scholarly journals Modelling and Optimisation of UHF band EW Based WTA Problem within the Scope of Threat Assessment

2022 ◽  
Vol 72 (1) ◽  
pp. 73-82
Author(s):  
Merve Acarlar Barlas ◽  
Haluk Gozde ◽  
Semih Ozden

The classical weapon target allocation (WTA) problem has been evaluated within the scope of electronic warfare (EW) threat assessment with an electromagnetic effect-based jammer- tactical radio engagement approach. As different from the literature, optimum allocation of non-directional jammers operating at different operating UHF frequencies under constraints to RF emitters is aimed in this study. The values of the targets are modelled using an original threat assessment algorithm developed that takes into account operating frequencies, jamming distance, and weather conditions. The computed jammer-target effect matrix has been solved under different scenarios according to the efficiency and cost constraints. It is seen at the end of the simulations that the allocation results for EW applications largely depend on the effect ratio used. The better results are taken in the case of under 0.5 effect ratio. Finally, jammer-radio allocation problem specified at the suggested model is solved successfully and effectively.

Author(s):  
V. Neroba

The article investigates the conditions and factors that will affect the functioning of the specific mine exploration facilities when installed on an unmanned aerial vehicle. The analysis of conditions and factors was carried out with preliminary determination of the general performance indicators of the specific technical means of mine exploration, which include: the probability of detection and recognition of mines (contour of mines) by the operator (pilot operator) on the display screen; the scale of the image of the mine (contour of the mine) on the display screen; viewing angle of the specific technical means of exploration; transverse capture of terrain during aerial reconnaissance by means of a specific reconnaissance technical means; spectral range of operation of the specific technical means of exploration and height of exploration. As a result of the study, the following conditions and factors were included: unmanned aerial vehicle; the task of finding mines; features of the area where the mines are installed; pilot control (pilot); weather conditions; gusts of wind; season; time of day; use by the enemy of electronic suppression and electronic warfare, as well as conventional small arms against a drone; drones vibration during flight; turbulence of the atmosphere; the use of adversaries in the field of land mines and the creation of false minefields management of specific technical means of intelligence by the operator (pilot operator); temperature mode; availability of min signatures base. It is concluded that the results of the study of conditions and factors that will affect the functioning of the specific intelligence means are the basis for the development of relevant requirements for the specific intelligence means of the visible and infrared ranges of the electromagnetic spectrum.


Author(s):  
Shahed Rowshan ◽  
William C. Sauntry ◽  
Thomas M. Wood ◽  
Bruce Churchill ◽  
Steve R. Levine

Transportation management centers (TMCs) make an important difference in the lives of commuters around the country every day. Various types of threats could damage or destroy a TMC's ability to operate. These threats range from rare but devastating terrorist attacks to the more frequent and troublesome utility failures and severe weather conditions. The TMC risk assessment methodology (RAM) introduced in this paper is based on the best practices of several proven RAMs. Its components include asset identification, threat assessment, consequence assessment, vulnerability assessment, and countermeasure development. The research team selected 10 TMCs as a basis for gathering best practices and common challenges. As initial data were developed for the 10 centers, three sites were chosen to participate in more comprehensive on-site vulnerability assessments. This paper provides general recommendations that can be readily applied to all TMCs. These recommendations include taking the time to conduct a comprehensive risk assessment; reviewing, updating, and revising the risk assessment on a regular basis; correcting simple physical vulnerabilities; and training employees in security awareness.


Author(s):  
Ali Abdali ◽  
Kazem Mazlumi

Abstract Photovoltaic is one of the renewable energies in generating electricity. The MPPT as effective technique can improve the performance of photovoltaic cells. Key problem in photovoltaic systems is that it does not achieve much power since the various weather conditions effects on photovoltaic power cells in working such as solar radiation or rainy and cloudy weather. Therefore, the MPPT in PV cells runs and leads to change during the day and seasons. On the other hand, providing an appropriate controller for the MPPT is too important. Here, main purpose is applying the robust controller, which is tuned by firefly algorithm to optimize MPPT in photovoltaic systems. The main reason to propose this method is some defects in previous controllers such as low stability, low battery lifetime, inability to combine AC/DC and low efficiency. The suggested model is performed by MATLAB/Simulink software. Finally, the FLFA model has higher efficiency and best dynamic response than other methods.


Sign in / Sign up

Export Citation Format

Share Document