 1. Data Fusion * 2. Threat Assessment * 3. Decision Support * B. INTERFACES * 1. External Interfaces * 2. Subsystem Interfaces * C. SYSTEM VERIFICATION AND VALIDATION * 1. Sensitivity Analysis * 2. Determination of Effect for Human-in-the-Loop * 3. Probability of Kill versus Target Initial Range * V. CONCLUSIONS AND FUTURE WORK * A. FUTURE WORK * B. CONCLUSION