Embodiments of the present disclosure relate generally to methods and apparatuses for engagement management relative to a threat and, more particularly, to aerial interception of aerial threats.
Rocket-propelled grenades (RPGs) and other human carried projectiles such as man-portable air-defense systems (MANPADS or MPADS) and shoulder-launched surface-to-air missiles (SAMs) represent serious threats to mobile land and aerial platforms. Even inexperienced RPG operators can engage a stationary target effectively from 150-300 meters, while experienced users could kill a target at up to 500 meters, and moving targets at 300 meters. One known way of protecting a platform against RPGs is often referred to as active protection and generally causes explosion or discharge of a warhead on the RPG at a safe distance away from the threatened platform. Other known protection approaches against RPGs and short-range missiles are more passive and generally employ fitting the platform to be protected with armor (e.g., reactive armor, hybrid armor or slat armor).
Active protection systems (APS) have been proposed for ground vehicles for defense against RPGs and other rocket fired devices with a good success rate for quite some time. However, these systems are proposed to protect vehicles that are: 1) armored, 2) can carry heavy loads, and 3) have plenty of available space for incorporation of large critical systems. Currently these systems can weigh anywhere between 300 to 3000 lbs. and can protect the vehicle when intercepting incoming threats as close as 5 to 10 ft.
There is a need in the art for engagement management systems that can work in cooperation with intercept vehicles to engage and destroy aerial threats. There is also a need for such systems to be portable and lightweight enough for carrying on aerial and other mobile platforms that may have significant weight and size constraints, or on which an active protection system may be easily installed. There is also a need for such systems to coordinate with multiple engagements of aerial threats, intercept vehicles, and other nearby engagement management systems.
In the following description, reference is made to the accompanying drawings in which is shown, by way of illustration, specific embodiments of the present disclosure. The embodiments are intended to describe aspects of the disclosure in sufficient detail to enable those skilled in the art to practice the invention. Other embodiments may be utilized and changes may be made without departing from the scope of the disclosure. The following detailed description is not to be taken in a limiting sense, and the scope of the present invention is defined only by the appended claims.
Furthermore, specific implementations shown and described are only examples and should not be construed as the only way to implement or partition the present disclosure into functional elements unless specified otherwise herein. It will be readily apparent to one of ordinary skill in the art that the various embodiments of the present disclosure may be practiced by numerous other partitioning solutions.
In the following description, elements, circuits, and functions may be shown in block diagram form in order not to obscure the present disclosure in unnecessary detail. Additionally, block definitions and partitioning of logic between various blocks is exemplary of a specific implementation. It will be readily apparent to one of ordinary skill in the art that the present disclosure may be practiced by numerous other partitioning solutions. Those of ordinary skill in the art would understand that information and signals may be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information, signals, bits, symbols, and chips that may be referenced throughout the description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof. Some drawings may illustrate signals as a single signal for clarity of presentation and description. It will be understood by a person of ordinary skill in the art that the signal may represent a bus of signals, wherein the bus may have a variety of bit widths and the present disclosure may be implemented on any number of data signals including a single data signal.
The various illustrative logical blocks, modules, and circuits described in connection with the embodiments disclosed herein may be implemented or performed with a general-purpose processor, a special-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A general-purpose processor may be considered a special-purpose processor while the general-purpose processor is configured to execute instructions (e.g., software code) stored on a computer-readable medium. A processor may also be implemented as a combination of computing devices, such as a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
In addition, it is noted that the embodiments may be described in terms of a process that may be depicted as a flowchart, a flow diagram, a structure diagram, or a block diagram. Although a process may describe operational acts as a sequential process, many of these acts can be performed in another sequence, in parallel, or substantially concurrently. In addition, the order of the acts may be rearranged.
Elements described herein may include multiple instances of the same element. These elements may be generically indicated by a numerical designator (e.g., 110) and specifically indicated by the numerical indicator followed by an alphabetic designator (e.g., 110A) or a numeric indicator preceded by a “dash” (e.g., 110-1). For ease of following the description, for the most part, element number indicators begin with the number of the drawing on which the elements are introduced or most fully discussed. For example, where feasible, elements in
It should be understood that any reference to an element herein using a designation such as “first,” “second,” and so forth does not limit the quantity or order of those elements, unless such limitation is explicitly stated. Rather, these designations may be used herein as a convenient method of distinguishing between two or more elements or instances of an element. Thus, a reference to first and second elements does not mean that only two elements may be employed or that the first element must precede the second element in some manner. In addition, unless stated otherwise, a set of elements may comprise one or more elements.
Embodiments of the present disclosure include apparatuses and methods for providing protection for mobile platforms, such as, for example, a helicopter, from an aerial threat. Some embodiments of the present disclosure may include methods and apparatuses that are portable and lightweight enough for carrying on aerial platforms that may have significant weight and size constraints. Some embodiments of the present disclosure may include methods and apparatuses that can be incorporated into existing systems already installed on aerial platforms.
As used herein, “aerial threat” or “threat” are used interchangeably to refer to any threat directed toward a mobile platform, including projectiles, rockets, and missiles that may be shoulder launched or launched from other platforms. As non-limiting examples, such aerial threats include rocket-propelled grenades (RPGs), man-portable air-defense systems (MANPADS or MPADS), shoulder-launched surface-to-air missiles (SAMs), tube-launched, optically tracked, wire-guided missiles (TOWs), and other aerial weapons, having a trajectory and ordnance such that they may cause damage to the mobile platform.
The term “aerial platform” includes, but is not limited to, platforms such as helicopters, unmanned airborne vehicles (UAVs), remotely piloted vehicles (RPVs), light aircraft, hovering platforms, and low speed traveling platforms. The protection systems and methods of the present disclosure are particularly useful for protecting aerial platforms against many kinds of aerial threats.
While embodiments of the present disclosure may be particularly suitable for use on aerial platforms 100 due to the small size and weight, they may also be used in other types of mobile platforms like ground-based mobile platforms such as, for example, tanks, armored personnel carriers, personnel carriers (e.g., Humvee and Stryker vehicles) and other mobile platforms capable of bearing embodiments of the present disclosure. Moreover, embodiments of the present disclosure may be used for relatively stationary ground-based personnel protection wherein a mobile platform may not be involved. Accordingly, embodiments of the disclosure are not limited to aerial applications.
While some embodiments of the eject vehicle 400 may be configured to be disposed in an AN/ALE-47, other types of dispensers 200 or other types of carriers for the eject vehicle 400 may also be used. Moreover, the tubular dispenser 210 is illustrated with a circular cross section. However, other cross sections may be used, such as, for example, square, hexagonal, or octagonal.
Two AN/ALE-47 dispensers (200A and 200B) are positioned on outboard sides of the helicopter frame 300, each of which may contain one or more eject vehicles 400. As shown in
According to one or more embodiments of the present disclosure four radar modules (900A, 900B, 900C, and 900D) are included to augment and connect with the AAR-47s and communicate with the eject vehicles 400. These radar modules 900 (see
The control processors, such as the central processor 360, the MAWSs 320, the radar modules 900, the sequencers 350, and the dispensers 200 may be configured to form an ad hoc network and include the eject vehicles 400.
The specific example of
When embodiments of the present disclosure are used as illustrated in
In order to satisfy the helicopter platform constraints, embodiments of the present disclosure address many significant technology areas:
To address these technology areas, some embodiments of the present disclosure include an active kinetic countermeasure projectile (i.e., the eject vehicle 400 of
When referring to the radar module 900 herein (e.g., as shown in
The radar modules 900 may be configured as pulse Doppler radar modules 900 to scan the azimuth plane and the elevation plane using two orthogonal fan beams and may be configured to cover a 90-degree sector in about 20 milliseconds. Upon detecting an incoming aerial threat 120, the associated radar module 900 may then direct the launch and guidance of an eject vehicle 400 from an AN/ALE-47 dispenser 200 that covers that sector. The eject vehicle 400 may be command guided to the target by the radar module 900 and command detonated. The radar modules 900 may be configured as an addition to the existing AN/AAR-47 system and may use its existing interface for launching of the eject vehicle 400.
Some of the embodiments of the present disclosure may be configured to deploy an eject vehicle 400 that fits in a standard dispenser 200 but could be stabilized and pointed towards the threat after launch, in less than about 50 milliseconds, in the rotor downwash of a helicopter, and when ejected in the fixed direction dictated by the dispenser 200. The radar modules 900 may then guide the eject vehicle 400 to accurately intercept the aerial threat 120 within about 330 milliseconds and thus reduce the requirement of carrying a large warhead.
The eject vehicle 400 includes an ejection piston 780 configured to transmit the energy of an impulse cartridge 750 (described below in connection with
A rocket motor 420 may be used to propel the eject vehicle 400 toward the aerial threat 120 after the eject vehicle 400 has been rotated such that a longitudinal axis of the eject vehicle 400 is pointed in the general direction of the aerial threat 120. A first set of folding fins 482 may be attached to the rocket motor 420 and configured to deploy once the eject vehicle 400 has exited the dispenser 200. The folding fins 482 are small and configured to provide stability to the eject vehicle 400 during its flight path rather than as control surfaces for directing the fight path.
An airframe shell 430 may be configured to contain a warhead 440, a divert thruster module 610, a nose thruster module 620 (may also be referred to herein as an alignment thruster module 620), an electronics module 450, and a battery 452. An airframe nose 490 may be configured to attach to the airframe shell 430 to protect the electronics module 450 and provide a somewhat aerodynamic nose for the eject vehicle 400.
A safe and arm module 460 may be included within the airframe shell 430 and configured to safely arm the warhead 440 when the eject vehicle 400 is a safe distance away from the aerial platform 100.
Stage 2, in
Stage 3, in
In addition, after the rocket motor 420 is detached, one or more corner reflectors 470 are exposed. The corner reflector 470 may be configured with sharp angles to enhance radar detection of the eject vehicle 400 by a radar module 900 on the aerial platform 100. For example, the corner reflector 470 may be configured as an interior angle of a small cube shape, which will enhance radar detection.
Returning to
The divert thruster module 610 is positioned substantially near a center of mass of the terminal vehicle and is used to laterally divert the terminal vehicle from its current flight path to make minor corrections to the flight path in order to more accurately intercept the aerial threat 120. The terminal vehicle may be referred to herein as the eject vehicle 400 and it should be understood what is being referred to based on the context of the discussion.
The warhead 440 may be command detonated when the radar module 900 on the aerial platform 100 determines that the eject vehicle 400 has reached the closest point of approach (nominally about 15 cm). The use of thrusters, provide the fast reaction times that may be needed to intercept the aerial threat 120 at a nominal distance of about 50 meters when the aerial threat 120 is launched from a range of about 100 meters.
A power signal 740 and a ground signal 730 may run along or through the cartridge to an antenna spring contact 745 and a ground spring contact 735, respectively. The ground spring contact 735 is configured to flexibly couple with a ground patch 738 on the eject vehicle 400 to provide a ground for the eject vehicle 400 electronics while the eject vehicle 400 is in the cartridge 710. The antenna spring contact 745 is configured to flexibly couple with the antenna 890 on the eject vehicle 400 and a power signal on the eject vehicle 400 to provide power and direct communication for the eject vehicle 400 electronics while the eject vehicle 400 is in the cartridge 710. The cartridge 710 may include a cartridge antenna 760 that may be coupled to the antenna 890 of the eject vehicle 400 by the antenna spring contact 745. Thus, the eject vehicle 400 may communicate wirelessly 795 with electronics onboard the aerial platform 100 through the antenna 890 on the eject vehicle 400 or through the cartridge antenna 760.
One or more antennas 890 may be configured to provide a communication link with electronics (e.g., the radar module 900) onboard the aerial platform 100. As non-limiting examples, the communication link may be configured using Wi-Fi or WiMAX frequencies and protocols. A diversity combiner 880 may be used to combine signals from multiple antennas.
A communication transceiver 870 (e.g., a Wi-Fi transceiver) may be coupled to the diversity combiner 880 and be configured to transmit and receive frequencies to and from the diversity combiner 880. A communication modem 860 (e.g., a Wi-Fi modem) may be coupled to the communication transceiver 870 and be configured to package and modulate communication information for communication transmission as well as demodulate and extract information from communication reception. The microcontroller 810 receives information from the communication modem 860 and may perform operations related to the received information. In addition, based on processes performed on the microcontroller 810, information may be sent to the communication modem 860 for transmission through the one or more antennas 890.
The microcontroller 810 may be coupled to a thrust controller 830, which interfaces with the alignment thrusters 622 and the divert thrusters 612 (
A roll sensor 850 and a vertical reference 855 may be used in combination to determine the attitude of the eject vehicle 400 as well as a spin rate and spin position of the eject vehicle 400 and communicate such information to the microcontroller 810. Other types of sensors, such as, for example, accelerometers and magnetometers may also be used for this purpose.
The azimuth scan radar antenna 920 is included in an azimuth radar subsystem, which includes a diplexer 922 for combining radar sent and reflected radar received. A radio frequency (RF) up/down converter 925 converts the radar frequencies sent from a digital synthesizer 930 and converts the radar frequencies received for use by a digital receiver 935.
The elevation scan radar antenna 940 is included in an elevation radar subsystem similar to the azimuth radar subsystem, but configured for the elevation direction. The elevation radar subsystem includes a diplexer 942 for combining radar sent and reflected radar received. A radio frequency (RF) up/down converter 945 converts the radar frequencies sent from a digital synthesizer 950 and converts the radar frequencies received for use by a digital receiver 955.
The wireless communication link antenna 960 may be configured to provide a communication link with electronics onboard the eject vehicle 400. As non-limiting examples, the communication link may be configured using Wi-Fi or WiMAX frequencies and protocols. A wireless communication subsystem includes a communication transceiver 965 (e.g., a Wi-Fi transceiver) coupled to the wireless communication link antenna 960 and configured to transmit and receive frequencies to and from the antenna 960. A communication modem 970 (e.g., a Wi-Fi modem) may be coupled to the communication transceiver 965 and be configured to package and modulate communication information for communication transmission as well as demodulate and extract information from communication reception.
A sector processor 910 communicates with the elevation radar subsystem, the azimuth radar subsystem, and the wireless communication subsystem. The sector processor 910 may communicate helicopter navigation information 912 from other electronics on the aerial platform 100. Referring also to
The sector processor 910 in combination with the radar subsystems can detect and track incoming aerial threats 120 (e.g., RPGs). Based on the tracking of the incoming aerial threat 120, and in combination with navigation information from the aerial platform 100, the sector processor 910 can extrapolate to a geo-location of the attacker 110, from where the aerial threat 120 was launched. The aerial platform 100 may act on this geo-location or transmit the geo-location to other aerial platforms or ground-based platforms for follow-up actions.
The sector processor 910 may be configured to send launch commands to the dispenser 200 on communication signal 914 to launch one or more eject vehicles 400 to intercept one or more detected aerial threats 120. The sector processor 910 may also calculate required pitch adjustments that should be performed by the eject vehicle 400 after it has been ejected and is safely away from the aerial platform 100.
Once the eject vehicle 400 is launched, the sector processor 910 may be configured to track the eject vehicle 400 and send guidance commands (i.e., divert commands) to the eject vehicle 400 so the eject vehicle 400 can perform divert maneuvers to adjust its flight path toward the aerial threat 120. The sector processor 910 may also be configured to determine when the eject vehicle 400 will be near enough to the aerial threat 120 to destroy the aerial threat 120 by detonation of the warhead 440 on the eject vehicle 400. Thus, a detonation command may be sent to the eject vehicle 400 instructing it to detonate, or instructing it to detonate at a detonation time after receiving the command.
Referring to
Operation block 1212 indicates that continuous radar scans are performed looking for incoming aerial threats. Decision block 1214 indicates that the process loops until a target is detected. While not shown, during this phase the radar modules 900 may also be detecting distance and angle to wingman platforms (i.e., other aerial platforms) in the vicinity. Using communication between the various wingman platforms, sectors of responsibility can be identified as discussed more fully below in connection with
If a target is detected, the process 1200 enters the pre-launch phase 1220. Operation block 1222 indicates that the sector processor 910 uses the range and travel direction of the incoming aerial threat 120 to calculate a threat direction to the incoming aerial threat 120 and an intercept vector pointing from a deployed eject vehicle 400 to a projected intercept point where the eject vehicle 400 would intercept the incoming aerial threat 120. Operation block 1224 indicates that the intercept vector is sent to the eject vehicle 400. The intercept vector may be sent to the eject vehicle 400 in a number of forms. The actual directional coordinates may be sent and the eject vehicle 400 would be responsible for determining the proper pitch maneuvers to perform. Alternatively, the sector processor 910 may determine the proper pitch maneuvers that the eject vehicle 400 should perform after launch and send only pitch commands (e.g., start and burn times for each alignment thruster 622) to be used during the pitch maneuvers. While
During the acquisition phase 1210 and pre-launch phase 1220, the eject vehicle 400 remains in the dispenser 200 and connected to power. An RF communication link may be in operation through the eject vehicle 400 antenna via a transmission line inside the dispenser 200.
The process enters the align and launch phase 1240 after the intercept vector is determined. Operation block 1242 indicates the impulse cartridge 750 is fired to propel the eject vehicle 400 from the dispenser 200 and safely away from the aerial platform 100.
Operation block 1244 indicates that the pitch maneuvers are performed to align the eject vehicle 400 with the already determined intercept vector. The pitch maneuver is a two-stage process that sequentially executes an azimuth rotation and an elevation rotation to align the longitudinal axis of the eject vehicle 400 along the intercept vector. The pitch maneuver does not have to be exact. As a non-limiting example, offsets of up to about 10 to 15 degrees may be corrected during flight of the eject vehicle 400 using the divert thrusters 612 during the guidance phase 1260. After ejection, the folding fins 482 will deploy and the communication link antennas 960 will deploy and wireless communication between the eject vehicle 400 and the radar module 900 may commence.
Operation block 1246 indicates that the rocket motor 420 will fire, which accelerates the eject vehicle 400 to about 160 meters/second and imposes a spin rate on the eject vehicle 400 of about 10 Hertz. Upon exhaustion, the rocket motor 420 and folding fins 482 will separate and the terminal vehicle (TV) is exposed. With separation of the TV, the second set of folding fins 484 deploy and the corner reflector 470 is exposed.
During the guidance phase 1260, the process will perform a track and divert loop in order to adjust the flight path of the eject vehicle 400 to more closely intercept the aerial threat 120. Operation block 1262 indicates that the sector processor 910 will track the eject vehicle 400 and aerial threat 120 as discussed above with reference to
A divert phase 1270 includes operations to cause the eject vehicle 400 to modify its course. Operation block 1272 indicates that the divert direction and time, if required, are sent to the eject vehicle 400.
The divert process takes into account the rotation of the eject vehicle 400 and the direction of the desired divert thrust. This rotation adds a complication to the selection and fire time determination of the proper divert thruster 612, but also ensures that all of the available divert thrusters 612 can be used to divert the eject vehicle 400 in any desired direction substantially perpendicular to the travel direction of the eject vehicle 400. Operation block 1274 indicates that the processor on the eject vehicle 400 will select the divert thruster 612 to be fired and determine the firing time based on the divert angle received from the sector processor 910 and its internal attitude sensors.
Operation block 1276 indicates that the appropriate divert thruster 612 is fired at the appropriate fire time to move the eject vehicle 400 laterally along a diversion vector to adjust the flight path of the eject vehicle 400. As a non-limiting example, each divert thruster 612 may be capable of correcting for about two degrees of error from the initial pointing of the eject vehicle 400 during the pitch maneuver. Thus, when the divert thrusters 612 are fired when the eject vehicle 400 is in the correct rotational position, the process can slide the travel direction vector of the eject vehicle 400 toward the path of the aerial threat 120. Moreover, the process can fire in any circular direction and can fire multiple divert thrusters 612 in the same direction to repeatedly move the eject vehicle 400 in the same direction.
While
Operation block 1286 indicates that the warhead 440 on the eject vehicle 400 is detonated at the intercept time responsive to the detonation command received from the sector processor 910.
During period 1310, the eject vehicle 400 separates to a distance of about two meters from the helicopter. During period 1320, the nose thrusters 622 pitch the eject vehicle 400 to the approximate approach angle of the incoming RPG (e.g., within about ±10° accuracy). The rocket motor 420 then fires to accelerate the eject vehicle 400 to approximately 160 meters/second and is then separated from the remaining terminal vehicle upon exhaustion.
During period 1330, the radar module 900 transmits a series of divert commands to the eject vehicle 400, which fires the divert thrusters 612 to correct the trajectory of the eject vehicle 400 and intercept the RPG. A radar command is finally sent to the eject vehicle 400 to detonate the warhead 440 when the terminal vehicle reaches the closest point of approach (CPA). The guidance algorithm may be configured to produce a maximum CPA of about 30 centimeters, which is well within the lethal 0.6-meter kill radius of the warhead 440.
A second helicopter 1420 near the first helicopter 1410 is monitoring a fifth radar sector 1420A, a sixth radar sector 1420B, a seventh radar sector 1420C, and an eighth radar sector 1420D. If an aerial threat approaches from a direction indicated by arrow 1430 it may be detected by the third radar sector 1410C of the first helicopter 1410 and the seventh radar sector 1420C of the second helicopter 1420. If the first helicopter 1410 attempts to launch an eject vehicle, it may cause damage to the second helicopter 1420. However, using communication between the various wingman platforms, sectors of responsibility can be identified. Thus, for the direction indicated by arrow 1430, the first helicopter 1410 can determine that the third radar sector 1410C will be covered by the seventh radar sector 1420C of the second helicopter 1420. As a result, while this formation continues, the first helicopter 1410 does not respond to threats in its third radar sector 1410C.
Returning to
The engagement management modules 900 may be used as part of a helicopter active protection system (HAPS), but may also be used in other types of aerial vehicles, ground vehicles, water vehicles, and stationary deployments.
Returning to
In operation, radar on the EMM 900 detects and tracks an aerial threat (e.g., an RPG) launched at the helicopter and launches one or more KVs 400 from the AN/ALE-47 countermeasure dispenser to intercept the incoming RPG. Following launch, the KV 400 executes a series of pitch maneuvers using nose thrusters (i.e., in the alignment thruster module 620) to align the body axis with the estimated intercept point, uses a boost motor to accelerate to high speed to intercept the RPG at maximum range, and executes a series of commands for lateral guidance maneuvers using a set of divert thrusters 610. Finally, the KV 400 warhead 440 is command detonated when the KV 400 reaches the closest point of approach (CPA) computed by an EMM guidance processor.
The flight time of the KV is typically on the order of 300 to 500 msec. During the short flight time, the KV is exposed to strong moments due to divert thruster offsets from the center of gravity and to strong aerodynamic moments due principally to the jet interaction (JI) effect when the divert thrusters are fired. The principle forces of interest are shown in
One or more tail fins 1524 can be used to add aerodynamic stability, but the time constants associated with these tail fins generally are not fast enough to stabilize the KV 400 during its short flight time. Instead, or in addition to the tail fins 1524, a plurality of small micro-thrusters 1604 (
Referring again to
The attitude control algorithm 1730 is designed to fire the nose mounted attitude control thrusters 1604 to maintain the angle of attack α (
The KV 400 has an onboard IMU 1714 that measures the angular rate and acceleration. The IMU 1714 may include a set of 3-axis gyros, 3-axis accelerometers, 3-axis magnetometers, and a field programmable gate array (FPGA) to partially process the sensor information. The sensors may be solid-state MEMS that are machined on a small circuit board. The IMU 1714 also includes an FPGA that contains the EKF 1720 to fuse the output of the sensors into 3-dimensional position, velocity, angular velocity and attitude.
The electric vector field of a propagating signal can be represented by a pair of orthogonal components:
where utxϕ1 and utxϕ2 are orthogonal unit vectors that define the direction of the electric field components, p1hu (t) and p2(t) are the complex components of a unit vector that define the projection of the electric field vector on the basis vectors, and U and p are the matrix of basis unit vectors and the polarization vector, respectively. Similarly, the polarization of an antenna can be defined by a 2×1 complex vector q. The signal received by an antenna with polarization q from a signal with polarization p is simply the inner product of p and q:
xrx(t)=q(t)Hp(t)E(t)eiβ(t) (2)
If polarizations p and q are defined in different coordinate systems, Utx and Urx, then (2) becomes:
xrx(t)=q(t)HUrxTUtxp(t)E(t)eiβ(t) (3)
Assume the polarization of a source antenna 1804 and the receive antennas 1802 can be represented as po and qo in terms of a natural antenna coordinate system. Let Atx(t) and Arx (t) be the time varying coordinate transformations from the natural coordinate system to some inertial system. In this system the electric field vector and receiver polarization vectors are given by:
Etx(t)=Atx(t)UtxpoE(t)eiβ(t)
q(t)=Arx(t)Urxqo. (4)
Then, (3) becomes:
xrx(t)=qoHUrxTArxT(t)Atx(t)UtxppE(t)eiβ(t) (5)
In the JAPRAE system 1710 there are two orthogonal receive antennas 1802, with polarizations qo1 and qo2. Thus, the signal generated at the input of the dual polarized receiver 1806 is given by:
In equation (6) the transformations are explicitly represented as rotations of the transmitter ϕtx and receiver ϕrx around the line of sight. In the case where the transmit antenna 1804 and the receive antennas 1802 are linearly polarized, it can be shown that this reduces to the following form:
Consider a signal y(t) generated by performing a rotation on the vector x(t).
Note that if {circumflex over (δ)}=δ, yrx1=Eeiβ(t) and yrx0=0. This amounts to a case where γrx1 is the output of a beamformer that matches the polarization of the incident signal to maximize the receive signal power. It can be shown that this also maximizes the signal-to-noise ratio.
Now form the ratio of y2(k) to y1(k)
This forms the basis for generating an error signal for an adaptive polarization loop.
{circumflex over (θ)}rx(t)={circumflex over (θ)}tx(t)−{circumflex over (δ)}(t) (11)
The transmitter roll angle, {circumflex over (ϕ)}tx can be transmitted to the KV 400 via the data link 1806.
Note that the solution for equation 10 is ambiguous by n radians. Therefore, the loop 1900 of
A Kalman filter methodology is used to fuse the sensor data. The translational motion involves a set of linear equations and the conventional Kalman filter (KF) can be used, whereas the rotational motion involves a set of nonlinear equations and the conventional extended Kalman filter (EKF) can be used.
A 9×1 discrete time translational motion state vector, x(k), includes 3-D spatial components comprising a position vector, d(k), a velocity vector, v(k), and an acceleration vector, a(k), as follows:
x(k)=[dT(k),vT(k),aT(k)]T (12)
Transition and measurement equations include a transition matrix, Fk, a plant noise coupling matrix, Gk, a measurement matrix, Hk, state transition noise wk and measurement noise Vk.
xk+1=Fxk+Gkwk
Zk=Hkxk+Vk (13)
The state transition noise wk is i.i.d. zero mean Gaussian with covariance Rk, and the measurement noise Vk is also i.i.d. zero mean Gaussian with covariance Qk. The subscript k indicates the variables might be time varying.
The expanded form of these equations is given by:
where Ts is the sample interval and I3 and 03 are 3×3 unity and zero matrices, respectively.
The Kalman filter 1720 (
The Projection Act is Given by:
{circumflex over (x)}k|k+1=Fk{circumflex over (x)}k−1|k−1
{circumflex over (P)}k|1+1=Fk{circumflex over (P)}k−1|k−1FkT+GkQkGkT (15)
The update act is given by:
Lk=Pk|k−1HkT[Hk{circumflex over (P)}k|k−1HkT+Rk]−1
{circumflex over (x)}k|k=F{circumflex over (x)}k|k−1+Lk[Zk−Hk{circumflex over (x)}k|k−1]
{circumflex over (P)}k|k={circumflex over (P)}k|k−1−{circumflex over (P)}k|k−1HkT[Hk{circumflex over (P)}k|k−1HkT+Rk]−1HkT{circumflex over (P)}k|k−1T (16)
The 9×1 discrete time translational motion state vector,
The transition and measurement equations have a similar form as the translational equations except the transition equation is nonlinear.
Zk+1=
The transition noise,
The nonlinear matrix B(θk) converts angle rate to Euler angle rate and is given by:
The EKF method is similar to the KF method except the transition equation is linearized using the Jacobian.
The two derivatives are:
From this point on, the EKF method is similar to the KV method using the linearized components.
The projection step for the EKF is given by:
The update step for the EKF is given by:
Lk=
In
Operation may be as explained in acts 1 through 12 below:
Act 1: The onboard EKF algorithm tracks the projectile yaw ({tilde over (ψ)}KV), pitch ({tilde over (θ)}KV) and roll ({tilde over (ϕ)}KV) attitude angles. These angles are used to compute the NED to body directional cosine matrix Cnb as
Act 2: The projectile velocity in the NED frame, {tilde over (V)}KV, is tracked by EMM 900 radar and uplinked to the projectile via RF communication links. The velocity is then transformed into the body frame.
{tilde over (V)}KVb=Cnb·{tilde over (V)}KV (25)
Act 3: The total angle of attack αtotal and aerodynamic roll angles ϕaero is then computed. The total angle of attack should be small at all times. The aerodynamic angle tells where the total angle of attack is relative to the body roll axis.
Act 4: The attitude changing rate cannot be measured for the purpose of rate feedback, but the synthetic rates may be derived by using the relationship between the attitude rate and the estimated body rates and attitude angles as
{dot over (ω)}KV=({tilde over (ω)}KV(2)sin {tilde over (ϕ)}KV+{tilde over (ω)}KV(3)cos {tilde over (ϕ)}KV)sec {tilde over (θ)}KV
{dot over (θ)}KV={tilde over (ω)}KV(2)cos {tilde over (ϕ)}KV−{tilde over (ω)}KV(3)sin {tilde over (ϕ)}KV
{dot over (ϕ)}KV={tilde over (ω)}KV(1)+{dot over (ψ)}KV sin {tilde over (ϕ)}KV (27)
Act 5: Compute the KV 400 heading and flight path angles in the NED frame. These are the desired body yaw and pitch attitude angles that we want to control. Note that the body roll angle is free.
Act 6: Compute attitude error by subtracting the estimated attitude angles from the commanded attitude angles above. This error is then multiplied by a proportional gain Kp,outer to form attitude angle rate command.
{dot over (ψ)}cmd=Kp,outer(ψcmd−{tilde over (ψ)}KV)
{dot over (θ)}cmd=Kp,outer(θcmd−{tilde over (θ)}KV) (29)
Act 7: Compute attitude rate errors by subtracting the attitude rate derived in Act 4 above from the rate commands above. These rate errors are multiplied by a proportional gain Kp,inner to form attitude acceleration commands.
{umlaut over (ψ)}cmd=Kp,inner({dot over (ψ)}cmd−{dot over (ψ)}KV)
{umlaut over (θ)}cmd=Kp,inner({dot over (θ)}cmd−{dot over (θ)}KV) (30)
Act 8: Because the air vehicle is aerodynamically unstable at all flight regimes, angle of attack will grow if unchecked. For this reason, the aerodynamic moment to be countered must be estimated, in addition to the moment needed to produce the attitude acceleration of Act 7. The estimation is done by storing a complete set of aerodynamic coefficient tables on board the projectile and computing the total yawing and pitching moments about the estimated CG location on the flight. The algorithm to estimate the KV 400 mass, CG location and inertia tensor will be described below with respect to
Where:
Act 9: The instantaneous moment about the CG location required to produce the attitude acceleration which will force the body to align with the velocity vector V (
It is the estimated moment of inertia about the lateral axis and, C2 and C3 are computed as:
c2=COS {tilde over (θ)}KV{umlaut over (ψ)}cmd−sin {tilde over (θ)}KV{dot over (θ)}KV{dot over (ψ)}KV−({tilde over (ω)}KV(2)cos {tilde over (ϕ)}KV−{tilde over (ω)}KV(3)sin {tilde over (ϕ)}KV){dot over (ψ)}KV−
(It−Ia)({tilde over (ω)}KV(1){tilde over (ω)}KV(3)sin {tilde over (ϕ)}KV+{tilde over (ω)}KV(1){tilde over (ω)}KV(2)cos {tilde over (ϕ)}KV)
C3={umlaut over (θ)}cmd+({tilde over (ω)}KV(2)sin {tilde over (ϕ)}KV+{tilde over (ω)}KV(3)cos {tilde over (ϕ)}KV){dot over (ϕ)}KV−
(It−Ia)({tilde over (ω)}KV(1){tilde over (ω)}KV(3)cos {tilde over (ϕ)}KV−{tilde over (ω)}KV(1){tilde over (ω)}KV(2)Sin {tilde over (ϕ)}KV (33)
Ia denotes the estimated moment of inertia about the roll axis.
Act 10: Given the estimated CG location, XCG and the attitude nozzle location, XAT, we can convert the above moment command to thrust force command as:
The Magnitude of this Command is:
Ftotal=∥Fcmd∥ (35)
And, the roll orientation relative to the body y-axis is:
Act 11: If the thrust force command, Ftotal, is greater than a threshold value, usually a fraction of the attitude thruster force, a thruster search algorithm may be initiated to find a thruster to fire. Otherwise, no attitude thruster may be fired.
From Act 3, a total angle of attack is found between the body x-axis and the velocity vector Vb and the aerodynamic angle relative to the body z-axis. To reduce the total angle of attack, an attitude thruster may be fired 180 degrees opposite to ϕaero such that the resultant force F pushes the body nose toward the velocity vector. Knowing the duration of the attitude thruster burn and time delays from the thruster command generation to actual thruster ignition, may enable calculation of the proper roll angle to issue the attitude thruster squib command. If there happens to be an attitude thruster at the right place at the moment, that thruster will be selected to fire. For example, in
Act 12: The attitude control loop may keep track of which attitude thrusters are available to use in an availability list. When a certain attitude thruster is commanded to fire, it is removed from the availability list.
Because of the high mass ratio of the divert thruster 610 and the attitude control thruster 1604 propellants to the KV 400 total mass, the CG location and the inertia tensor will migrate as any divert thruster 610 or an attitude control thruster 1604 is firing. This is the so-called CG migration problem and it becomes more important toward the end of flight when most of the thrusters are spent.
{dot over (m)}i≡ith thruster mass burn rate<0
iri≡ith thruster CG location
m≡total mass
rCGCg location
Ixy Inertia tensor element xy (37)
The following equations are computed recursively:
To a large extent, this detailed description has focused on a particular type of intercept vehicle (e.g., the eject vehicle 400). However, engagement management systems described herein may be used with many types of intercept vehicles 400 in which the engagement management system can track the intercept vehicle 400, alter the course of the intercept vehicle 400, determine when to detonate the intercept vehicle 400, or combinations thereof using commands communicated between the engagement management system and the intercept vehicle 400.
Moreover, while embodiments of the present disclosure may be particularly suitable for use on aerial platforms, they may also be used in other types of mobile platforms like ground-based mobile platforms such as, for example, tanks, armored personnel carriers, personnel carriers (e.g., Humvee and Stryker vehicles) and other mobile platforms capable of bearing embodiments of the present disclosure. Moreover, embodiments of the present disclosure may be used for relatively stationary ground-based personnel protection wherein a mobile platform may not be involved. Accordingly, embodiments of the disclosure are not limited to aerial applications.
While the present disclosure has been described herein with respect to certain illustrated embodiments, those of ordinary skill in the art will recognize and appreciate that the present invention is not so limited. Rather, many additions, deletions, and modifications to the illustrated and described embodiments may be made without departing from the scope of the invention as hereinafter claimed along with their legal equivalents. In addition, features from one embodiment may be combined with features of another embodiment while still being encompassed within the scope of the invention as contemplated by the inventor.
This application is a continuation of U.S. patent application Ser. No. 16/584,378, filed Sep. 26, 2019, now U.S. Pat. No. 11,313,650 issued Apr. 26, 2022, which is a continuation of U.S. patent application Ser. No. 15/411,324, filed Jan. 20, 2017, now U.S. Pat. No. 10,436,554, issued Oct. 8, 2019, which is a continuation of U.S. patent application Ser. No. 13/839,637, filed Mar. 15, 2013, now U.S. Pat. No. 9,551,552, issued Jan. 24, 2017, which is a continuation-in-part of U.S. patent application Ser. No. 13/455,831, filed Apr. 25, 2012, now U.S. Pat. No. 9,170,070, issued Oct. 27, 2015, which claims priority to U.S. Provisional Patent Application Ser. No. 61/606,010, filed Mar. 2, 2012, the disclosure of each of which is hereby incorporated herein in its entirety by this reference. This application is also related to U.S. patent application Ser. No. 13/839,176, filed Mar. 15, 2013, now U.S. Pat. No. 9,501,055, issued Nov. 22, 2016, and titled “Methods and Apparatuses for Engagement Management of Aerial Threats,” the disclosure of each of which is hereby incorporated herein in its entirety by this reference.
Number | Name | Date | Kind |
---|---|---|---|
3231223 | Upper | Jan 1966 | A |
3350886 | Adrien et al. | Nov 1967 | A |
3612442 | Chisel | Oct 1971 | A |
3614027 | Lewis | Oct 1971 | A |
3624367 | Hamilton et al. | Nov 1971 | A |
3667044 | Vaughan et al. | May 1972 | A |
3693909 | Hall | Sep 1972 | A |
3732693 | Chu | May 1973 | A |
3735944 | Bannett et al. | May 1973 | A |
3788069 | Schmidt | Jan 1974 | A |
3802190 | Kaufmann | Apr 1974 | A |
3808940 | Schillreff et al. | May 1974 | A |
3841585 | Evers | Oct 1974 | A |
3850103 | Krupen | Nov 1974 | A |
3926390 | Teuber et al. | Dec 1975 | A |
3986682 | Dryden | Oct 1976 | A |
4008869 | Weiss | Feb 1977 | A |
4063485 | Carter et al. | Dec 1977 | A |
4093153 | Bardash et al. | Jun 1978 | A |
4332360 | Topliffe | Jun 1982 | A |
4408735 | Metz | Oct 1983 | A |
4470562 | Hall et al. | Sep 1984 | A |
4482107 | Metz | Nov 1984 | A |
4568940 | Diamond | Feb 1986 | A |
4635880 | Jehle | Jan 1987 | A |
4762293 | Waddington | Aug 1988 | A |
4848706 | Garg et al. | Jul 1989 | A |
4925129 | Salkeld et al. | May 1990 | A |
4967982 | Bagley | Nov 1990 | A |
5054712 | Bar et al. | Oct 1991 | A |
5062593 | Goddard et al. | Nov 1991 | A |
5071087 | Gray | Dec 1991 | A |
5082200 | Gray | Jan 1992 | A |
5114094 | Harris | May 1992 | A |
5118050 | Arnold et al. | Jun 1992 | A |
5129604 | Bagley | Jul 1992 | A |
5211356 | McWilliams et al. | May 1993 | A |
5238204 | Metz | Aug 1993 | A |
5259569 | Waymeyer et al. | Nov 1993 | A |
5379966 | Simeone et al. | Jan 1995 | A |
5456425 | Morris et al. | Oct 1995 | A |
5456429 | Mayersak | Oct 1995 | A |
5478028 | Snyder | Dec 1995 | A |
5533331 | Campbell et al. | Jul 1996 | A |
5631830 | Schroeder | May 1997 | A |
5828571 | Bessacini et al. | Oct 1998 | A |
5855339 | Mead et al. | Jan 1999 | A |
5917442 | Manoogian | Jun 1999 | A |
6135393 | Sackheim et al. | Oct 2000 | A |
6179246 | Fisel et al. | Jan 2001 | B1 |
6209820 | Golan et al. | Apr 2001 | B1 |
6231002 | Hibma et al. | May 2001 | B1 |
6231003 | Hibma et al. | May 2001 | B1 |
6267326 | Smith et al. | Jul 2001 | B1 |
RE37331 | Schroeder | Aug 2001 | E |
6289669 | Smirra | Sep 2001 | B1 |
6302354 | Patera | Oct 2001 | B1 |
6347763 | Harkins et al. | Feb 2002 | B1 |
6360986 | Larcher et al. | Mar 2002 | B1 |
6455828 | Gauggel et al. | Sep 2002 | B1 |
6565036 | Palathingal et al. | May 2003 | B1 |
6588700 | Moore et al. | Jul 2003 | B2 |
6603421 | Schiff et al. | Aug 2003 | B1 |
6610971 | Crabtree | Aug 2003 | B1 |
6629668 | Grau | Oct 2003 | B1 |
6630902 | Fenton et al. | Oct 2003 | B1 |
6672533 | Regebro | Jan 2004 | B1 |
6717543 | Pappert et al. | Apr 2004 | B2 |
6889935 | O'Dwyer | May 2005 | B2 |
6920827 | Llyod | Jul 2005 | B2 |
6926576 | Alway et al. | Aug 2005 | B1 |
7004423 | Folsom et al. | Feb 2006 | B2 |
7102113 | Fujita et al. | Sep 2006 | B2 |
7239377 | Vermillion et al. | Jul 2007 | B2 |
7249730 | Flippen, Jr. | Jul 2007 | B1 |
7269920 | Staley, III | Sep 2007 | B2 |
7277046 | Adams et al. | Oct 2007 | B2 |
7287725 | Chasman et al. | Oct 2007 | B2 |
7416154 | Bittle et al. | Aug 2008 | B2 |
7494089 | Williams et al. | Feb 2009 | B2 |
7654185 | Yannone | Feb 2010 | B1 |
7658031 | Cross et al. | Feb 2010 | B2 |
7714261 | Bnayahu et al. | May 2010 | B2 |
7832137 | Sammut et al. | Nov 2010 | B2 |
7851732 | Brinkerhoff et al. | Dec 2010 | B2 |
7875838 | Starken | Jan 2011 | B1 |
7886646 | Bannasch et al. | Feb 2011 | B2 |
7899644 | Weber et al. | Mar 2011 | B2 |
7977614 | Raviv | Jul 2011 | B2 |
7989743 | Brinkerhoff et al. | Aug 2011 | B2 |
8020482 | McCants, Jr. | Sep 2011 | B1 |
8084724 | Brosch et al. | Dec 2011 | B1 |
8084725 | Dryer | Dec 2011 | B1 |
8084726 | Hanlon et al. | Dec 2011 | B2 |
8089033 | Zank et al. | Jan 2012 | B2 |
8157169 | Olden et al. | Apr 2012 | B2 |
8173946 | Patterson et al. | May 2012 | B1 |
8242422 | Olden et al. | Aug 2012 | B2 |
8338768 | Hanlon et al. | Dec 2012 | B2 |
8423336 | Bennett et al. | Apr 2013 | B2 |
8436283 | Tournes et al. | May 2013 | B1 |
8464949 | Namey et al. | Jun 2013 | B2 |
8575526 | Colvin et al. | Nov 2013 | B1 |
8584443 | Carlson | Nov 2013 | B1 |
8735788 | Preston et al. | May 2014 | B2 |
8757486 | Cook et al. | Jun 2014 | B2 |
8800913 | Pagliara et al. | Aug 2014 | B2 |
8809755 | Patel et al. | Aug 2014 | B1 |
9170070 | Sharpin | Oct 2015 | B2 |
9501055 | Kolanek et al. | Nov 2016 | B2 |
9551552 | Kolanek | Jan 2017 | B2 |
10295312 | Sharpin et al. | May 2019 | B2 |
10436554 | Kolanek | Oct 2019 | B2 |
11313650 | Kolanek | Apr 2022 | B2 |
20030210170 | Krikorian et al. | Nov 2003 | A1 |
20050103925 | Folsom et al. | May 2005 | A1 |
20050184192 | Schneider | Aug 2005 | A1 |
20060238403 | Golan et al. | Oct 2006 | A1 |
20060283317 | Melnychuk et al. | Dec 2006 | A1 |
20070063095 | Bittle | Mar 2007 | A1 |
20070169616 | Vickroy | Jul 2007 | A1 |
20090001214 | Williams et al. | Jan 2009 | A1 |
20100026554 | Longman | Feb 2010 | A1 |
20100162915 | Rastegar | Jul 2010 | A1 |
20100275576 | Gutman et al. | Nov 2010 | A1 |
20100282892 | Hanlon et al. | Nov 2010 | A1 |
20100313741 | Smogitel | Dec 2010 | A1 |
20110029160 | Pagliara et al. | Feb 2011 | A1 |
20110049289 | Kinsey et al. | Mar 2011 | A1 |
20110082604 | Lam | Apr 2011 | A1 |
20110101097 | Olden et al. | May 2011 | A1 |
20110120294 | Beach et al. | May 2011 | A1 |
20110127328 | Warren | Jun 2011 | A1 |
20110174917 | Dold et al. | Jul 2011 | A1 |
20110196551 | Lees et al. | Aug 2011 | A1 |
20120091252 | Zatterqvist | Apr 2012 | A1 |
20120199690 | Rastegar et al. | Aug 2012 | A1 |
20120211596 | Preston et al. | Aug 2012 | A1 |
20120248237 | Dolphin | Oct 2012 | A1 |
20140138474 | Sharpin et al. | May 2014 | A1 |
20140303884 | Levien et al. | Oct 2014 | A1 |
Number | Date | Country |
---|---|---|
112005000582 | Feb 2007 | DE |
0418636 | Mar 1991 | EP |
0471225 | Feb 1992 | EP |
2624011 | Aug 2013 | EP |
2444253 | Jul 1980 | FR |
2674621 | Oct 1992 | FR |
2265342 | Sep 1993 | GB |
07-334244 | Dec 1995 | JP |
2005-155953 | Jun 2005 | JP |
5491877 | May 2014 | JP |
0394292 | Nov 2003 | WO |
2005098346 | Oct 2005 | WO |
2006079029 | Jul 2006 | WO |
2008035338 | Mar 2008 | WO |
2009045573 | Apr 2009 | WO |
2010036418 | Apr 2010 | WO |
2010147520 | Dec 2010 | WO |
2011028304 | Mar 2011 | WO |
Entry |
---|
International Search Report for Application No. PCT/US2014/023109, dated Oct. 16, 2014, 4 pages. |
Written Opinion of the International Searching Authority, ISA/EP, for Application No. PCT/US2014/023109, dated Oct. 16, 2014, 7 pages. |
“Trophy: Active Protection and Hostile Fire Detection System for Armored Vehicles”; no author given; copyright in the year 2022; posted at www.leonardodrs.com. (Year: 2022). |
Number | Date | Country | |
---|---|---|---|
20220412694 A1 | Dec 2022 | US |
Number | Date | Country | |
---|---|---|---|
61606010 | Mar 2012 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16584378 | Sep 2019 | US |
Child | 17728624 | US | |
Parent | 15411324 | Jan 2017 | US |
Child | 16584378 | US | |
Parent | 13839637 | Mar 2013 | US |
Child | 15411324 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13455831 | Apr 2012 | US |
Child | 13839637 | US |