AFSIM
AFSIM
AFSIM
Nicholas A. Chinnici
Peter D. Clive
Jeffrey Johnson
Andrew W. Krisby
Jonathon E. Marjamaa
Luke B. Miklos
Michael J. Moss
Stephen P. Yallaly
August 2016
The framework provides the ability to model the capabilities of the participants and to control
the interaction of the participants as they move through space and time. The resulting simulatio ns
can be:
Constructive/non- interactive (the user invokes the simulation which then runs without
further interaction), or interactive (the user or other simulation controls some aspects of
the simulation.
Non-real-time (faster or slower depending on the fidelity of the platform component
models), or real-time (constrained by some multiple of a real-time clock).
Event-stepped (simulations proceed according to processing of relevant events) or time-
stepped (simulations proceed according to events occurring in succeeding time steps)
AFSIM is designed to be generally usable “as is,” so that not only are top-level modeling
concepts defined by the framework, but many concrete implementations are also provided.
Examples of standard models delivered with the framework include the following:
Movement models
Sensor systems
Weapon systems and weapon effects
Communication systems
Information processing systems (trackers, etc.)
Decision making systems (command and control, missile guidance, etc.)
Antenna pattern models
Atmospheric attenuation models
Signal propagation models
Clutter models
Electronic warfare effect models
AFSIM is also extensible, providing for ease of incorporating models of the above types, as
well as completely new capabilities. Because AFSIM is a framework, simulation details and
services are provided, freeing the developer to focus specifically on adding desired new
functionality through implementation of the framework’s abstract interfaces. Additiona lly,
AFSIM’s Component-Based Architecture (CBA) provides the ability to cleanly and generica lly
incorporate nearly any new modeling capability into the framework. Once incorporated, the models
are then as much a part of the framework as any of the standard models.
This section provides a general overview of the Advanced Framework for Simulatio n,
Integration and Modeling (AFSIM). Section two provides a description of the standard AFSIM
software distribution, including standard AFSIM applications, the AFSIM Integrated Developme nt
Environment (IDE), AFSIM IADS scenarios, and Visual Environment for Scenario Preparation
and Analysis (VESPA). Specific algorithms and detailed model descriptions are covered in the
appendices of this document, which together serve as the AFSIM technical reference guide. This
document does not, however, provide detailed descriptions of user inputs, the AFSIM scripting
language, or the IDE. These are detailed in the AFSIM Wiki, which serves as the reference manual
for AFSIM commands. Similarly, learning to use AFSIM is accomplished either by taking the
AFSIM Analyst course or through study of the many examples and demonstrations that accompany
the AFSIM release.
1.2 Platforms
AFSIM platforms are composed of attributes, information, components and links (see Figure
1). Attributes include the name, type, affiliation and commander of the platform. Other physical
attributes include its radar, optical and infrared signatures, defining its susceptibility to being seen
by a sensor at a specified aspect angle. Information stored on the platform includes measurements,
tracks, tasks, and human perceptions; these form the basis upon which platforms make decisions.
Platform components include definitions of movement, sensors, communications, weapons and
processing (either to model mental or computing components), which are described individually in
the following sections. Finally, internal and external links provide communication via messages.
Component models delivered with AFSIM are often provided at various levels of fidelity.
For example, an aircraft can be modeled with a simple route mover or with a full pseudo 6-DOF
(six degrees of freedom) aerodynamics and control model. Another example is communicatio ns
models that can either deliver messages perfectly, or that are based on electromagnetics and subject
to signal loss. These choices provide the flexibility to easily configure a simulat ion using lower-
fidelity models, or, to provide necessary effects with higher fidelity ones.
AFSIM also allows new component models (sensors, weapons, etc.), as well as completely
new component types to be inserted and utilized. Although beyond the scope of this document,
describing and teaching this process is a main theme of the AFSIM Software Developer Course.
1.3.1 Movers
A mover is an optional component providing the means by which a platform moves through
space-time (a platform without a mover is geographically fixed). The simulation affects the
movement of platforms and ensures a platform’s position is current before involving it in any
interactions with other platforms or the simulated environment.
There are many types of standard mover models, providing the capability to represent
platforms in every domain, from seabed to space. Some examples of movers delivered with AFSIM
include the following:
Many sensors, such as the RADAR sensor models, implement modeled electromagne tic
interactions and are subject to jamming.
1.3.3 Communications
Communications systems are used to transmit information from one platform to another. In
addition to model choice, the framework also provides a rich set of networking options, detailed in
the next section. AFSIM offers three system models:
1.3.4 Weapons
Weapons systems are used to either lethally or non-lethally attack another platform or platform
component. Weapons can utilize launch computers to make firing decisions, and they employ
configurable weapon effects. AFSIM weapons can be either explicit or implicit. Explicit weapons
create new (weapon) platforms representing missiles, bombs, etc., when fired. Implicit weapons
do not create weapon platforms and are used to model non-kinetic weapons such as high-ener gy
lasers and jammers, as well as kinetic weapons with predictable trajectories, such as artillery.
Note that there is only one explicit weapon model. This is because the wide range of possibilities
for missiles, bombs, etc., is achieved by configuring weapon platform types with their own unique
platform components. For example, a missile can be specified as a weapon platform type
configured with a guided mover and guidance computer (processor), and it is the mover and
guidance computer that are configured to model the unique characteristics of the missile.
1.3.5 Processors
Processors are used to implement the mental or computing processing capabilities of a
platform. There are many processors available in the standard framework, among the most common
being:
If a new component type is needed that is not provided with the standard AFSIM distributio n,
it can be integrated using the AFSIM’s Component Based Architecture (CBA, newly introduced in
version 2.0). AFSIM CBA provides an abstract platform component interface that is extended to
easily add new and existing base component types, as well as component “extensions” that add
additional functionality for existing sensor, processor, and weapon components. Using CBA,
integrating new and existing capabilities on platforms is not only generic and simple, but using and
understanding them is often much easier as well.
Propagation models in AFSIM are designed to model specific effects at radar wavelengths;
options for multipath, ground wave propagation, and knife edge effects are available.
Fluence models simulate high energy laser propagation. AFSIM provides a core fluence
model as well as an interface to the industry-standard HELCoMES fluence model.
The amount of information in a track depends on its source and filtering or fusion processes
that may have been applied. A sensor may provide range and bearing, or it may only produce range
bearing and elevation. It may also provide affiliation and type (e.g., IFF), measurement quality, etc.
The other very important goal of tracking is to intelligently combine data from measurements
and tracks to produce as complete an operational picture as possible. Often, new data will be
computed or inferred in this process called fusion. AFSIM is delivered with a standard fusion
engine, and the framework allows substitution with other fusion algorithms as desired.
1.4.8 Tasks
The AFSIM task management service
provides the capability to send and receive task
assignments, perform the tasks, and provide the
status information for dealing with those
assignments. Tasks are usually associated with a
track; for example, initiate a sensor tracking
request cued to a track location, fire a weapon at
the given track location, etc.
1.4.9 Behavior Modeling
The execution of tasks is performed with the
AFSIM scripting language, and this is the most
common method by which platform behaviors are
implemented. Two options provided by the
framework for task execution are the
WSF_TASK_PROCESSOR and the Figure 2: Graphical representation of an
WSF_QUANTUM_TASK_PROCESSOR. The example task processor state machine.
WSF_TASK_PROCESSOR utilizes a finite state machine, for which tracks move between states,
and scripts implement behaviors based on the current state (see Figure 2, in which the circles
represent states and arrows represent transition rules). The
WSF_QUANTUM_TASK_PROCESSOR utilizes a behavior tree (Figure 3), an artific ia l
intelligence technology in which behaviors are created and arranged as nodes in a graph or “tree.”
The behavior nodes can be arranged together in interesting and interrelated ways, providing more
flexibility in how behaviors are selected and executed. The artificial intelligence architecture and
behavior trees are described further in Appendix D.
10
11
DIS (Distributed Interactive Simulation) interface, which allows an AFSIM simula tio n
to participate as one application in a DIS exercise.
High Level Architecture (HLA) interface, which allows an AFSIM simulation to
participate as one HLA federate in a HLA exercise.
XIO (eXternal Input/Output) interface, providing a multi- machine capability, wherein
two or more AFSIM simulations interact without the limitations of DIS and HLA. XIO
can also be used to interface AFSIM simulations with GUIs and other user input devices,
providing operator-in-the-loop capabilities.
There are no inherent limitations imposed by the framework on platforms or their components
with regard to their performance. Any platform can detect, communicate with, shoot or control any
other platform. Any limitations are due either to the how the model is configured (user input) or
limitations of a platform component model. Such limitations can be overcome through
Changing the parameters of the existing platform component model to reflect the desired
fidelity.
Choosing a different platform component model with the desired fidelity.
Acquiring a different platform component model with the desired fidelity.
12
In order to complete a mission, platforms must have some sort of information on which to
act. The truthfulness and accuracy of the information often governs the success of the missio n.
Assume a commander receives information that a target is located at a specific location and
commands an asset to destroy the target. If the location had significant errors, or if the target did
not really exist (it was a false report or the target had already been destroyed and the commander
had not been informed), time and resources would have been wasted chasing a target that wasn’t
there, thus potentially preventing the destruction of a real target. The framework imposes no
inherent limitation on the viability of the information in a track. It can contain errors and does not
have to correspond to a real platform.
Note: Wsf Exec is likely to undergo a name change, to become “AFSIM Mission.”
2.1.2 Sensor Plot
Sensor Plot is an AFSIM application that is used to evaluate sensor characteristics and
interactions with user-specified geometries. It has the ability to create files that produce plots of
Sensor vertical coverage
Sensor horizontal coverage
Sensor spherical coverage
Defended area of a collection of sensors
Antenna patterns
2.1.3 Weapon Tools
Weapon tools is an AFSIM application that repeatedly fires a predefined
WSF_EXPLICIT_WEAPON over widely varied engagement conditions for the purpose of creating
the various launch computers required for making acceptable weapon firing decisions. It currently
13
Note: AFSIM IDE is likely to undergo a name change, to become “AFSIM Wizard.”
With the IDE’s built-in Demo Browser, analysts can look through over thirty example
scenarios. These scenarios demonstrate the vast capabilities of AFSIM broken down into smaller,
focused pieces. The demos serve as a great starting point for creating new scenarios as well as
reference for adding to existing scenarios.
The AFSIM IDE can execute any AFSIM-based application using the input files defined by
the analyst. Any screen output from the application is displayed in an IDE output window along
with any error messages.
Current capabilities of the IDE to view simulation results include the ability to run the VESPA
application from the IDE using the AFSIM replay file created during the simulation run.
A general plug-in capability is also part of the AFSIM IDE. This supports the developme nt
of features that are needed by a limited user set. This feature includes the plug-in interface to the
application, and user-interface to manage plug-ins within the applications.
2.3 VESPA
The Visual Environment for Scenario Preparation and Analysis (VESPA) software
application enables creation of scenario initial condition files compatible with any AFSIM-based
application. In addition, VESPA can be used to visualize object positional time histories and other
15
Using VESPA, the analyst can place icons representing objects at specific latitude and
longitude locations on a geospatial map. Initial conditions can then be assigned for each selected
object. For example, the initial conditions of an aircraft could be its speed, heading and altitude.
Visual features associated with objects, called attachments, can also be created. Examples include
routes, range rings and zones.
VESPA can be used to display object positional histories and events using an AFSIM replay
file generated during an AFSIM simulation run. The AFSIM replay file is a binary file containing
the DIS output from the AFSIM simulation. In addition, plots can be generated for selected events
that occurred during the simulation.
2.6 Distribution
Distribution of AFSIM is coordinated through AFRL/RQQD (Aerospace Systems
Directorate, POC Brian Birkmire). An Information Transfer Agreement (ITA) must be completed
to receive either the unclassified or classified distribution, and an appropriate DD254 must be
presented by government contractors to acquire the classified distribution.
17
Sensor interactions
Communication interactions
Disruption (jamming) interactions
AFSIM utilizes a common set of classes to encapsulate the components involved in radio
frequency (RF) interactions (in reality, some features of these classes are also used for non-RF
interactions, but that is not important here). The first section of the document will deal with the
basics of signal transmission and reception. Subsequent sections of the document will deal with
specific uses (radar, SAR, ESM, jamming, communications).
Ignoring the details of the processing of the received signal, RF interactions fall into two
classes:
The computation of the received signal power can be broken into distinct steps:
18
19
Asd
Dsd Ps General Form (RF.2a)
4Rsd2
A
Dxr Px xr 2 Transmitter - to - receiver (RF.2b)
4Rxr
A
Dxt Px xt 2 Transmitter - to - target (RF.2c)
4Rxt
A
Dtr Pt tr 2 Target - to - receiver (RF.2d)
4Rtr
Pt Dxt t (RF.3)
20
2 G r
Pr Dxr FBW FPOL One - way, Transmitter - to - receiver (RF.4a)
4 Lr
2 G r
Pr Dtr F40 Two - way, Target - to - receiver (RF.4b)
4 Lr
1
Ftl Ft Bt Lower frequency of transmitted spectrum
2
1
Ftu Ft Bt Upperfrequency of transmitted spectrum
2
1
Frl Fr Br Lower tuning frequency of the receiver
2
1
Fru Fr Br Upper tuning frequency of the receiver
2
The resulting value of FBW depends on the relationship of the upper and lower frequencies of
the transmitter and receiver.
The noise power will be computed using the following process. The value from the first step
whose conditions for use are satisfied will be used:
N k T0 B NF (RF.6a)
4. Compute the noise power using the algorithm defined in “Radar Range Performance ”,
Lamont V. Blake, 1986, Artech House, Inc., Chapter 4.
Noise temperature due to the antenna (Tant = sky temperature due to the antenna pointing
angle):
Noise power:
N k Ts B (RF.6f)
23
The gain pattern is a function of azimuth and elevation with respect to the pattern origin
(typically the bore sight or pointing angle). For a given interaction, the azimuth and elevation of
the point of interest with respect to the pattern origin is computed.
A rectangular table which provides the gain as a function of azimuth and elevation.
A table.
A uniform (constant) pattern.
A circular sin(x)/x pattern.
A rectangular sin(x)/x pattern.
A cosecant pattern.
A GENAP pattern (GENAP is a subset of the functionality provided by generalized
antenna pattern routine found in the government TRAMS model).
Collections of tables may be used to form a composite pattern of polarization and frequency.
The gain of an electronically steered beam can be optionally modified to include the effects
of pointing the beam at an angle off the normal of the array. This capability is enabled by using the
electronic_beam_steering command in the transmitter or receiver. The following equation is used:
G G0 cos n ( ) RF.7
There are currently two models available. These were extracted from Air Force models and
are currently only applicable to ground-based systems (the tables assume the emitter is on the
ground).
24
25
The AFSIM radar model effectively computes the power of a single pulse (or a continuo us
waveform) and then computes the effect of integrating multiple pulses.
A.4.1 Calculation of Received Power
Applying equations RF.1 through RF.4, the following is used to calculate the received power
from a single pulse (or a continuous waveform). Note that this does not including jamming. That is
handled in a separate step.
2 Gr
Pr Dtr F40 From RF.4b
4 Lr
A 2 Gr
Pt tr 2 F40 From RF.2d
4Rtr 4 Lr
Atr 2 Gr
Dxt t F40 From RF.3b
4Rtr2 4 Lr
A A 2 Gr
Px xt 2 t tr 2 F40 From RF.2c
4Rxt 4Rtr 4 Lr
Gx A A 2 Gr
Ppeak DC xt 2 t tr 2 F40 From RF.1 (Radar.1)
Lx 4Rxt 4Rtr 4 Lr
S Pr PCR GI AF (Radar.2)
26
S
SN (Radar.3)
N C J
The detection of the target is determined by one of two mechanisms. A simplistic binary
detector may be used by specifying a detection_threshold. A successful detection is declared if the
signal-to-noise exceeds this threshold.
27
The ‘r’ subscript values are for the passive RF receiver and the ‘x’ subscript values are for
the sensor, jammer or communications transmitter. The expanded equation is as follows:
2 Gr
Pr Dxr FBW FPOL From RF.4a
4 Lr
A 2 Gr
Px xr 2 FBW FPOL From RF.2b
4Rxr 4 Lr
G A 2 Gr
Ppeak DC x xr 2 FBW FPOL From RF.1 (ESM .1)
Lx 4Rxr 4 Lr
28
KRs
TOT (SAR.1)
2d AVG sin( ) cos( )
29
2 Gr
Pr Dxr FBW FPOL From RF.4a
4 Lr
A 2 Gr
Px xr 2 FBW FPOL From RF.2b
4Rxr 4 Lr
G A 2 Gr
Ppeak DC x xr 2 FBW FPOL From RF.1 (Jam.1)
Lx 4Rxr 4 Lr
30
2 Gr
Pr Dxr FBW FPOL From RF.4a
4 Lr
Axr 2 Gr
Px FBW FPOL From RF.2b
4Rxr2 4 Lr
Gx Axr 2 Gr
Ppeak DC FBW FPOL From RF.1 (Comm.1)
Lx 4Rxr2 4 Lr
Pr
SN (Comm.2)
NJ
31
I c I s Lbkg Aproj
Compute the atmospheric transmittance, 𝑡 (the fraction of the signal that remains after
propagation along the path):
t Ic
Eeff
R2
A.9.2 Adjusting for installation effects
Sensors are often mounted behind a window, which will mask regions from the field of view,
or otherwise reduce the signal. This masking or signal reduction is collectively called ‘installa tio n
effects’, and is accounted for by the use of an antenna_pattern command in the receiver block
(while there is no ‘antenna’ in an infrared sensor, it is being treated as such for convenience). The
command should refer to an antenna gain pattern where the gain (or more possibly, the loss)
represents a factor, by which the effective target irradiance should be modified to account for
installation effects, i.e.:
'
Eeff Eeff G (IRST.1)
where G is the ‘antenna gain’ in the direction of interest. Setting the gain to a very small value in
the regions that are outside the window effectively makes targets in that region undetectable.
A.9.3 Computing the probability of detection
The probability of detection is computed using the following equation:
32
33
where:
For a SAR, the transmitter and receiver are co-located, so 𝑅 = 𝑅𝑥𝑡 = 𝑅𝑡𝑟 and A = 𝐴𝑥𝑡 = 𝐴𝑡𝑟 .
Also, the gain of the transmit and receive antennas will be assumed identical, so 𝐺 = 𝐺𝑡 = 𝐺𝑟 .
Furthermore, the following will be assumed:
There are no indirect signals to interfere with the main signal. Therefore 𝐹40 = 1.
34
With the above assumptions, we get the familiar equation for power received from a single
pulse, where the transmitter and receiver are co-located:
𝐺 2 𝜆2 𝜎
𝑃𝑟 = 𝑃𝑝𝑒𝑎𝑘
(4𝜋) 3 𝑅 4 𝐿𝑥 𝐿𝑟 𝐿𝑎𝑡𝑚
Further note that reference 1 goes on to represent the effective aperture as a product of the
actual aperture area multiplied by an ‘aperture efficiency’. We will not perform that step here and
assume that any aperture efficiency has been represented in the AFSIM antenna_pattern.
The received signal must compete with the noise present within the system. AFSIM computes
noise power using the following:
𝑁 = 𝑘𝑇0 𝐵𝑁 𝐹𝑁
(Note: Section 2.6 in reference 2 describes other forms of computing the noise power, but
these are primarily for surface-based systems.)
The signal-to-noise ratio for a single pulse at the antenna port is then:
35
(This is the same as equation (5) in reference 1, with the substitutions noted above.)
A SAR utilizes two signal processing techniques to increase the effective SNR in the image.
This will result in the signal-to-noise ratio a target within the image to be:
𝑃𝑟 𝐺 2 𝜆2 𝜎 1
𝑆𝑁𝑅𝑖𝑚𝑎𝑔𝑒 = 𝑆𝑁𝑅𝑎𝑛𝑡 𝐺𝑎 𝐺𝑟 = = 𝑃𝑝𝑒𝑎𝑘 𝐺𝑎 𝐺𝑟
𝑁 (4𝜋) 3 𝑅 4 𝐿 𝑥 𝐿𝑟 𝐿𝑎𝑡𝑚 𝑘𝑇0 𝐵𝑁 𝐹𝑁
(This is the same as equation (11) in reference 1, with the substitutions noted above.)
Equation (5) from Reference 3 is used to compute the dwell time from the desired cross
range/azimuth resolution:
𝜆𝐾𝑎 𝑅
𝑡𝐷 =
2𝑉𝛿𝑎 sin 𝜃𝑠𝑞
Note that AFSIM lets the user specify either the desired resolution or dwell time. In the latter
case, AFSIM will use the above equation to solve for the achievable resolution given the dwell
time.
36
𝐺 2 𝜆2 𝜎 1
𝑆𝑁 𝑅𝑖𝑚𝑎𝑔𝑒 = 𝑃𝑝𝑒𝑎𝑘 𝐺𝑎 𝐺𝑟
(4𝜋 ) 3 𝑅 4 𝐿
𝑥 𝐿𝑟 𝐿𝑎𝑡𝑚 𝑘𝑇0 𝐵𝑁 𝐹𝑁
2 2
𝐺 𝜆 𝜎 1 𝜆𝐾𝑎 𝑅𝑓𝑝 𝜏𝑢
𝑆𝑁 𝑅𝑖𝑚𝑎𝑔𝑒 = 𝑃𝑝𝑒𝑎𝑘
(4𝜋 ) 3 𝑅 4 𝐿𝑥 𝐿𝑟 𝐿𝑎𝑡𝑚 𝑘𝑇0 𝐵𝑁 𝐹𝑁 2𝑉𝛿𝑎 sin 𝜃𝑠𝑞 𝜏𝑐
This is the form used by AFSIM to compute the return from an object with a radar cross
section of 𝜎. This could be a target or a resolution cell.
Additional forms of the equation are often seen in the literature. The remainder of this section
will show how the above equation is equivalent.
37
Substituting:
𝐺 2 𝜆3 𝛿𝑟 1 𝐾𝑎
𝑆𝑁𝑅𝑖𝑚𝑎𝑔𝑒 = 𝑃𝑎𝑣𝑔 𝜎 0 𝛿𝑎
(4𝜋) 3 𝑅 3 𝐿𝑥 𝐿𝑟 𝐿𝑎𝑡𝑚 cos 𝜓𝑔 𝑘𝑇0 𝐹𝑁 2𝑉𝛿𝑎 sin 𝜃𝑠𝑞
𝐺 2 𝜆3 𝜎 0 𝛿𝑟 1 𝐾𝑎
𝑆𝑁 𝑅𝑖𝑚𝑎𝑔𝑒 = 𝑃𝑎𝑣𝑔
(4𝜋) 3 𝑅 3 𝐿𝑥 𝐿𝑟 𝐿𝑎𝑡𝑚 cos 𝜓𝑔 𝑘𝑇0 𝐹𝑁 2𝑉 sin 𝜃𝑠𝑞
which is basically equivalent to the myriad forms presented in Appendix B of reference 1 (however
they always assumed broadside collection, so sin 𝜃𝑠𝑞 was always 1).
B.5 Creation of AFSIM Pseudo-Images
AFSIM does not produce true images, but rather produces pseudo-images that indicate the
objects that are in the image, the number of resolution cells (pixels) occupied by the object, and the
intensity of the object.
The user cues the system to the desired location and turns the system on. The model
constructs a list of the targets that could potentially be in the image. The target list will
encompass targets that are slightly outside the image region in order to account for the
fact that a target may move into the image.
At periodic intervals (defined by ‘frame_time’, default of 1 second), the model
computes and accumulates data for each of the targets from step 1. The results of these
detection results will be accumulated, much as a SAR accumulates pulses. If the target
is obscured by terrain during a given sample, it will not have any contributing pulses
defined during that interval.
At some point, the SAR will be turned off. At that point the model will take the
accumulated results and produce the pseudo-image (WsfImage) and send a message
containing the image (WsfImageMessage) to those who have subscribed.
38
Step 1 computes the anticipated dwell time (𝑡𝐷 ) and the number of pulses to be collected
(𝑛𝑖𝑚𝑎𝑔𝑒 ). In addition, it calculates the anticipated value of 𝐶𝑁𝑅.
For each sample in step 2, the number of pulses received during the sample interval is:
𝑛𝑠𝑎𝑚𝑝𝑙𝑒 = 𝑓𝑝 𝑡𝑠𝑎𝑚𝑝𝑙𝑒
The number of resolution cells (pixels) occupied by the target for a given sample is the
projected area of the target (optical cross section) divided by the size of a resolution cell:
𝜎𝑜𝑝𝑡
𝑁𝑃𝑠𝑎𝑚𝑝𝑙𝑒 =
𝛿𝑎 𝛿𝑟
The received power per resolution cell from the target during the sample interval is:
𝑆𝑁𝑅𝑖𝑚𝑎𝑔𝑒 𝑛𝑠𝑎𝑚𝑝𝑙𝑒 1
𝑃𝑠𝑎𝑚𝑝𝑙𝑒 =
𝑁 𝑛𝑖𝑚𝑎𝑔𝑒 𝑁𝑃𝑠𝑎𝑚𝑝𝑙𝑒
Note that the noise has been removed from the accumulation. This must be done to account
for the possibility that in some samples the target may not be visible, or that the actual dwell time
may be longer or shorter than what was initially computed. The other terms account for the fact
39
𝑁𝑠𝑒𝑒𝑛 = 𝑁𝑠𝑒𝑒𝑛 + 1
𝑃𝑠𝑢𝑚 = 𝑃𝑠𝑢𝑚 + 𝑃𝑠𝑎𝑚𝑝𝑙𝑒
𝑁𝑃𝑠𝑢𝑚 = 𝑁𝑃𝑠𝑢𝑚 + 𝑁𝑃𝑠𝑎𝑚𝑝𝑙𝑒
In step 3, the achieved clutter-to-noise ratio must be computed. It is done at this point because
the actual number of pulses collected is now known (the user may choose to turn the system off
before or after the time required).
𝑛𝑎𝑐𝑡𝑢𝑎𝑙
𝐶𝑁𝑅𝑎𝑐𝑡𝑢𝑎𝑙 = 𝐶𝑁𝑅
𝑛𝑖𝑚𝑎𝑔𝑒
If 𝐶𝑁𝑅𝑎𝑐𝑡𝑢𝑎𝑙 is greater than or equal to 𝐶𝑁𝑅𝑚𝑖𝑛 , the image will be declared acceptable and
will contain the targets as processed below. If image is declared unacceptable, the image will be
produced with no targets.
The reference signal level will be defined to be:
𝐶𝑁𝑅𝑎𝑐𝑡𝑢𝑎𝑙
𝑃𝑟𝑒𝑓 =
𝑁
If the image is declared acceptable, the following will be produced for each target:
The number of pixels (resolution cells) occupied by the target. This will just be the average
of the pixel counts from each sample where there target was not obscured by terrain:
𝑁𝑃𝑠𝑢𝑚
𝑁𝑃 =
𝑁𝑠𝑒𝑒𝑛
The intensity of the pixel is then computed. The integrated return from a resolution cell (aka,
clutter cell) represents the ‘zero’ intensity, or the return that will return a pixel value of zero.
𝑃𝑠𝑢𝑚 − 𝑃𝑟𝑒𝑓
𝐼=
𝑃𝑟𝑎𝑛𝑔𝑒
A value less than zero is clamped to zero, while values greater than one are clamped to one.
B.6 References
1. Doerry, Armin W., “Performance Limits for Synthetic Aperture Radar - second edition”,
Sandia National Laboratory Report SAND2006-0821, 2006.
2. Johnson, Jeffery, “AFSIM Communications, Sensor and Jamming Equations”, Boeing
3. Renaud, Matthew J., “Synthetic Aperture Radar Mode Constraints”, Boeing, 2007
4. Skolnik, M., Radar Handbook, 2nd edition, New York: McGraw-Hill, 1990.
40
The general coding approach to implementing the EW techniques in AFSIM was to follow
an Object-Oriented (OO) approach/framework allowing for easier addition/update of new EW
effects, while adding some complexity on the positioning of data and methods within the
architecture. The EW architecture was further divided into Electronic Attack (EA) and Electronic
Protect (EP) classes, with ES being considered in another part of the AFSIM architecture. Each of
the EA and EP classes has multiple techniques, each with their own predefined and user-defined
characteristics known as effects that the technique supplies as shown in Figure C-1.
41
Jamming Suite
Jamming System
(Band 1)
Jamming System
(Band 2)
Jamming System
(Band 3) ….. Jamming System
(Band N)
…..
Transmitt
er 1
Transmitt
er 2
Transmitt
er N
…..
EA
EA
EA
42
…..
Receiver
1
Receiver
2
Receiver
N
…..
EP
EP
EP
EW
EA EP
Effect 1 Effect 2 Effect N Effect 1 Effect 2 Effect N Effect 1 Effect 2 Effect N Effect 1 Effect 2 Effect N
43
WSF_COMM_EFFECT
o Induce communication effects
WSF_COVER_PULSE_EFFECT
o Induce cover pulse effects with probabilities
WSF_FALSE_TARGET_EFFECT
o False-Target effect with track creation
o Pulse type effect
WSF_POL_MOD_EFFECT
o Derives from the WSF_SLC_DEGRADE_EFFECT with the addition of some
data to model a polarization modulation technique
o Induces a degradation on the EP SLC effect
WSF_POWER_EFFECT
o Jammer gain/degrade effect
o Base type for most effects
WSF_PULSE_EFFECT
o Pulse level effects
o Base type for other pulse level base types
WSF_RADIUS_EFFECT
o Target/Jammer/Radar trio radius effects
WSF_REPEATER_EFFECT
o Application of repeater jamming effects
WSF_RPJ_EFFECT
o Random Pulse Jamming/ Modulation (RPJ/RPM) effect
o Pulse type effect
WSF_SIMPLE_FT_EFFECT
o Simple False-Target effect w/o track creation
o Pulse type effect
WSF_SLC_DEGRADE_EFFECT
o Extra SLC degradation factors
WSF_TRACK_EFFECT
o Induce track error effect(s)
These EA effects also utilize inheritance from base classes within AFSIM, as depicted in
Figure C-5, that are also able to have their input commands used within the inheriting class from a
command input level.
44
WSF_AGILITY_EFFECT
o Frequency and/or mode agility/diversity effects
WSF_COMM_EFFECT
o Mitigate communication effects
WSF_POWER_EFFECT
o Jammer gain/degrade effect
o Base type for most effects
WSF_PULSE_EFFECT
o Pulse level effects
o Base type for other pulse type effects
WSF_PULSE_SUPPRESS_EFFECT
o Pulse Suppression effect for pulse type EA effects
o Pulse type effect
WSF_SLB_EFFECT
o Sidelobe Blanker effects
WSF_SLC_EFFECT
o Sidelobe Canceller effects
45
These EP techniques also use inheritance from base classes within AFSIM, as depicted in
Figure C-6, that are also able to have their input commands executed within the inheriting class
from a command input level.
46
Mapped
Effect Coherency
Description Jamming Power
Types
Type
Pulsed-Noise Pulse jamming powered that acts like noise to a receiver. Non-Coherent Pulse
Coherent (continuous and/or pulsed) jamming power that Coherent & Coherent
Coherent
acts like a signal to a receiver. Pulse
Within most interactions the signal-to- interference (S/I) ratio is calculated using the signal
power divided by the noise power + clutter power + jammer power. The jammer power used for
the interference is the noise + pulse (non-coherent) jammer power.
47
Power Default /
Aggregation
Effect Description Undefined Modifying Effect(s)
Type(s)
Variable Value
Jamming blanking
Blanking
factor (e.g., sidelobe Multiplicative 1.0 WSF_SLB_EFFECT
Factor
blanker).
Jamming cancellation
Cancellation WSF_SLC_EFFECT ,
factor (e.g., sidelobe Minimum 1.0
Factor WSF_SLC_DEGRADE_ EFFECT
canceller).
Jamming
processing/modulation
Modulation
type factor, not to Multiplicative 1.0 WSF_POWER_EFFECT
Factor
physical jamming
power factor.
Jamming
Jamming physical WSF_POWER_EFFECT,
power Multiplicative 1.0
power factor. WSF_COVER_PULSE_ EFFECT
Factor
Alternate jamming
processing/modulation
type that has a
J/X Factor Multiplicative 1.0 WSF_POWER_EFFECT
Jamming-to-
Signal/Noise
dependency.
Flag to specify
whether or not
Target
jamming power will Undefined
Protection undefined Base Effect
be allowed to interact Boolean
Flag
with the receiver for a
given target or not.
Pulse
Pulse type jamming
Suppression Multiplicative 1.0 WSF_PULSE_SUPPRESS_ EFFECT
suppression factor.
Factor
48
Random pulse
RPJ Factor Multiplicative 1.0 WSF_RPJ_EFFECT
jamming factor.
Maximum
Track azimuth
Azimuth Error (EA) / 0.0 WSF_TRACK_EFFECT
error.
Minimum (EP)
Maximum
Track
Elevation Error (EA) / 0.0 WSF_TRACK_EFFECT
elevation error.
Minimum (EP)
Maximum
Track range
Range Error (EA) / 0.0 WSF_TRACK_EFFECT
error.
Minimum (EP)
Maximum
Track velocity
Velocity Error (EA) / 0.0 WSF_TRACK_EFFECT
error.
Minimum (EP)
49
Message
Message Undefined
Drop/Maintain undefined WSF_COMM_EFFECT
drop/maintain flag. Boolean
Flag
Aggregation
Description
Type
The maximu m of the interaction value and current effect value being applied is taken and used
Maximum
as the interaction value.
The minimum of the interaction value and current effect value being applied is taken and used
Minimum
as the interaction value.
The addition of the interaction value and current effect value being applied is used as the
Additive
interaction value.
The multiplied product of the interaction value and current effect value being applied is used as
Multiplicative
the interaction value.
A true/false (i.e., two-state) flag that can be toggled based on the current value and logging of
Boolean
the effect.
Similar to the Boolean aggregation type, except an undefined state along with the true/false
Undefined (i.e., three-state) is available as a value. This type can be toggled from undefined (its most
Boolean common default state) to true/false (i.e., defined) and toggled between the three states
thereafter based on the current value and logic of the effect.
50
51
52
53
54
55
56
The Boeing Company developed and funded the AFNES simulatio n framework through
internal research and development (IR&D) funding from 2003-2014. Beginning in 2005, Boeing
began developing a customized AFNES capability to simulate threat Integrated Air Defense
Systems (IADS) to assess advanced air vehicle concepts performing Precision Engage me nt
missions. The requirements of this new IADS simulation capability included being able to match
results with the Air Force-approved mission level model. The reason for developing an AFNES
alternative to the Air Force IADS modeling capability relates to the limitations associated with the
Air Force mission level model. Examples of areas in which the Air Force mission level model is
lacking include: expansion of representations of Electronic Warfare (EW) techniques; the
integration of independent tracking and correlation systems; utilization of vendor-supplied auto-
routers and mission optimization capabilities; net-centric communications systems; the
contribution of Space assets; and integration of special, existing models, such as AGI’s System
Tool Kit (STK).
The AFNES IADS capability became operational in 2008, and is currently being utilized by
multiple Boeing development programs, as well as government contracted programs, to assess the
ability of advanced air vehicle design concepts to penetrate advanced Air Defense networks and
conduct precision engagement missions. Because the Air Force is also interested in analyzing future
vehicles in the area of persistent and responsive precision engagement, this capability has been
briefed to Air Force personnel at various times over the previous five years. In 2010, the
AFRL/RQQD Aerospace Vehicles Technology Assessment & Simulation (AVTAS) Lab (formerly
AFRL/RBCD) commissioned a trade study of M&S Frameworks for the purpose of assessing
potential alternatives to replace or augment their current constructive simulation environment. The
result of the AFRL trade study was the selection of AFNES as the best M&S framework to meet
their air vehicle mission effectiveness analysis requirements.
Under contract, Boeing delivered AFNES to the Air Force (specifically AFRL/RQQD) with
unlimited government rights (including source code) in February 2013. AFRL/RQQD re-branded
AFNES as the Advanced Framework for Simulation, Integration, and Modeling (AFSIM) and has
started to distribute AFSIM within the Air Force and DoD, including DoD contractors. One of the
key focus areas for AFSIM has been the simulated representation of IADS, and the utilization of
verified and validated Air Force scenarios and threat representations distributed with the Air Force
mission level model. AFSIM provides expanded Modeling & Simulation capabilities to support
mission- level analysis studies related to global strike and other research activities.
57
58
59