76
AD-A246 881 Report No. NADC-90104-70 FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT REQUEST FOR PROPOSAL REQUIREMENTS REPORT G. Terry Thomas Systems and Software Technology Department (Code 7012) NAVAL. AIR DEVELOPMENT CENTER Warminster, PA 18774-5000 1 NOVEMBER 1990 FINAL REPORT D TIC Task No. 20500076 Work Unit No. EB180 ETE D Program Element No. APN S MAR0 41992 Appro. -d for Public Release; Distribution is Unlimited ..... Prepat ?d for NAVA. AIR SYSTEMS COMMAND Washington, DC 20362-1205 92-05067 i I' f ' j

FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

Embed Size (px)

Citation preview

Page 1: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

AD-A246 881

Report No. NADC-90104-70

FLIGHT SIMULATION TRAINER THREATENVIRONMENT REQUEST FOR PROPOSALREQUIREMENTS REPORT

G. Terry ThomasSystems and Software Technology Department (Code 7012)NAVAL. AIR DEVELOPMENT CENTERWarminster, PA 18774-5000

1 NOVEMBER 1990

FINAL REPORT D TICTask No. 20500076Work Unit No. EB180 ETE DProgram Element No. APN S MAR0 41992

Appro. -d for Public Release; Distribution is Unlimited .....

Prepat ?d forNAVA. AIR SYSTEMS COMMANDWashington, DC 20362-1205

92-05067

i I ' f ' j

Page 2: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NOTICES

RE 'ORT NUMBERING SYSTEM - The numbering of technical project reports issued by theNE, 31 Air Development Center is arranged for specific identification purposes. EachnfL - ber consists of the Center acronym, the calendar year in which the number wasas gned, the sequence number of the report within the specific calendar year, and theoft:sial 2-digit correspondence code of the Command Officer or the Functional Departmentre;: onsible for the report. For example: Report No. NADC-88020-60 indicates the twentlethCenter report for the year 1988 and prepared by the Air Vehicle and Crew SystemsTechnology Department. The numerical codes are as follows:

CODE OFFICE OR DEPARTMENT

00 Commander, Naval Air Development Center

01 Technical Director, Naval Air Development Center

05 Computer Department

10 AntiSubmarine Warfare Systems Department

20 Tactical Air Systems Department

30 Warfare Systems Analysis Department

40 Communication Navigation Technology Department

50 Mission Avionics Technology Department

60 Air Vehicle & Crew Systems Technology Department

70 Systems & Software Technology Department

80 Engineering Support Group

90 Test & Evaluation Group

PRCDUCT ENDORSEMENT - The discussion or instructions concerning commercialproducts herein do not constitute an endorsement by the Government nor do they conveyor imply the license or right to use such products.

Revi- wed By: ,_ _ _ _ _ _-_ _ _ AL Date:BrarA Head

Reviewed By: V-_ _ / __ Date:6visiokHead

Reviewed By: Date: 7/_/s

DirectorlDepu Director

Page 3: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

UnclassifiedSECUR,'Y CLASSIFCAT!ON OF THIS PAGE

REPORT DOCUMENTATION PAGE Form Approved

I OMB No 0704-0188la REPORT SECURITY CLASSIFICATION lb RESTRICTIVE MARKINGS

Unclassified2a SECURITY CLASSIFICATION AUTHORITY 3 DISTRIBUTION /AVAILABILITY OF REPCRT

Approved for Public Release;2b DECLASSIFICATION' DOWNGRADING SCHEDULE Distribution is Unlimited

4 PERFORMING ORGANIZATION REPORT NUMBER(S) 5 MONITORING ORGANIZATION REPORT NUMBER(S)

NADC-90104-70

6a NAME OF PERFORMING ORGANIZATION 6b OFF;CE SYMBOL 7a NAME OF MONITORING ORGANIZATIONSystems and Software (If applicable)

Technology Department 7012

6c ADDRESS (City, State, and ZIP Code) 7b ADDRESS(City, State, and ZIP Code)NAVAL AIR DEVELOPMENT CENTERWarminster, PA 18974-5000

8a NAME OF FUNDiNG SPONSORING 8b OFFICE SYMBOL 9 PROCUREMENT INSTRUMENT IDENTIFICATION NUMBERORGANIZATION (If applicable)

NAVAL AIR SYSTEMS COMMAND I8c ADDRESS (City, State, and ZIP Code) 10 SOURCE OF FUNDING rUMBERS

Washington, DC 20362-1205 PROGRAM PROECT TASK iOPR UNTELEMENT NO NO NO ACCESSION NO

APN 0 0500076 EBI80

11 TITLE (Include Security Classification)

Flight Simulation Trainer Threat Environment Request For Proposal Requirements Report

12 PERSONAL AuTHOR'S)

G. Terry Thomas'3a TYPE OF REPORT '3b TIME COVERED 14 DATE OF REPORT (Year, Month, Day) *5 PACE CONJ-

Final FROM TO 1990 November I!6 SUPP-EMEN'ARY NOTATION

17 COSA'! CODES 18 SUBJECT TERMS (Continue on reverse if necessar and identify b block number)

9:E) GPOLP SLB GOUP Simulation Modeling

Flight Simulators Threat Environment

19 ABST

RACT (Continue on reverse if necessary and identif. by block number)

This report presents some details regarding the procurement of a Simulated ThreatEnvironment, including mission requirements,the threats required to accomplish themission requirements, the threat fidelity, the threat features, the methodologyrequired to produce these threats and the validation tests to insure that the finalproduct meets the original systems specifications.

20 DISTR;BIJ*iON AVA LAB ?Ty O' ABSTRACT 21 ABSTRACT SECURITY (LASSIF,(ATION

[C JNCLASS1F'ED LNLIM'-ED [1 SAVE AS RPT 0 DTIC LISERS Unclassified22 NAME OF RESPONSBEL %Di ,IDA, 22b TELEPHONE (Include AreaCode) 22 OfFiCE SYMB.,

G. Terry Thomas (215) 441-2103 7013DD Form 1473, JUN 86 Previous editions are obsolete ___SL(PTY (ASS _CA' O ()% T- S AuE

S/N 0102-LF-014-6603 Unclassified

Page 4: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC -90104-70

TABLE OF CONTENTS

Page

Figures ivTables VAcknowledgements vi

Section Title

1.0 Summary 1

1.1 Introduction 11.2 Background 21.3 Conclusions & Recommendations 5

2.0 Threat Environment Performance 6Specificaiton

2.1 Training Mission Requirements 62.2 Threat List Requirements 62.3 Threat System Specifications 102.4 Threat Model Features 162.5 Threat Fidelity Requirments 222.6 Threat Model Data 322.7 Threat Validation Methodology 35

3.0 Threat Environment Development 35

3.1 Systems Architecture 373.2 Threat Memory and Computational Time 37

Requirement3.3 Model Architecture 37

4.0 References 40

Appendix A F-14D Trainer Request-For-Proposal Threat Environment

Appendix B F-14D Trainer Proposal List of Threats

Appendix C F-14D Trainer Request-For-Proposal Ownship FidelityRequirements

iii

Page 5: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

FIGURES

Figure 1 Threat Environment Development Process

Figure 2 Pictorial of the Threat Environment

Figure 3 Threat NATO names

Figure 4 Adversary Aircraft Threat Model System PerformanceSpecification

Figure 5 F-14D Trainer Threat Validation Procedure

Figure 6 Threat Environment Systems Architecture

Figure 7 MIL STD 2167 Review Schedule with Design Factors Requested

iv

Page 6: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

TABLES

Table 1 Generic Mission Definition for UTSS

Table 2 Missile Threat Model System Performance Specification

Table 3 Electronic Warfare Model System Specification

Table 4 Gun Model Performance Fidelity Specification

Table 5 General Aircraft Model Features

Table 6 General Missile Model Features

Table 7 Electronic Warfare Model Features

Table 8 Specific Aircraft Fidelity Requirements

Table 9 Missile Fidelity Requirements

Table 10 Specific Missile Parameters

Table 11 Electronic Warfare Simulation Fidelity Requirements

A006881

Aooasaloj Fo_

DTIC TAB 0Unannounced

Jut ltlcation

By

Distributi alAvallability Codos

Avail and/orv Dist Special

Page 7: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

ACKNOWLEDGEMENTS

This report was written using information provided to me during the deve-

lopment of threat environments for several programs. This information was pro-vided by FAAC Inc., Veda Corporation, Information Spectrum Inc, Tom Galoway(NTSC), and Alfred Gramp (NADC).

Specific aknowledgements are provided if a figure or table was generated

exclusively by an individual. Most figures or tables were generated by myselfand a combination of the above persons.

vi

Page 8: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-7O

SUMMARY

The Navy is continually contracting for a Trainer Threat Environment withoutcarefully generating a complete specification detailing exactly what is desiredand how the development process will insure an optimum product. This report willprovide some detail regarding the procurement of a simulated threat environment.The Threat Environment development process includes; identifying the missionrequirements, the threats required to accomplish the mission requirements, thefidelity of the threats required to accomplish the mission requirements, themethodology required to produce these threats, and the validation tests to insurethat the final product meets the original systems specifications. The ThreatEnvironment Development Process is illustrated in Figure 1.

This report will also discuss each of the Threat Environment developmentblocks that are required for an effective Threat Environment Request ForProposal (RFP). A threat Environment, illustrated in Figure 2, will be definedas any aircraft (friendly or enemy excluding ownship), any missile (Friendly orenemy including ownship missiles), any sensor (friendly or enemy includingownship sensors), any ship (friendly or enemy), any ground site/platforms(friendly or enemy), any gun system (friendly or enemy), and any jammers, decoysor flares.

Page 9: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

1.1 BACKGROUND

The NAVAIRDEVCEN with NAVAIR (Code PMA-205) as a spo..sor, has beeninvolved in the design of trainer threat environments for several years,including system specifications, fidelity requirements, validation test pro-cedures, identificaiton of threat data, generation of high fidelity threatmodels and incorporation of threat models into flight simulators andtrainers. The two major threat environment development programs that theNAVAIRDEVCEN has supported in the past several years are: the F-14D TrainerDevelopment Program, and the Universal Threat System for Simulators (UTSS)Program.

The F-14D Trainer System includes five trainers located at NAS Oceana,VA, and five trainers located at NAS Miramar, CA. There is a dual domeWeapon System Trainer and three mission Flight Trainers at each location.The F-14D Trainer Threat Environment Request for Proposal Requirements arepresented in Appendix A, for reference. As the development of the F-14DTrainer Program progressed certain factors regarding the threat environmentenvolved. Issues regarding threat fidelity, validation, memory require-ments, computational time and systems architecture, identified the need formore detail in the original Contract Request for Proposal Specification.

The NAVAIRDEVCEN defines the UTSS concept as a Threat EnvironmentDevelopment Process. The NAVAIRDEVCEN identifies the final product as acatalog of threat models, including high and low fidelity threat models,classified and unclassified threat models and models, provided in FORTRANsoftware and in ADA software. The development process would include thegeneration and update of Systems Performance data and curves to be used inthe generation of the treat model. The process will also include the iden-tification of specific data sources to be used in the generation of thethreat models, the validation of the threat models in an off-line computer,and maintenance of the threat environment, including strict configurationmanagement. As the Universal Threat System for Simulation (UTSS) Programprogressed certain threat environment issues evolved identifying the needfor more specific detail regarding mission requirements, threat fidelity,model features, threat model data and validation methodology.

This report is intended for all flight simulation engineers requiringsimulated threat models in their facilities.

2

Page 10: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

z4w-

z

I-=4c w

I-- U-z LzC.)0

4cc

I--M z z

_ q4 0

> zjw

zX LI-

Z w0

_j3W>

Page 11: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

9L 0 1

0~ I

06 -K

0

0I0.

ell --

UU

Page 12: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

1.3 CONCLUSIONS AND RECOMMENDATIONS

The generation of a threat environment Request For Proposal (RFP) for atrainer or research flight simulator, requires the inclusion of the training ormission tasks, threats required to accomplish the tasks, fidelity of the threatsto accomplish the tasks in an optimum manner, and identification of the threatmodel data sources.

Providing the threat System Specification (real world data to generate thethreat model), and the specific model features required to meet the fidelityrequirements, are valuable inputs in obtaining a high quality threat environ-ment. The Systems Specification is used to validate the threat model. Thisinformation is difficult to obtain in a reasonable schedule. It must, however,be either provided in the RFP, or the contractor must be required to provide thedetails early in the threat environment development. Providing the generalmethodology in which the government will use to validate the threat models must bein the RFP to emphasize the fact that valid models are expected, as the product.

Requiring a specific design schedule in the RFP, for presenting analysis ofthe Systems Architecture, Threat Memory and Computation Time and ModelArchitecture designs, is important so that the threat environment development isin agreement with the governments desires.

5

Page 13: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

2.0 Threat Environment Performance Specification

Information required in the Threat Environment Specification Section of theRequest For Proposal should include the Training Mission Requirements, ThreatTypes, Systems Performance Specification (Threat Model Features & ThreatFidelity Requirements), Threat Data Source, and Threat Validation Methodology.Each of these subjects will be discussed in this section of the report.

2.1 Training Mission Requirements

The specific mission scenarios or training missions should be identified inthe RFP to help bound the Threat Environment requirements. For example, if aair combat maneuvering (ACM) mission is required, then high fidelity adversaryaircraft models are required. Training missions include Familiarization, BasicInstruments, Radio Instruments, Airways Navigation, Operational Navigation,Formation, Night Familiarization, Air-to-Air Gunnery, Air-to-Air WeaponDelivery, Air-to-Ground Weapon Delivery, Air-to-Surface Weapon Delivery, Carrier

Landing, Air Escort, Threat Suppression, Mission Support, and Air CombatManeuvering.

Not all these training missions need threats, so it is important to iden-tify the specific mission requirements for a specific RFP and to identify therequired tahreats to accomplish the mission objectives.

A second level of training missions might be useful. For example, Table 1,extracted from an Information Spectrum Incorporated UTSS presentation detailstrainer mission tasks, typical activities under the trainer missions, and typi-cal ownship aircraft used for these activities.

2.2 Threat List Requirements

For each training mission identified in the RFP, a list of specific threatsrequired to accomplish the mission should be generated.

The approach used in the F-14D Trainer RFP, as detailed in Appendix A, was

to identify an overall threat environment support for all F-14D aircrafttraining mission tasks. This threat environment identified the need of 32

aircraft types, 18 antiship missile types, 24 air-to-lir missile types, 18surface-to-air missile types, 12 ship types, 128 ground site/platform types, 24

jammer types, and 128 radar/missile system/fire control system types. Shortlyinto the program the specific threats for each category were identified by theF-14D Fleet Project Team. This list is presented in Appendix B. This is a good

list of threats in which a person can pick and choose for typical training

missions.

Most trainer programs do not require a full threat environment. Providing

a large threat environment is expensive, so it is important to correlate thespecific required threats to the trainer missions. Selective threat type andtheir NATO names are presented in Figure 3.

6

Page 14: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90 104-70

LL

cc U

Cc U.

!7c OW ,Cj

62UL 2"eq LA

-U, 0 <"'

I.-.

V3 0 W

1 0 Ar~

O~CD mnI- <I- Li)x.,. *wc

u. U<- ow. (n ~ ,. m z ecr 0 Ia,- W z0U' C O-

< Id it cc UJO-w3W .w .

<L I- z -j

0- 1 2w Utn 1.U-, . x

02 0,

0

LA.-

U(0 -1 U0-iiiD Z) iU 0

M 0 cc 7

Page 15: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

NATO NAMES

BOMBER/STRIKE AIRCRAFT

BACKFIRE - Tu-22MBADGER - Tu-16BEAR - Tq-20/Tu-142BISON - Mya-4BLACKJACK - Advanced Strategic BomberBLINDER - Tu-22BREVER - Yak-28

SPECIAL-MISSION CARGO/TRANSPORT AIRCRAFT

COOT - 11-20CRATE - 11-14CUB - An-12

FIGHTER/FIGHTER-ATTACK AIRCRAFT

FENCER - Su-24FIDDLER - Tu-28FIREBAR - Yak-28PFISHBED - MiG-21FITTER - Su-20/22FLAGON - Su-15FLANKER - Su-27FLOGGER - HIG-23/27FORGER - Yak-38MPFOXBAT - HIG-25FOXHOUND - HIG-31FROGFOOT - Su-25FULCRUM - MIG-29

HELICOPTERS

HALO - MI-26HAVOC - "Hi-28HAZE - MI-14

HELIX - Ka-27HIND - Mi-24HIP - Mi-8HOKUM - Advanced-Technology HelicopterBOOK - Hi-6HOOP - Mi-29HOPLITE - Mi-2HORMONE - Ka-25HOUND - Mi-4

Figure 3. Threat NATO Names (sheet 1 of 2).

. . , ,i iI I I I

Page 16: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

HISCELLANEOUS/MARITIME AIRCRAPT

MAIL - Be-12MAINSTAY - 11-76MAY - 138MOSS - Tu-126

SURFACE-TO-AIR MISSILE SYSTEMS (LAND)

SA-1 (GUILD): Yo-Yo RadarSA-2 (GUIDELINE); Fan Song and Spoon Rest RadarsSA-3 (GOA): Low Blow and Flat Face RadarsSA-4 (GANEF): Pat Hand RadarSA-5 (GAMMON): Square Pair RadarSA-6 (GAINFUL): Straight Flush RadarSA-7 (GRAIL): IR missileSA-8 (GECKO): Land Roll, Thin Skin, Flat Face and Long Track RadarsSA-9 (GASKIN): IR missileSA-1O (No NATO name)SA-11 (No NATO name)SA-X-12 (No NATO name)SA-13 (GOPHER) IR missileSA-14 (No NATO hame) IR missile

SURFACE-TO-AIR MISSILE SYSTEMS (NAVAL)

SA-N-1 (GOA): Peel Group RadarSA-N-3 (GOBleT): head Light RadarSA-N-4 (GRECHKO): Pop Group RadarSA-N-5 (GRAIL)t IR missileSA-N-6 (GRUMBLE): Top Dome RadarSA-N-7 (GADFLY): Front Dome RadarSA-N-9 (No NATO name): Cross Sword Radar

Figure 3. Threat NATO Names (sheet 2 of 2).

9

Page 17: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

2.3 THREAT SYSTEM SPECIFICATIONS

The Threat System Specification is defined as the real world datadescribing the performance of a threat to enable modeling of this threat. Thegenerated threat model is measured against this real world data during the vali-dation process.

(a) Aircraft System Specification

Typical Adversary Aircraft System Performance Specification Curves arepresented in Figure 4. These curves are a representative sampling of the curvesrequired.

(b) Missile System Performance Specification

Table 2 details the general missile performance specifications formissiles launched at/by ownship and missiles not launched at/by ownship.A value is required for each specific missile. A tolerence is presented foreach value to provide the allowable difference between an existing model valueand the required model value, as well as differences between reference models.

(c) Ground Based (EW) Surface-to-Air Missile Site System Specifications

Table 3 details the general ground based missile site system specifi-cations that should be modeled to obtain the appropriate fidelity.

(d) Aircraft Gun System Performance Specification

Table 4 details the performance specification for aircraft gun systems.

10

Page 18: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

n I't U

0 M

Z cl

V-4o ," I ',o

QC

z m I

cr V1w

54

Cii ~,...,

2 > .

M+

P 0

4 fV'-. ... ,

l

I : ilil I I I I I I I I I

Page 19: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

V) LU

-L ' )L D L- CU) CD v) -Cl LU LL- LUm) LU -, m- V )

C)cx iL LL*, -- 44-

C) C) C CD '-D CD CD CDCi CD C) w- U'' '

CD P4 arD &Q a4- -4 C-J QC-D a.j CN R C1 C-J'N L

(14 CC4<LU + ~ +-4 +LU 1 1 +

+~ +

Ci~ U) ii ii iiz CD CD

on

eC Cifr-C-DCw "', c 1LU-j co -- m. LU CD

3 LU- W U)- Ll LU

LU '-4 - L LU, C

00 --J CD I-- - CD C)

M) LU wLL..CWi CZ> C)A Ur N M

U) - = r_ C)- r C) Crcr- ar r) LCr ) ) C)

i-C) CD C) - L

+-f ~C 1 +1 + 1 +1 + I + +1 +1+1

2: C)Uw

'I-4 JI C' Z

-JU)C~C3

CDuz V)-

-4f LA-

CDCW

Ci Of CDC C UL

CD Cr C C r DC

Of C r U) - U- C)4- Cr CD DUj t, 1 C1 CD Q: r 4- i - -- CD M:Cl-C j CD ) I I ju I-Cr LUW JnU _

CD C) w Li C U V ) cx ID CD CD

LT LU:r U ) C C)0 ucr -J L -j CD C) CZ >0U C C M M JUJ cr U) LUJ C -) 2C)CD -4: - LUrL -~i wU)m w -4- pC CD

Cr ~ I- ~ ~ J LCix >-4 -L U _CrU C D Di~ 7:J. C)0 XC CDI I-4 L

UU 0--4 1Cr '-cr = <ELwCD -j ->Cr< ui ><Of wr CW <- r C) CrC

-0 D CDLU C

12

Page 20: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90 104-70

Vr) V) LU LUV L) LP)

-4 - LL- =

V) L±) LCI -4 C -

ZCND CD~ CD D

LCi UUU L-U

LUWZ: L

z _

LO LULi Li2

u C-

V) -n L-i Li

-. C) LO) -

I i L. C,-J CD W-

U- Ci) C:)

Lf~ ~ C)CD. C

Ln mi

LL- CD C) C=) C)

u J

Lin

-m LtnCD U .

LU CD V)-L

wU Q- C- CD

LU ;C) Z: >P-- P-- Li -

-- 4

j-

13

Page 21: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

U- :; Z Z ::

LU LU D 1LU 1-) Cti LUL U U

: LO ui - = =C 4 L3 MD C3 C34 L -4 C3 C3 C3C3U

CD ~ ~ I LU CZ Z) CD af cr cz zDC' X z-Cr

L:U LU CD C: LU LU L') LU LU LULCLD

u j -J )e* 4m 1 CD CDJ CD CK C:)o i LU ) L- - rcU)uCi C) L) or~ ~-4 L- jc -C:) = = . - -*- C=: =) Mi --

CL) U- W L + + + L,.. U- + +1 LL. LL- LL. + + U-.. + U- + + + ILUa-

Ln

z

C-D

z U CCC1 P -2C) '-

CD .m) '-4CD ~)c~I)CD __j~

I-- *--I co C)C)2I:zI -j cz C

Li C=I 2r CD <r- LL iaJ LL

Z1LU -J2 CD cr CD :> LU CW C D 'LU1 .JI cz LU Co < c:- -i cD _j L/C LUJ .* ~-Jcl CD a Cr of >- Q:: C-) LDLi- V) zzD >- CD p- i -- l >n -'i Z: Ci >

( 'r CDIm Z- CL- :zr- LL- Ln Z:- i J L C-n LU -L ' CD V)LL CD > - LUJ L *uj I- i C D i C)n =: C) U - 7D 2!>:I U IC) U CD <c U : C-) icLUJ -- t-- LU C CDC) LU CD '-A LU CO L LU W LU 2- CD0 LU (I) CD0 LU Z.J C3

-j r- M: I- (=) C) I- C LU Cr - = =r M:. C-D LU CL~w LU r LU -~ LU CD U) :z <r = -4 LUJ c: -- 4 Cc ctrZ i- CD0 C) LUJ c: _.j Mt cx I) I- LUJ L/) L- LU c

-i-LJ

LO

rLU-C-D LU LU

czCD CC LUJ7: U-LALU- Z C) LUj;Z L LU C:)CCD V)C/ C)j

m -C LI) L/) Of -C) CZ L) r-) CDN:1u LC-)C) CZ Cr L)U

14

Page 22: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

C-3 C)

- CD -

CD LU '- CD

CX - CD Bxe C=) CD ap C=)LL-- ~ C LCI .-

Li+ + + + + +0-

V-))

CD c:=c CD

LL CD

w C-) CL- C=)

CD --

CLn (1) LU

LU O

CD > - CD*> UU 9- () J /

-~~ CCD I LU C) -cn cr CD L')

:27 CL C-) m

U* ) m-~ C -4 M:

C=) tf Ln

15

Page 23: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

2.4 THREAT MODEL FEATURES

The threat model features are the requirements that the threat modelmust include for the model to replicate the real world data with the fidelityrequired to accomplish the training task.

(a) Aircraft Model Features

Table 5 details the general aircraft features that should be modeledto obtain the appropriate fidelity. This information was provided by TomGalloway (NTSC). The features are needed in four categories of aircraft models;Beyond-Visual-Range, Within-Visual-Range, Close-In-Combat and Ownship.Beyond-Visual-Range Aircraft are defined as aircraft that are at least 15 milesfrom the ownship aircraft. Close-In-Combat Aircraft are defined as aircraftthat the ownship would specifically engage in an air-to-air combat maneuveringbattle. Within-Visual-Range aircraft are defined as those aircraft that areless than 15 miles from the ownship, but will not engage the ownship in air-to-air combat maneuvering. Both Close-In-Combat and Within-Visual-Rangeaircraft may be Interactive Aircraft. Interactive Aircraft know where otheraircraft are in the threat environment and can fire missiles at the ownship.

(b) Missile Model Features

Table 6 details the general missile features that should bemodeled to obtain the appropriate fidelity. Missile features are presented intwo categories; missile launch at/by ownship, and missile not launched at/byownship.

(c) Ground Based (EW) Surface-to-Air Missile Site Features

Table 7 details the general ground based missile site features thatshould be modeled to obtain the appropriate fidelity.

16

Page 24: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

coU

CD- LUH CJ .25

0 JCDM = M)L :Q L C:) MI-H- (J1 = = WU C: Lw O U CD M:~ CD I-- ~ uj \,O

Lf) CD ~cx )-4L/) :cLU :z u) <LwUH-DLj w -j ui ULD C-) 1i -4M < H-) - =CJW L.) <r H-JH--cz+---m D Lu LU CO

:3 V A-; j Ji -<w - Mcz -J C) J O C) cx x cx U 4 = 2M

CD 0-=c c cc x-c: jM_ -0 :cWU

LU CD IEc

'-4 JH- Lu CD 7LU LU)D~ cz -< I CXCD M:-5 N

C3 C C LUz= Cr = LU M CD cLU H- =:m~ LU- C:3 U a_, LU CD '4 LU : M: H- LUw

_j -4 -D JL Ji - >< I CO DZJ C - CD= Ul :wi L C-) :: C) uo LU = 'U- = cz U : - CD -- wi cx -j 7: D a: C-r CJ

, r nC C)C _ =- M i L ff-3:- LDUJ LlU CD0wUH Wi LULU-,::z ) - =C:)- CD cZUJ -* Z

af -)-j ) j a Z afH- O.>-:B: i LU

H- LUU LW--Z: M: =U C

LL- LL CC(I CC)LUL CDD- CD LLiC

LU :- >u ! 1:: L-L U rfCD 3:-Z LL)H- cl)C H-LU I- : CD ac l:

Li Il -ILU DC -iJ I Z __ $C LU): LL =1 L.J C: LUL LU_ LU C-

crI a =--- JH f L- J x <r

LL- LUL _J,-4- ~ cj Mi: ci-) ~ C) -CD

C-CZ

::I Z:= $L I- I 0: I <C

ccICCD L/ -ic LLUCCl <x~- cr J c- CD I

LiJ LU J -4 C - <c -

CZ

LUimC LI/)

Cl CD L/

H- H- ci

Cl) 0:: cr ZLU- M:LW Lii >

H- CD - LC- LLU <Z :9 CD

LUJ of CD C)0Q ca: -Ij LUJ

C)~C C) C)H-=LUL

-4T ZD LU

H-. ct - CL i .T - j

c'-- :ZCD 0- iC-) <r LU n L

17

Page 25: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

CD m

CD U-j LU C)

<t L LU LU -CI

ui - U C L U - LLJL=

U- Z C) 1-4 W / U Z l uJ ca LU CZ Jzr LU: Cm =M:= :< - w m -. -i ~CD Of~ C~-) DrU CD M LL.C)- O

C-0 CD -J -) M <Lu c)z c-L-c )Z = rD J D -L

w C u J - CDU :C - - L ' -4C

*w0car CDM: U U U D C) 71 q L-

*1 z Ig CCC2- cDL C

-L i- U- C )

Ir = CD CfCfL

LUI-i l U)DD- - CC

Q: 2r: - I ::rz w L LUL

2r --4 Ci :c :

U I-

awcr - a--=;; IC~I -4- Cj L L U

Z-- ) C )I 2f>=)0 L )LU -L 3 N-IiiL- C~ 3 C ) -

U-) C)- 2,C z

IfD LU -<r LL -V

CCZ C) If)

z~~I CD Lu uC r

V)CVU 2n C :

N-i C:) C

Lu U LU LfCl. m c - >-

-l -Li CDC)O

L I c-a CU CD

CI -

18

Page 26: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

CD C

CD LU~ U -j C (.nL/) uo/ - LU

w) LU LLU Ml) CD 2-CrCD C)-4CL- Ci cc CD cD e

CD> ->- P-1 W- LU- =LUCD uo) I ) (/L 0= : ci

CDiI* J---l (.1) = u I-C -- -4 :z L./)LU- V), LU cr ID - C-0 Z -4 CD <C - ) = O-J CD C') X=WU _CL I-4 CD cr V) L)LL :co V)V) --I

CD L' V-) L' CT ~CD - - -- 4 LU ck Cr- -U W -~ LU XJcl

CD * -j CCr V) L_) L))'L-) I=:7:L/) U- 0- 1-4 1-1 wU*-4 LU' -4~~-4c LUC Wi of LUW r~U C LLU I-C L D cz i -r- w CI >- M 2t C~ CD F- L) - r) = I- CD L.C) <Cr LU L) 02l c~

Cr COX -Z5 C) = - LU =cz L-C L M C CDD--C C-4 ! m co LJ <:rL= -L; LU-4::: C CJ)L~ -~-L/)C)L fO - D -O J) U:Z Ir- CC-c -

L.i > L -CD -Z -4 L) L. L - C-CD Cr -jZ: f M MI C-~-) CD CL J CD - -1_ -C Dl)<r - LJ=V CD LC) CCD -4C)- = -UC W) -J = Cl IC)W-CD >- Wz L:DcZ- !

C/)= 1./ML/) VQC3=:CrD.' ==CDDcZ 7-Lfl-.,tCCDCD LUJ C) LUi - LUJ LUV- LUJLt0- cr C >- LU = L.iLJc 3C)C - 3O :C L . -> <Z L :: nZ l ~_>

z r ICD 'cL- r C) ,U C Cr LU Li =D - Li1 <C >- C-) ~- J LUJ >- =)D czl C)- cTZ " LU -4 CD CD -4q>- LU cx

:21 I CD- LCD

c:: ~ C3> --U7

wr 2- Cr w' : - CDLJ ~ ~ C: ) LL=

LL I I- (.n C - t

wI It Wi L C-)L .- LUL LUJ

0' C) = CC>-D p- C: CD LUU) o-) 1DW2 J- 4 L~)C 4 CI L/)C)

U') L'I -WC CI & Z LUJt LLL k(-~) UJ I cCC~ -J Li J- '-

a_ Li CL C') C- - cr-Dc

/I C -LUC CLI LLC1 C) CD C

w CDL>C co -CE4r -:: X- L/)CDU1h-CD.J C)ZE Ctf CE LI) t.D

CD'4Lul CD >- :2 WL

LI)Lu

- 7

CD LULCr LUCL LI

LiiV) C)i crc

U)LI CD

-~~M LU E!

CD U)CD

19

Page 27: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

C-)L

-ii LU LU

<Z: CD, Lu

:z LU I->'-4 CD>- m

=1 CD 3: C-)LU >-LU :z- LU CD

LUJ I CD CD mJcfl 1-4 -1 -j=Dflcz

CD _u CXLU -)CL CD I- C

:3Ci LU LUI ~cr -~ :' CD

Cn LU _ r cz L. C-) C) LLU af=: ~ CD0 LU C) '-4 : LU a:r >

2- C-) CCr LU <r U- = CU L L U2:IflC =) ui =D -j u< -ULU

C) j J~ Ui ul .3 LU- 1 L U C ) Cr

~~-4CD -i m) cz czCU -) V

Lui CD < U-) CD LUc --_ 21 >

U Cul V) i= I- CDr

LUJ >< LU) cz U) C= C-DI- -> - LLJ (_ =: L/) Crf

S L -J LUJ )< 4-J c-iLuJ -Li L LUJ CD LU - U C-D 2:yt

-;:I LUr -- COLuJL- c Cr U/) -. Lii cUU) i

OfU JC CD Cl-< -j Lii1 ED

VI) C-iZ:l:iiLL ; CU '-

U) Cr H

C/'~w ) cx WL Li IU -U2. ' :E: - C-D CD H--- i

Uf C-) -j 0- C) L-) LU7- LU -- LU- LU LU - L

LuJ CD~ 7 L iU C:) LL -1 Cr C-) C) LUCZ 2!: CD - LU 1--q LU Cr LUJ LL - CD

Iii -4J U)) 2/ v)~ L L ) U)Z7 ::D Z: LLI Z7- >< Z: LLJ

mcz

LU'--4

I-i Cz

Cr-

CD C

Cr- LUJ

'-D

'--

20

Page 28: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-93104-70

Wi LILU wU Z. LU

C)

cz -iLU LU w.. U LUJ UQ- V ) (In I CD CD M: 0.~CD w) V) ~ LU LU km - CD

~- - ~ ~ M: C) CJ) x- -4 - LU i C) Ln)-i cr ) Ln)'4L -j = Lnf ZM >- i, '-4 LO

LU ZD - I-~ n- u =) La.. LU CrLU( 0 C)- a LUin LUl (1)4- = LOc /W J- ! tZ LU = J C) LU >- U- C:CD Cr c C LL M-C M) : C) .. j CZ C) I 3: CD >- M: I-- Z:r C L

4- LU- :z u* LU LUL LU =r =- Cr- -i I)a-* -- -i Ui - _j -

Lu crl C)LV) coC :2: WF LUX - cn LU (1rc-: ) o - -Z -q fCrf o) cx4af LU Z: =--- - C) .- ' Of co LU- VJ C rC) Z : CO -) Z: LIczr LL - Ln C-DC CrQ-- C Of M C '-4 = <r ct: (.n - CD LU

U- L')a- I-F-: t CD U CO wL Li- :3 C) CD LU CO C) ,- LUC C -) <r'- CLUL V) LL- CD - '-U= CD '- 1 LnU-

CZ LU LU LC /T (1 ) >-LU VU '.- L L- U- LI LU L- -ClCO Cr Of I- LUCZ4 CL1 h-- C- cr> Cr) CD Cr c:t CD) D ) -LI r >t- Q- cCL) CD=I Cr- Uit <: ' C CD C) C) LUw LU :::- = C-.

C.) LUj L.)C3- CD I- ILUC LI C-) () LUw LU CO W-L LU Cr C--L) .. j ci ca I LUo::J a,- Q- C)'-'C -~C -- M: cr M: M: =r a-Ctz _j cr'

Z lU -~C CD Of Of LU Ct '-4 ZD LU - CD L-)Lr - Ct>

U2

,-Jr

LU

-JD

M CDCr

;_p Ct w' CDi)c

C: I- Ct C)CrLUL

a_ LU - C- LL- a_ LI-

C) -J CC') C) -jC)

CDc -L m ~ C) Cr WJ 0 4-

C)ML C)E c) LULI)

21

Page 29: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

2.5 THREAT FIDELITY REQUIREMENTS

Once the trainer mission requirements are determined and the threatsrequired to accomplish the trainer missions are determined, the fidelityrequirement of these threats must be determined. Threat fidelity is thedeviation that is allowable from the real world data describing the performanceof a threat. Ideally, all threats would be modeled to a high fidelity; however,computational capabilities of the typical simulation computers do not allow allhigh fidelity models. For example, the F-14D Trainer high fidelityClose-In-Combat threat aircraft model, requires one Gould 32/67 computer for eachmodel. If 35 of these high fidelity models were required in the threat environ-ment, then 35 of these computers would be required.

This section of the report will detail fidelity requirements for arange of high and low fidelity threats including aircraft, missiles,ground-based (EW) missile sites, radar and guns.

(a) Aircraft Fidelity Requirements

Fidelity Requirements are needed in four categories of aircraft;Beyond-Visual Range, Within-Visual Range, Close-In-Combat and Ownship.

Table 8 provides the specific aircraft fidelity requirements forthe four categories of fidelity.

The F-14D Trainer System Specification provided detailed fidelityrequirements for ownship (Appendix C ), but neglected to provide fidelityrequirements for the other three categories. This technically allowed thecontractor to provide threat models with any fidelity their conscience wouldallow.

(b) Missile Fidelity Requirements

Missile Fidelity Requirements are needed in two categories;missile launched at/by ownship, and missile not launched at/by ownship.

Table 9 provides specific Missile Fidelity Requirements. The para-meters identified are based on the NAVAIRDEVCEN Low Cost Validation of a Blueand Red TACTS Rarge missile model. A selective minimal number of criticalparameters were measured to provide validation of the missile models at a reaso-nable cost. Specific missile model parameters 4 to develop an algorithm thatwould provide the appropriate fidelity requirement are presented in Table 10.

(c) Ground-Based (EW) Surface-to-Air Missile Site Fidelity Requirements

Table 11 details tne general ground based Missile Site FidelityRequirements.

22

Page 30: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

L-i

CDD

w ULU

Z LU

LU U C- w)-

=J LU - L .

>-i LU a_

C-)~

~ U i LrOfU 1

LL)

LU C- L-)CD LL C:LU)-

u D w C-) C-)C-- :Z M L L f x C:Z : :

Wi C-- - D:X LU J LU0 mi af C- C- IJ IJ i-i

<1 (-LC) >< LUJ cc LU -LiL Li) U LUJ Laf Of = C O D C) ;3. C= CrrF Q

ci :> ILU Lui M : LUJ C'-4 a LUJ LUi LU LU)LU*- co 0- -l- CL a_ a_ 0- LLL- L ) * -'-4 --- -4 CD-- - CD +~ +1 VII LCC LC LCrl LC

Li L

C/i Ut) im

wU Lo

LU ) C-- u C--

LU :xJOf: CD ::r >- cn a

CD ui C/i =~ Li u- L uiL- i LU C0 LU -i JCD

U") Wl cr 0:: 0- LU -- LU 14-LU Ct) CD w- CD 21 a: Li Li ui CD

LU LUxw CD ji < CD =i LrUj(.n im Cl C/) -j -j U- c Q

=- a-- U C3 CD LU=W- -X I- w LU LUj __j

= 1:1 wU44I >. -L CD LUJ iu LUUiw~L - m- =- = w~ LU LU w LU -U - L-- >

C! Z CD) CD LL- =: ,=- LUD a- CZ U LL)=0: Li1 ICE CZ CL) Li CD L. Cr- Li LUJ -i M U-

23

Page 31: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

______________NADC-90104-70

L

CD~

00

UlLU

zxCC)

Ln

Lu U :orM: Q LU LC

LU LU :z* j WI-=ma, I- LU - cc = LnC):zUi

LuC- = OW DI- C-) L LU LuuD af- -- I uj u L C-) C-) O rC3 - LU LU LU C -) =: '-4 C-) Q

wu LU QC-0 ~CD LU Li) CD C) CD LU LCr 0

1-4 --- 1 ) cr V) * CD C:)w _, C). CD U-):3: - C) t ~.~-

LL - LUL 21-ui

LI> C- L>

u cm clrc COf> Z:C-) w C-)

ILL

LU :

CD w

CD i- CDI

-O C-) C-) -: LU- u

C- C-) CD C) V))

<r I U= > .- c4-'-'MLU L-) CD L -) C-i LE LUC) fa

C-) (I-) C= C ) L/) i - : ic .I

o:: LU WW CDI Z: ( I- C-i - C)r

w) CLZ- >- LU Cni C) LLJCCDL- - w- LCiL 1/ r 4 LL- <r cn 1U I-- m = C

cr 4-- uIt) LULU -C ) C:L - C.J -MLDLU '-1) -i Li C) CD L-) CD-a U M: CL

CL- LL Lii c~x C/i Li- u- w - C)c --=U.. .. i- Uic $C) .. ) -i M CD LU

4- :Z LU=) CDC CDW- C)C Of~ Of >- Cl CL M-

Q =,;m CD It)C--) C-) C) M Li LA- L- V-'L) c ~ cx

24

Page 32: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

Ci NADC-90104-70

Clt)

Ct)L

CD LU

LU I--U- LU-icr cc

w LU

L) C3 LUD Ct) Ct) CLU LU =4 -4

LU:: LU LULU

z U- ncDxc::C >. C)>. coLwLU -C) L C:)LU LU -- 4LUJr

2:4 ->2: 2 C-DLu L CD LU C u cr c

c LU cr CD~- C:) C)CD CD CZ) nC m: :

P-4 -4 3c w LU LUC3 LUL ca 9- LU _u 9 LU LU 0:

Of LU LU Of LU LD9- CD -CD >-u->- CD 9-- Ci = WU w LUL

>-C- C= LU W=~ LU C:)Lw mD:=U w~ LU2 C:) -J LU i Ci ci

I.- ca: CL-C) C-) U\I 0- JNClf u-, C:) P4

LII I-- 1 L Cr- C) ~Uj wLLU I C)2 wL CD a- C)D a- 3

CD~ <Z C)0- D-

LL-

c-i

LiL

LUwU) V)--

m- t .D

9-_ '-4 Ci:z1

CD) co Z4 LU CD) C

co Ln ca: C3 D CD Ct)

CD 9-- = L- 9-L n~> 9u) a_ LO w/ 0:i M: LL- en ( ZLU~- 0D Ct) LU mt & D t UL

ci ) - w C)E .cJ - Z< en L

M: w -a: LU m 9-) cD = CD ) L -) IDCC LU Q Ci C D Wi CD. CD Ci wi -iC: 0 -D L -- ' C) -) m) -i: LU

W 9 W C- L D LU C D CD x I--4 LU-4 D LU

LUJ -- ~ LL U = CD C) cl Of CDI 9- J=- u- M O C- CD CD _JU C 0-4q L- e- T c CD0

C3 (LO* C)U 2~ -D V)) W LLU O. C-0 LU Q- c0 LU r .J Z:w- LU U) Ci)LU Ci) a - LU LU2 CiLUw

LU :D >- LU Q- '- C x 0- 09- M-4 >- w LUj J :: -i J;;- D: -J (.n cr L'- L m or a- ca =) LU LULU W 4

Ct CE CD0 Cr Q : of C CD Lm Ui C-D Ci cr Ci 9

cr_ 6- LU c :: Cr) ~ ~ : ~ ~ ~ C C~J1 -- > 9- U)r >- u) CD ZD cr CDc V I

25

Page 33: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

><

C=LU

w LU CLU ix

LUu LD

z CD

LU L

CDLU

LU)

C):R

LU- LU IL UtZ - u I LU VL2 ) C)Z: L C-) /1

LU LU LU'-4 UL L LUJ C) CD :D

rZ- Q- :a- U-1 a- --LU I CD C: '-Z c: C C Lr'\

oI- C) -~j Cj C14 CN

LL-

LL.

LU

-i L LJ C I -- Lm 0-~C LU)LLLU LUJ LU) If1-

C: -~ >.) 1- -- 4 Co ) CD --CD w LUJ M D .* i

Ln >--~C LU CD -L-J C)r LU i L-4 L

LU L D af LLU LUJ : M C) LU J4='- C :) LU_ 2: V) LUJ C)DI LUJ = -J~ ) CD 0-4 0- >' LUJ -4 > L C) If) LL)U) C D

<r CL 0-4 0- Q- mCD2: MJ _j L . L U- Lu LUJ = LI) I) cr LU

Q: L LUJ c~ V) -J C) L/) .. 2 LU C) LC) Cr a C) LUJ CD of >- D Vf) $- I - LUJLU LU ) - I C-) LUJ CM U)- LU) ck~ ~-Li) C~ I) LULI OJ LLUL CZ . I)C LUJ LUi m Z: LU 2-

a- '-1C) a C a- - C) : C) a- C) :z LU

_z -i c'Vf) C:= L/') LJ -

c -J IJ -j -2 LU- _J LU- .J LUm -'- 2C LU )-l J . LU- C LU- c O

I ) Z ) )C = -C C ) --D -X :D i- =) '- CC DC U) CZ7 Vf) 0Q C: m- Ln cc)Q LI LUJ

26

Page 34: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90 104-70

LO)

>- .-. Ln C

M1 CD

CC C14

wU CD CD CD wU

=) Lr Lf, LJl% CD -Lu cx I I CD2: 1 -- . C) C3LU + + + - LUi--

I- C3Z LUJ

cx: CDLL- >-

u 2

o CD w ~ CDU uf\ CD w

UlU)

U') 2-P 3R a~ CD- - DCD CD CD D

M: -- -4 --- LfC% C3+ I~ + 1 +1 -- LUJ

CL) >- >- >-LU = U-

c ~ c C= -

LU j M =D Z) CDa- LU U) CD CD C/)CD m mD c

a - U- LU U rtCD0 C-0

LU U U- ;Z Z UI C-) CD- cx c:

27

Page 35: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90 10 4 -7 0

LU

U-

CDLU

V) w D o

*C-0 1-1UL n V::c Ln Ln ~~~~~Uj C)DC0CD /,--

UU- U U- I V) LUni 3 L L: C)C CD oDunn* i c cj ui L I) U)UL LUUL -- -r-jU i

CD* CD -L f)()C

-- 4

IL C --)

-r Ij

U C-D LJI-

V) =W :. CT ZEc

C)-J c J(fLL j c zLJO cr

CX C)C LI- CD ) LU : O - - I

V) C- U - ZrZ:cr _3iML L CJC<[LJCDC " W= L -LU -J

CD 4 P- cr LU n 2: ! LUI I c - C) C: LUx 9r 0 -- (-)

cr ~ ~ V-49J LL C)c i- CrtL - Lf) w- - "-I _j u CD X zz Zcr CZt -) cr "i uj -- -1j c =,4 _

CtJ LU LU r:: CD z LI . C) C-- MD- : L/U

wf w M-) C Z - C3 0- CL 0. C U D ) ) Q:4 -i_M: ~ ~ C L:)C) 7:U J U- 14 7 L)C Clc MnL. -- - iLX L D2 ~ I-~- :: -(

L DI -1cro.4 2 -4 C-C) ) C M . -- C) CD W I J Q (I-->- C:) s- z'Z C

,-- tMLLU-w C - r cf V D- LU CD W -JUU-Ji-CD U- W C)OfQwC C w n; UM04 ) 9-4

LUi(=3 -- Xi <C --- C)C D- ~ -Q -J tLL4 ~ = I- 1C)O'>-D- M W

9-- =r- L- LULLJW -C)K- '- M Q0LDP- CD)L cX LUD J-Jl L VL) W-J 9-

LU r- rLJ ~ L L ZLCD CD9-C) cT Z: ZLU C))OL- L-9--Q-:z LU DC~ CM Xf

C t 2 - _j - 1 -- J ( - L C 4 J M M O. D C )w cr DWt L i~ ~ - C

QL j- - -4_ ) M 1LJI-iL) !! c=tLJWLL IC< MMEt M- U Z D ;t- 9 _ _ -- 4tLU)

L/) 2/- (.n UJ -,L/~ ) VI r9-- 9-- LE L n . : L) -) Ul C m C- 4 - , JC -4 n -LU (J' V) C- -49

_DLI0 - x c : :: c C r C L L I ) U 1 1L U O fCC D C L C U - c - ) c : -) /-( ' C'

LL- CT c = -j ui 2 L t L D - Ln XM c - Z: L) >1m tn M

LU L

28

Page 36: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90 104-70

(CI4 * U-I I I * LLn LA"-

U-U-U-) f)DD /u -- '--

I-- i -- c

Li

z -i

CD U- D .Lui Z2

LO LiOf -71L

C) A -

r-C)[: LD U- CLLJx : C:)D:c-

-L I-D

-j ~ CD-4) LLJ -~

LIU C-D2

24U-c: CD L

LL CD Li

CD U-

w~~C CD'-C3 LC

I-- LU Cj CD~ -

~ ic I-z -* ~ ~ ~ u MD C-)Li D~Z

LL - U-CZ Z:CD u-CD -

LU - -)- CD - i

LL) CDZ -N -4 Li UZi Li CD U t-Z =LU

cf L p ..4 ~-1 LU.J -J LI U-'4 WI-- M-U- ;z -IUL- cr Ltr) LU

Li Ci 1 L Lii L =U- I- nb-4 C LU '-4CD U- P4 CD L/) LUJ

UA- CDJ Li U L- L/) 2: -- U Cr

U- U- UL- '-A U UL-LW LU =- Z L I-

LUL LU UL- Li) I- LU Ckr c:J% c~z V C)

CD _icn U- c Z CD CZ C I-- U- CD0 ct)

Li c L U LU L i- U -)- CDl C) 0r '-l LUJ

0-4 LU C) C -w Cif U- Z: ZM=)- Ji il

CLn L D >< U ::D Lt- m C:)D ~C:L)'LL4- a-

Cr LUJ cxLf) 0-4Z t, Li u

LUJ LA r - U U- LU : rr n '-4 U- Li)

U-) mD _icr C. Li UL-! I---LU Z:LUjCD -JCD

LUL >- C D QCCD UCDC C D - 7: 1-- M:crM: (/) p- - CLn CD C CD M Cr LU Z!Z LUi cz -- z U U ::

U- 2Z LU Uj-IL Of CrUJL W IF- CDI 2f CDM:L-1 ;;rCr ) LU '- LU .1 Li C-D Z x _j C-J Li n C:) I--4 .- I0- >-

-J ",'E L CD Cr JCD I-CD >- ?I- - -CI>- )CD

(1- 7E a_ LLj Cr CD czC U'~L LULU W CLn CD CD c=I -4 CD CDz =r- Ui- X LUi0- LiC-i )r

WLI :E UL- Cr Li)z cr M M Z:ZZ UJ-U-ZL Z CD _j CDZ - CD ; LUWLU CD Q-r. -':-

~cz -J _jr '-4L U c:: -1cc MCD' Cr-r- Cr CDD''U'-C/CDm LUJ U LUJ LUj >< I-I~ ><Z

CI I f Cr I I UL-U-UL- L' --

Lk <CD CD LULW CD tX

29

Page 37: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90 104-70

z

U') V)

U-fU

L)/-4 I)W

LL

Ld

-J

(V) IZ

LLL

LuuJ X J.~

M-4-4-iCC

cz C:: LLJLUC= cf L C I>

a_ -nCj4

LUJ C. :E

(n t -- 4 0LnZ : <C

'- '.F ,L30

Page 38: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

C-)L/) LI) LI LI) LI) V-) C-f C-f V) LI)

CD CD CD CD C-)CD CD w CD CD L)CD CD CD

U C) ci C) U) Z: u) U = C) C) CJ ) U) U

; Ci LU LU LU wU w LU LU LU LU LU Lu LU LU LUZ-I V -) C-f C-f) LI) C-f) QO ) .J ulf C-f) -j () V) Ln m

z c LC CN4 DC'J c4 D' C'14 C14 >- C14 C >- CN 04 C14 :Lu LU P---I ~ -4x -J I ) I I I I C:D ILu CD ) C3~ - C3 C3 C3 -- 11 CDOf 1- + + LU + + LU + + LU + + LU + + ~- + + LU

LUl

Zi u -

r LU0 V-) CD CD X; C<wLl CD CD DU L Ui LI) Ez CO '-i CD

>. i-:y -'-- r CD m M :s-~ CDVI) Lnf C- C-D -J U L = = >- LI) '-

1 ; XCD9 9-- f LU (/ I aD N~9

V)' :2m C-flc <r~~tL CD U >- LU I- a:U-) C~ cr Li C-f) C- ) .. J CD L) --- CD >- M: 7- Of~

ZJ cr <rJz-iz Ln I)iz = c:: C-f ~- LUi C-LUL lj- -i ~ CD LU LUJ cr *-- ::D I-- '- 1I _W LUJ -

a_, f= U) C) Or2~ LU- : 1-- U-) CX <r L/) :Z a_ Z5 =2 V) crLct UI _ -Z---C '-4 ry LUL -j =r Vr ) co L) :Z LU-

LL LUI Un LI) ZC CD Of cr =r <1 C-l V" LDCY -)CD L= ')U- CD LU_ LU- :3 C CD LU co C -4 LLU

cr C ' c-4 LL LL)9 LU- CD CD::4 CD 1I- LI)>

LII L CD C-- CLLU) -L Z LU LU-0 LU- LU -L--C LU=rOf o n CD C r _ CDD CD 9--:C:r

Cra- LUL CI-: C: CD) CD LUL LUj ::- a_, " I- Lw

r .i C- '-' r ( -'C-fl- '-- U- .Y M Iu M w w = - L- L- c:E LLz LU1 -4: - Of V) LU '--4 -4 M X - : M: CD r '-4 0-: M LLCD LI)I 9-- Of- wr C-9- ~ - I ) C- 9--l C;) LL

-JLUi

LUJ

C~Cr

LUiCO LUJ LUJ

2-1 cr -U-1 CD r LU L

71 :-rUt.-LL- L-

ZI LU' -jJ CD LDCCD L/) CD C

Cr C---I LI) C)

CA cc = rU)I1iC'L

31

Page 39: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

2.6 THREAT MODEL DATA

Identifying threat reference data sources is a key element in developingaccurate threat simulators for training. Alfred Gramp, TACTS/ACMI Range ThreatEnvironment Simulation Program Manager, has identified the following sources forthreat system reference data.

5

Threat (Red/Orange) Air-to-Air Guided Weapons- U.S. Air Force Foreign Technology Division (FTD), Wright Patterson

AFB, OH- TRAP Simulations & Data Packages- FTD Air-to-Air Guided Weapon Documents

Threat (Red/Orange/Gray) Land Based Surface-to-Air Missiles- U.S. Army Missile and Space Intelligence Center (AMSIC), Redstone

Arsenal, Huntsville, AL- IMARS and/or MISSIM Models (if available)- DIA Documents- ESAMS Simulations and Documentation (Updated TACZINGERS & SAMS),SURVIAC, Wright Pat AFB

- SIMVAL Simulations and Documentation, Wright Pat AFB

Threat (Red/Orange) Anti-Air Artillery (AAA)- U.S. Army Foreign Science and Technology Center (FSTC), Charlotte, VA

- RADGUN Simulations and Data Bases- DIA Documentation

Threat (Red/Orange) Naval SAMs and AAAs- U.S. Navy Naval Technology Intelligence Center, Washington, D.C.- NSAM Simulations- DIA Documentation

- FSTC

- RADGUN Simulations and Data Bases (if available)

General Threat Data- MCM-3-1 Document [Note: Coarse data; No Contractor]- EWIR Data Bases [Note: Includes Kilting Data; Contractor and NoContractor Versions]

- DIA Documentation

Friendly (Blue/Gray) Air-to-Air Weapons- AIM-7E-2, 7F Sparrow- Naval Research Lab (NRL; Original Source of Data)- Naval Weapons Center (NWC)

- Pacific Missile Test Center (PMTC)

- AIM-7M Sparrow- PMTC (Note: model performance differs significantly from those above;JTCG Validation of near-real-time or faster AIM-7F models againsttelemetry data in the early 80's indicated PMTC model performancewas worst among available models; TACTS AIM-7F was chosen as mostaccurate.

32

Page 40: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

- AIM-54A/C Phoenix- Hughes Simulation and Documentation- Naval Air Development Center (NADC) Simulation and Documentation- AIM-9D/G/H/L/M Sidewinder- NWC Simulations and Documentation

- AIM-9J/P/N Sidewinder- Eglin AFB Simulations and Documentation (Note: Provide increased

aero performance over NWC baseline)

- AIM-120 AMRAAM- Eglin AFB Simulation and Documentation- Hughes Simulation and Documentation (Original Source)

- Sverdrop Simulation Enhancements (Build on Hughes Model)

- M61-Al Guns- Eglin AFB GAMES Simulation and Documentation (Original source;

PO01 derivative)

- GAU-8 Guns

- Eglin AFB & Nellis AFB Documentation

Friendly Air-to-Surface Weapons

- AGM-45A/B Strike

- NWC Simulation and Documentation

- AGM-88 HARM

- John Hopkins Univ./Applied Physics Lab (JHU/APL) Simulation andDocumentation

- NWC Documentation

- Laser Guided Bombs

- MK-82/83/84 Paveway II Simulation and Documentation-NWC- AGM-123 Skipper Simulation and Documentation - NWC- Air Force Peculiar Sims and Doc - Eglin AFB ??

- AGM-84 Harpoon

- PMTC Simulation and Documentation

- Center for Naval Analysis (CNA) Prob of Acquisition Model andDocumentation

- Mac Air Documentation- JHU/APL

- DELEX

- Bombs/Mines/Rockets - No Drop Weapon Scoring- Navy weapons: Data from NATC and/or NSWC (Dahlgren)

- Air Force weapons: Data from Eglin AFB

- Tactical Air Launched Decoy (TALD)- Brunswick model (Not Deliverable to Government)- NADC, NATC, NSWC (Strike U., Fallon, NV),...Documentation

33

Page 41: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

Friendly Naval Surface-to-A±. Weapot,

- Naval SAMs and AAAs

- Naval Surface Weapons Center (NSWC), Dahlgren, VA

Other Friendly (Blue/Gray) Weapons

- Simulation and Documentation - Lead Activity

34

Page 42: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

2.7 THREAT VALIDATION METHODOLOGY

The majority of flight simulation threat models have not been validated.Usually the threat environment is exercised flying a typical mission scenarioand subjectively viewing the threat model performance. The NA'WAIRDEVCEN hasidentified a need for measuring a typical threat model against the threats realworld performance data (identified in the Systems Performance Specification) inan off-line computer, using the fidelity requirements as the allowabledeviation. This Threat Model Validation Concept, generated for the F-14DTrainer Program, is illustrated in Figure 5. For example, as detailed inReference 6, a TACTS Range AIM-9L missile model was measured against the NavalWeapons Center (China Lake) reference model, using nine validation check cases.Several check cases reflecting various geometries and kinematic conditions mustbe examined to explore resulting weapon performance.

The AIM-9L missile parameters used in the validation included intercepttime-of-flight, velocity at intercept, reason for miss, maximum range and mini-mum range. The results of the TACTS Range AIM-9L candidate model were measuredagainst the China Lake AIM-9L reference model to determine the percenage of deviation.This deviation was in turn measured against an allowable deviation specified aspart of the fidelity requirements. A block diagram similar to the oneillustrated in Figure 5 should be identified in the RFP to provide guidance tothe contractor regarding the methodology used to validate their threat models,the validation parameters, allowable deviations from reference data, and a sche-dule for the process to occur.

3.0 THREAT ENVIRONMENT DEVELOPMENT

The Threat Environment Development Request for Proposal should include aPerformance Specification, but should not dictate the design. However, certaindesign criteria must be identified to provide for an optimum system. The ThreatEnvironment Systems architecture, computer memory requirements, threat com-putational time requirements and model architecture, are some of these elementsthat should be mentioned in the RFP. This section of the report will discussthese design parameters.

In general, it would be useful to present, in the RFP, the importantfeatures required in the design of a threat environment, such as the model com-putational time and memory requirements, and provide a check-off list of whenthe contractor is expected to provide the details of these design parameters.Request for these design details during the F-14D Trainer development programwere not always accommodated.

35

Page 43: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

OLJ

I-L

-Jo I-C - - - -

cc cc

ccIcu

C)C

cr I- LL- cr .r C

>..1LU I si mn fb

01 11'3(lC D --4

CC ..- 41# Ir .

- - LC) L.

Page 44: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

3.1 SYSTEMS ARCHITECTURE

The systems architecture depends on many factors including the trainingtasks, threat types, number of threats, and their respective fidelity require-ments. As summarized in Figure 6, a careful trade-off of the threat systemarchitecture design factors, such as computer resources, computer configuration,Bus configuration, processing time techniques, memory expansion techniques, I/Otechniques, and model transition techniques, must be analyzed to identify a com-puter system that will provide the correct computational capability required.

Model transition refers to the situation in which an active model is convertedfrom a high fidelity to a low fidelity model, or visa versa, during an activemission scenario. The RFP should identify this need, and require a trade-offanalysis be presented at the Preliminary Design Review. The contractor shouldprovide a preliminary copy of the Math Model Report, as early as possible, sothat the government can provide inputs to the design approach. A typicalMIL-STD 2167 review schedule is presented in Figure 7 with selective threatenvironment design factors required.

3.2 THREAT MEMORY AND COMPUTATIONAL TIME REQUIREMENTS

The Threat Model Memory and Computational Time Requirements is driven bymodel fidelity and the number of simulations running simultaneously. DODStandard 2167 requires this information to be identified in the Software DesignDocument (Data Item Description No. DI-MCCR-80012A) which is presented at thePreliminary Design Review and the Critical Design Review. It is important torequire this information periodically to insure that the threat environmentdesign is sound. A statement in the RFP identifying the requirement to presentthis information at the Preliminary and Critical Design Reviews will emphasizethe point.

3.3 MODEL ARCHITECTURE

The two main design approaches utilized in the specific design of a threatenvironment are; (1) a generic algorthm in which parameters are incorporated todefine a specific threat, and (2) a threat model that simply defines a specificthreat. The generic algorithm tends to be a more flexible, simpler, less costlyapproach, but requires more computer assets and provides less fidelity than thestand-alone model approach. It is important to clearly define the threatenvironment fidelity requirements and the features required in the models, so thecontractor will select the correct model architecture for the effort.

37

Page 45: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90 104-70

C:3L3

2-W4CD

I- Lo L-) LU Or______ LI) LU CD

C. =) V) CD ~ crUj :a z.D V) LU w L C)C) M CD UJ

LU CDOZ = M:==DC CD CA = ) crCX: UC0 CD CD =~ C) t QLUL) o-4 CD - ULI)

I- L Uj '-4 LU z CD ><:: :z -- 4 M>uca LU LU O- Or _j LiLUW 1- CD U- CM =CDW~ == z

C= U 4- LI) >- -- J- < C:)>- =D L)wL >- C. C) w Ofm -0 c- : -j Of u L.) Z: Lu~LU W ~ U cx : i- WEL- -i Z

u- L0) V)) 0C CD cUtl #i--. C:) -JU Lwr wE Cc

M U)- LU CD <TLU :D =) ) Z:7 LU LU > - :r c CDLU QL- C.C-) amacr a~- MLU a5 4i c) u -M

I I I I

U-

U- LU V

II -- 4 C) CDmJL --.-- JLj- V) C 0

4- C) = LU r '- LU LUC. CA) C. cn LI: ) 3:

LU" I- U- '- U-4 U- U-U- c- U. -- U U-1 iIL- wL>I--4 LL-1 .I .CE U- U .-

4-- L C) m ICE C)x c C)m C)C) C) C) =1LI) U-1 c- a:: = -4u M LUj

V)- Ct5 >-L -4 L) i .S U Ui -15 M LD . C) LD -45 --t -45

U 0l 2- CDI C) - CD 1.4 c CD W C CD CD CD

C0

38

Page 46: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90iO4-17O

04

Cl) L-

SLU i=

0-41-4 C:)

CD L

0:: of LUL

Z- L LUj U) cn W - DL) C LU =U w) ::c :z c- C-) w xa LU I

LO 4- 4 -4 C) LU u ~ i w) LU C3 :Z CD- M

~ U ILU >. cz 4 M:- M: CD Cr 4-- I CDC C CLO C)-- :2- w CC)L

0- uWCD cC- ~W) IU - J VI) LUCDCDLnWL 0=-4 LU~ LU I- ui Ji - 4- CLD - M

Z: C~ CD UJ CcZ LI M:I-C Ck-4 LiC>-~~C w) LU C/) m~u LU M: M:C CD X IC)

UUElI) XLU c:: cr I-C mV >- iI <r

LOW = U Q-J -i -LCU= LU -L LU LU C:) -LLJ- 1-U-j ~ I 4-4 - Ca- =- L - Q>: M: I-3 QfKC CD C) Cl U Of - U0

C- M c LCD := D =JW C LU4 LUrD =UL CZ -LCD ) C CU-- LUIx- P- ~L/- 7rC Q C-) a: CL) -M CN Li J u- )

LU C) C >- IJ-r= CD LUw

CL cr Cr Ll)L Ua- a- LU CD CN i\

~ Liw

WL LI) U ICD C- LLI) VI)

4-- 0- -4

>-LULU

VI-

-4-

LUO

39 L

Page 47: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

REFERENCES

I. R.F. Homing Guided Missile Design Specification,FAAC Perceptronics, Inc., Report Number FPM 1938U/4005, 25 August 1988.

2. Weapon Simulation Development White Paper,FAAC Perceptronics, Inc., Report Number FR3194U/7825, December 1987.

3. F-14D Simulator, Threat Aircraft Fidelity Requirements Memorandum,Veda Corporation Memo, Number 33978-89U/P3081-010, 10 August 1989.

4. Weapons and Electronic Warfare Fidelity Requirements for the F-14D TrainerSpecification,FAAC Perceptronics, Inc., Report Number FPR 308ZU/4005 7 April 1989.

5. Alfred Gramp, Suggested Sources of Data For Simulation Development Memorandum,Naval Air Develpment Center, 30 July 1990.

6. G. Terry Thomas and George DeLisi, AIM-9L Sidewinder Missile TACTS RangeModel Validation Report, Naval Air Development Center, 30 September 1990.

40

Page 48: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

APPENDIX A

F-14D TRAINER

REQUEST FOR PROPOSAL

THREAT ENVIRONMENT

Page 49: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90 104- 70

Tactical Environment. - The tactical environment ofthe trainer shall encompass the trainer's simulated geographic domain (asdefined in .1.5.6). The tactical environment shall simulate the effectsof the earth's curvature including extreme latitudes. Variable day/niahtmeterological conditions shall be included with a corresponding effect onthe tactical environment. The tactical environment shall also simulatethe following:

(a) Operational air threats(b) Operational surface threats(c) Operational ground threats(d) Active emitters(e) IFF responses(f) Communication/Radio navigation stations(a) Active countermeasures(h) Passive countermeasures(i) Air-to-air missiles() Air-to-surface missiles0 ) Air-to-around missiles(1) Surface-to-air missiles(m) Ground-to-air missiles(n) Surface-to-surface missiles(0) Ground-to-surface missiles(p) Data Lint. (Lint 4A. JTIDS)(q) Radar Beacon Forward Air Control-Target Data Communicator (A-6F

Dr, y)

Tactical Gaming Area. - Tactical gaming areas shall beselectable by the instructo-/operator. The tactical gamina area shallencompass air space from ground/sea level to an altitude of 150.00'0': feet

with a oround range of 2000,', nm by 2000z nm. Calculations for the tacticalgaming area shall be in accordance with ". 1.5.1.10.2atmospheric/geoaraphic simulation throt.gh ..1.5.l1'.B magnetic variation.Control of the tactical environment shall be accomplished at the IOSconsole.

7-...5. 6.-.2 Threats. - Threats shall consist of the following:

(a) Air Platforms (Aircraft)(b) Surface Flatforms (Ships)(c) Ground Platforms(d) Ground Sites(s) Air-to-Air Missiles(f) Air-to-Surface Missiles(g) Air-to-Ground Missiles(h) Surface-to-Air Missiles(i) Ground-to-Air Missilps

(j Surface--to-Surf ace Missiles(I) Ground-to-Surface Missiles(I Dec o','s

Ccr .- AkNdl~e~ fo M Ioa nof

Plrmi fully legible reproiuc ,n

Page 50: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104 - 7 0

A site is the simulated location of any system represented b , aiammer, radar. missile system, missile launch compler. or fire cont-olsystem which remains fi:ted during the sImulated scenario.

A platform is the simulation of ground, surface or air vehiclrcsassociated with any system represented by a .iammer. radar. missile sysfea,or fire control system which have the capability to move during thesimulated scenario.

It shall be possible to detect these threats by the appropriateownship sensors as defined in the sensor paragraphs specified herein.Sensor detection of threats shall replicate that achieved with theoperational equipment aboard the desion basis aircraft. Probability ofdetection shall be based on threat range, aspect. electromagneticemission. day/night meterological conditions and position from owriship.

Targets are defined as any threat that can be engaged and destroyedby ownship. Targets are a subset of threets and include ell of the M[bovee::cept air-to-air missiles and surface-to-air missiles. Emitters shall

consist of jammers. radar systems and electromagnetic guidance systems.The simulation shall correlate active emitters with threats.

It shall be possible to place the following number oftargets/parameters (as a minimum) within any scenario At anv loctjvneither durin the plan modes or dut-ing the e::PcLttion of a scenar-in:

Aircraft 96Mi-_= i l esGround (movina) 12Ground (fi::ed) 48SAM/AAA Sites 48Surface (ships) 49Weather Patterns 12

The instantaneous simultaneous tarcet/porameter requirements are specified

in the Threat and individual subsystem paragraphs.

The visual system shall dynamically compute which targetrz to displayto the aircrew as a result of range, position and its threat priority to

ownshi p.

1. .. 6. .2. 1 Threat Database. - The parameters necessary to modelthreats and emitters shall be maintained in the trainer's online database.The simulation program shall provide the instructor/operator with thecapability to assign specific emitters to individual threats or a grouc, ofthreats during the plan mode, while the training mission is underway, orshall allow the computation subsystem to allocate emitters to threats v*iaa default configuration assignment. The following data base shall brprovi ded:

Page 51: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC 90104-70

(a) Airborne Threats:

(1) 72 types of Airborne Platforms(2) IS types of Antiship Missiles

(aa) Air-to-Surface Missiles(bb) Surface-to-Surface Missiles

(c.) 24 types of Air-to-Air Missiles(4) 18 types of Surface-to-Air Missiles

(b) Surface Threats - 12 types of surface platforms (F14)

- 37 types of surface platforms (A6)

(c) Ground Threats - 128 types of ground sites/platforms

(d) Emitters:(1) 24 types of jamming techniques(2) 128 types of radar, missile systems and fire control

systems.

The threats to be provided for the data base will be chosen by theprocuring activity from the threat listings in Appendi:x VI.

. 1..6.7.2.2 Threat Tactical Capabilitie s. - Threats shalI becanable of joint or independent operation. These threa.s Shall ha -tEctical capabilities that fall into one o- the following categories:

(a) Interactive Threats - An inte-active threat shall male a

tactical analysis of the scenario based on visual limitF.passive and active sensors and data lint:/command controlinformation. The threat shall employ its performancecharacteristics, sensors. weapon-0 and defensive countermeasuresto survive and accomplish its mission. There shall be threelevels of threat capabilities which shall vary the speed andeffectiveness of the threat's reaction to the scenario and thesimulation shall incorporate Provisions for the effects of theenemy's tactical doctrine upon the threat's behavior. Thecapability shall be provided for dynamic and simultaneoussimulation of twelve (12) interactive threats selectable by theinstructor from the threat data base.

(b) Preorogrammed Threats - Threats shall perform a proarammed(programmed during plan mode) course and mission withoutreacting to changes in the tactical environment.

(c) Instructor Controlled Threats - The capability shall he providedfor the instructor/operator to control threats from thp ins.This caoability shall include independent or Joint maneuvers.The IOS shall also provide the capability for the inrtrtvctr'

operator to select and desianate the lead threat in eachattaclinq cell.

Page 52: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC 90104-70

.1.5.6.7.2.2. 1 Airborne Threats. - Airborne threat simLlatin a=h1 I

consist of both friendly and hostile air platforms. ho. tile and fripndlyair to air, air to grOund/surface, ground/surface to air. ground/surfareto around/surface missiles and decoys. The capability shall be providedfor dynamic simulation for one-hundred-sixty (160) simultaneous airbornethreats at any time during any scenario. The 160 airborne threats shallbe comprised of ninety-six (96) aircraft, thirty-two (2) air-to-surfacemissiles (ASMs). (24) air-to-air missiles (AAM) and eiaht (8)surface-to-air missiles (SAM). Airborne threats shall' be capable of beirnagrouped into twelve (12) attacl-ino cells ech of which is comprised offoLur (4) different threat types. Each attaciing cell shall consist of onelead threat with as manv as twent\,-three (77) other threats in a slaverelationship with the lead threat. This lead/slave relationship shallentail the slave threat performing identical maneuvers in consonance withthe lead threat. The capability shall be provided for the instructor to

vary the types of threats in a cell from one to four and the number ofslave threats in a cell from one to twenty-three. Velocities, altitudes.climt rm*es and turn rates of each air threat shall accurately simulatethe dynamics and performance of the air threats in the threat data base.Air threats shall have varying levels of tactical capabilities as requiredby .l1S56...

Each Air Platform shall have its appropriate sensors. weapons/EWsystems and countermeasures. All air threats shall present accuratevisual and electromagnetic profiles. The IOS shall contain all necessarycontrols for modifvino the air threat tactical capability durino the plansubmode and varving it durina the run mode.

7..5.6.7.2.2.1.1 Misile Flvouit Profiles. - Missiles ea,)lo'cd byownship and threat platforms shall react realisticallv to channeF in thetactical environment. Dynamic miSSile flVout profiles for ownship andthreat missiles shall be included for EW and non-EW environments.Simulation of missile smole trails sh=ll be included. Radar crosesections (RCS) shall be included for air-to-surface cruise missilesz ands,rface-to-surface cruise missiles. Probability of kill (Fl:) as w- ll -smissile performance characteristics shall be included in the simulation.These requirements applv to within visual range and beond visuMl rangescenarios.

7.1.5.6.7-2.2.2 Surface Threats. - Surface threats shall becomprised of friendly and hostile surface platforms. Each surface threatshall have appropriate sensors, weapons/EW systems and countermeasures.

All surface threats shall present accurate visual and electromagneticprofiles. Surface threat headinos/courses and speeds shall simulate the

performance and characteristics of those surface threats in the threatdata base. The capability shall be provided for the dynamic simulation oftwelve (1 ') surface threats simultaneously at any time durin anyscenario. Ship threats shall have varying levels of tactical capabilitiesas repuired by 7.1.5.6.7.2.2.

-. -. Ground Threats. - Ground threats shall be comprisedo+ +riendlv and hostile ground platforms and sites. Each ground thi-Patshall ha-ve its appropriate sensors and weapons/EW systems. All gr-oundthreats shall present an accurate visual and electromaonetic profile.-round threats shall simulate the characteristics of those oround tre, et;

Page 53: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90 104-70

in the threat data base. The carpabilitV shall bp provided for the dyniamic-- iml -;liocn of twelIve (12) act ive, ground threats sinult aneoUSlIV at any timeduring any scenario. Ground threats shall have varying levels of tacticalcap abi1i ties as required by 3. 6 % -)

.. l..b.2.ZElectronic Warfare and Weapon Simulations. - Wpap,)nand electronic war-fare Simulations employed in these trainers shallutiliz e e:istina Government Fur-ni shed weapon and EW simul ~ion soiftwAremodUles from the Tactical Aircrew Combat Trainina System (TACTS) librarwYto Support SiMUlator operation. This Government furnished softwar-e shallbe incorporated into the trainers in accordance with the Naval AirDevelopment Center's "NAS Fallo'n Tartical Aircrew. Cobzk- Training SvzstemWeepor, and Electronic Warfare Simulations Interface Specification"(TF-2017-82-1Sa. Rev. K. dated -26 November 1985). In addition. theContractor shall develop simulations for weapons and EW4 simulations notcurrently e-,:istino in the Government's Tactical Air Training Systemlibrary and for the e::isting simulations thst do not meet the requirementsof this specification. All Conti-actor develoned weapon arid EW s.im'i~atiorisshall be in accordance with Ih'-S Fallc'n's TACTS Interface Specification)(TF--:l--ls-,.. Rev. V dated 26 November 1~~.Mo:dification ofGovernment Furnished weapon and EW simulation software shall requireapproval of the orocuirina Activity.

1. 5. 6. 21. -- Electronic Warfare Simulation. - The simulationshall include the appropriate capabilities and vulnerabilities of thiethreats and ownship to electronic warfare.

The dynamic simulation shall include the following Electronic Warfare;Yst ems:

(a) Jammers (e.g. airborne self protection. standoff/escort)(b) Dispensable decoy JiammersQ-) Disoerisable chaff(d) Dispensable flares

The degree of degraded per4ormance of sensors. weapon systems. etc..hell be determined by geometry, effective radiated power. mode oftieration. antenna pattern end field of v'iew*.

Threakts s-ha-ll use both passive and active electronic warfare

tpchniOpues. The active techniqUes shall consist of emitters withrealistic adjustable power levels.

.0. . ... 1 . I Jamming Techniques. - Jammers are divided into tobasis catecories: (1) Standoff Jammers (S03)/Esco--t Jammers. end (7) Fir14

* 0rotection Jammers (SF3). Cooperative jamming shall be limited to oneDair of hostile aircraft at any time during the scenario.

:..l5.6.2.~1.2Dispensable Countermeasures. Chaff. Flerer' andDecoys. - Threats and ownship shall be capable of deploying chaff. fl.~rps;Inrrr~r -n,. As specified hpro-in.

Page 54: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-7 0

.1 .S.6.7.2. 7. 1. 2. 1 Chaff Simulation Requirements. - Chaff bundlesnd corridors shall be simulated. All chaff dispensed shall haved -UStable drop rates and frequency bandwidth responses. Threats shall br-apable of dropolno bundle chaff ot- LSing forward firincl bundle chaffchaff ro-clets). Chaff bundles shall have a Radar Cross Sec-tion -'is) ofQ, to 1000Square meters and a bloom time of from 0'.1 to 1l. secondsbloom time is the time from launch until chaff reaches Ma::iMutM PCS).all rate shall be variable from 50: to .250 -feet per minute. Chafforridors shall, be -from I to 100 nm in length and shall be formed by anir-craft dispensina a stream of chaff that shall form a c~iiiiorridor. Decay time shAll be uIP to two hours and be specified by

instruictor/operator input with default to a standard value.

'.1..6.32..l2.2Expendable Jammers. - The effects of ane;:pendable Jammer empicyina one of the Jamming types in the threat database shall be Simulated. Jammer ERF' shall be limited to 50 d~m.

7.1.5.6.7-.7-... Offboard Decoys. - The effects of passiveoffboard decoys (up to 10) Shall be Simulated. The RCS of the decoysshall be selectible by the instructor/operaktor from 10' square meters to101'( square meters with a default Value e[Jual tD launching platform RCS.

.l5....~.1..Effect-- of EW or- Probability of f'ill (PFl). -I

Friendly and hostile missile 'fl'/out simulOation in a non-EW environmentshall hr as specified in l...2.i.. In an EW environment themic,,iile flyout profile zknd its; FV shall be altered as a function of theeffe,-tivxeness of the EW4 with corresporld'o r~iVi sual effects.

71.-.6.7.7 InstruIctor/Operator Control. - The instructor-/operatorshall have the capability. at the 105. of modifying any threat'scapatility dtring the plan mode and run state. Each threat platform shallhave its standard suite of sensors. weapons and EW systems modeled in theSimul Ati on with the capabil1i tv for the instructor/operator to modi fv.select or chance each threats suite of sensors, weapons and EW systems.E.Rch threat shall be capable of independent maneulvering, via computerconitrol or via control-- at the 105,' or as slaved threats to one orI morettireit for-oations. The threat simulations shall1 accuratel y model theperformance and characteristics of those threats in the threat data base.Threat dynamics shall be ato~matic and shall reauire instructor/operatorintervention only when, a change from the preproarammed parameter *isdes ired.

7.1.5.6.7.7. 1 Scenario Preparation and Control for EW. SAMS. AA.A andAl. - The canability, shall be provided at the IDS to assion air. 50urfaceand groLund platfoirms/sites an EW capability consistent with the ene.r,.' 5

:arabilities, tactics and doctrine. Similarly. the capability which will-illow. an instru~ctor/operator (during scenario preparation) to locate SAMS%nd AAA sites around any desired line of defense shall be provided.

Antie~rcd~.arij1Fery (AAA) is defined as guns arid unacuided roclet

-r-o- tins dedicated to surface-to-air Lusf. An airborne intev-ce;ptor (AlU)

iS Pr, Urr~tLsfd to find and close with another aircraft.

Page 55: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

3. 1.5.6.T.•7• IIScenario Freparation. - For scenario preparation thecE-bility shall be provided to allow an instructor/operator the f4nllowinooptions:

(a) Ass;ign ECM to air, surface, or ground threats, or default to astandard ECM suite.

(b) Assign initial activation times for ECM. chaff, off boa-ddecoys, flares, and cooperative jamming. (1) unconditionzll%. ordefSult to a standard range value between jamming and victimplatform. (2) conditionaIlv, ha.-d on rangp between speifiedplatforms. () conditionally, based on the occurrence of anovert event such as misile. launch, ownship radar mode change,chaff, off board decoys, flares or cooperative jamming or (4)conditionally. based on a combination of range between twospecified platforms and an overt evert(s).

(C) Assign one of three levels of intelligence to jamming platformas follows:(1) Dumb - Jammer stays in same mode after activation.

( ) Human operator - Jammer chances modes in same manner ascompetent operitor.

(3) Compittrer controlled svstem - Jammer changes modeautomatically and rapidlv as would a smart computer managedsystem employing a loo: through capability.

The instruftot- shall be able to adjust jamming power levels from 0 to

Fur ,-) and (-.) &t.ove, the actual response shall be controlled by thesimkletion system software by comparing types of on-board jammers withown -hip operating modes, and relative effectiveness.

(d) Assign hostile RCS profile or default to a standard value.Refer to 7 1 5. 6. 2.I 1. 2

(e) As-ian PCS to p.ssive offboard decoys.

(f) Assi.n bloom time, fall rate, start and end point (corridorsonly) and decay time to chaff corridors or bundles.

(g) Place SAMS and AAA sites at any desired location within gamingare.: with type and numbers as contained in the threat date base-.

(h) Activate emitters associated with particular SAMS. AAA and Al.(1) unconditionally at any time. (2) conditionally based oNthreat envelope. n.ometry and tactics, or (-) defaul t to a'-tandard range value.

(i) The capability to allow missile systems to be s.ignr-1 t-.aiborr.o tare&s shall be provided.

. Scenario Control. - For scenario control, thecapability shall be provided to allow an in0.ructor/onerator to prer'rr.;Itany trend tinn or value which was assign-d dtiri g scenario. and a,..i r-r ,\alu- or crrlidtion within system limitations.

. . -. Air Lat'rched Mi ssi I . - Air p Ia orm_- .hp I I hav, +.: -lip I t V t0 launc h (7,i ss iIeP aa;*i ns t t he nw-n zh ir- and a~ mao~def ined tel c)-:

Page 56: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

I.5.6.4.l Threat Air-to-Air Missiles (AAtI). - Anv of the airPlatformas shall be capable of launching their appropriate AAtiS aaainstowns-iiv and other air platforms. The capability shall be included fortWentY-four (24) AAls- to be-in flight at any time. Each AAM shall have

appront-i~te fliahtt par-A-meters and performance characteristics -for thosethreats in the threat data base.

..1567.. Ownshir, Air-to-Air Missiles. - The capability Shall beprovided to lauknch the types of missiles defined in 3.1.5.1.5.

l.~.6.4.:Threait Air-to-Surface Missiles (ASM). - Air platformsshall be capable of lauinching their appropriate ASMs against all surfaceplatforms and the ownship aircraft carrier. Each air platform shall becapable of launchina Lip to three (7.) ASMs at any qgiven time. Thecapability shall be included for thirty-two ASMs to be in flioht at ans,time. Each ASM shall have appropriate flight parameters and performancecharacteristics for those threats in the threat data base.

.1.~.&.4.4 D)nship Air-to-Surface Missiles. - The A-6F (ownship)shall be Capable Of laUnching the types of missiles defined in 7....of sveci ficat ion AIZS eWSTSSC).

Z;.I 5 6 '. _5 Gun Simulation. - Any of the air'platforms shall becapable of firing their appropriate gons at the owinship. The F-14D(ow'nship) shall be capable of firina the M61AI 20mm cannon at any threat.

I .5. .77 6 Sut-face-to-Air Sites. - Surface-to-air missile (SAT~s)site-s arid anti-aircraft artillery (AAA, sites shall be included in thesimulation. These SAM and AAA sites shall constitute an oriain forMiSSile liaunches against own aircraft.. The capability shall be provided40r 12 si tes to be active at any time during the mission/scenario. Theseactive sites shFell consist of SAM sites and AAA sites in any combination.Each site shall be speci4ied as oroLund-based or su'rface-based. Theelectromaonetic emission characteristics associated with SAM and AAA sitesalong~ with their associated missile flicht per-for-mance characteristicsshall be simulated.

Page 57: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NAC-90104-70

Threats. The reauirements o4 Snecificetion

5CSACT100 Paragraph 3.1.5.6.:Z.2 shall apply.

Threat Data Base. The requirements oi

ecification A55CSACTI1O Paragraph -.I.5.6.Z.2 . shall apply.

Z.1.5.6.7.2.2 Threat Tactical Capabilities. The requirements

Specification A55CSACTiUl' Paragraph c 1l5.6.:.. . shall appl.,

3 1.5.6.3.2.2.1 Airborne Threats. The requirements of

iecification A55CSACTI'O Paragraah 3.1.5.6.3.2.2.1 shall apply.

immand Options: dBkmoswTalJ Ke.ys: X=e::it 7 =Help

'ST 221 12-15-88 14:4 4 WEAPONS.Pl

S.1.6.1.1.4.1.6.1.7 Other Models. Other models shall include models

;ed for generating images used in tactical training scenarios. Moving andn:ed models shall include the following:

(a) Aircraft - Aircraft shall be modeled to include all details and

markings to provide positive recognition as to type and aspect from

max'imum ranges compatible with size and image resolution. Size

en:aggeration shall be used if needed for detection to the magimum

ranges specified. If wire model images are used for multiple

simultaneous aircraft image simulation, a hidden line removaltechnique shall be employed to provide aircraft aspect cues. At

least two aircraft shall be computed and displayed from the fully

modeled data base when more than one aircraft is in view. Aircraft

tvpes to be modeled are referenced in Specification AV55CSACT10CI

Paragraph Z.1.56...2.1 (Threat Data Base).

(b) Missiles - Surface-to-air missiles shall be modeled to include plume

and missile body adeauate to provide for detection and aspect

determination. Size e':aggeration mav be used if required for

detection to the maximum ranges specified. Missile types to be

simulated are referenced in Specification A55CSACTO0'0 Parag

.1.5.6.3.. 1(Threat Data Base).

Ground-based missile launch sites. representative of the su-fpce-to-

air missile types shall be modeled for inclusion in the high-speed

low-level flight corridor terrain areas.

(c) Own Weapons - Simulation of own weapons release shall include tracer

oath for firing of Gatling gun. Simulation shall include start and

stop of firina burst under computer control. The trajectory of

shells shall be represented in the displav. Firing of air-to-air or

air-to-ground weapons shall be provided via simulation of missile

plume and missile trajectory.

(d) Anti-Aircraft Artillery (AAA) - AAA shall be simulated to include

muzzle flash.

Page 58: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

(e) Ships and boats - Surface ships and boats shall be modeled toinclude all major features reouired to provide positive recoonitionidentification and aspect from the ma::imum ranges compatible withsize of the ship type. Twelve types of ships shall be modeled.Ships and boats to be simulated are referenced in SpecificationA55CSACT100) Paragraph 3.1.5.6.3.2.1 (Threat Data Base).

(f) Ground Targets - Ground t~rcets shall be placed within the low-levelhioh-speed flight corridors. Ground targets shall include the SAM

Other Models. Other moving models shall be in

accordance with Paragraph .1.6.1.1.4.1.6.1.7.

Hostile aircraft shall be detectable at ranges according to the aircraftsize and accuity of the human eve. Size and/or object brightness shall bee:,aggerated if necessary to provide detection capability.

Firing of own weapons and hostile weapon firing shall be represented.Air-to-air missiles shall be represented by rocket plume. Own ship Gatlinogun fire shall be represented by tracer images. Visually displayed airbornetargets and missiles shall not e,ceed more than 5 at any one time (aunfiretracet is not counted as a taroet).

Airborne taroet presentations in the visual system shall be coordinatedoith the range and relative position as indicated bv the sensors being used atthat time (e.g. Radar. TV and IR).

.1.6.1.1.4.1.7.1.2 Surface-to-Air Missile Evasion. ScenessimUlatino surface-to-air missile attact aoainst the F-14D shall be displayedto provide practice in surface-to-air missile evasion tactics. The missilesshall be launched from a typical SAM site placed within a generic area fromthe IOS. Up to 5 active SAMs shall be visually displayed at any one time. ifother airborne targets are presented the sum of such targets and missilesshall not e::ceed 5. Launch and flight of SAMs shall be coordinated betweenvisual and sensors displays.

-.1.6.1.1.4.1.7.1.3 Surface Attack. Scenes simulating the F-14Dlaunchina missiles against ships or land-based targets shall be simulated.The simulation shall include missile rocket exhaust as the missile travelstoward the target. Missile hits shall be displayed by a bright flash at the

target. Launch of SAMs from the rnip under attact. shall be simulated. LID to5 SAMs shall be in flight at any one time.

Moving Model Control. Control of moving models

hall be via the trainer computation system in response to instructor control

nputS or from automated movino model control as part of the training-en1r-1o. Up to 5 simultaneous moving models (air or sea surface) in an\,mbination havino independent a*:is systems shall be generated and disolaved.

om, Fnd_: shall include:

Page 59: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-9C 04-70

() Airborne TargetsMe, ina Model select up to 5 of 24 types

Taraet Aircraft attitude 0s-i6Q all :P5Target Aircraft position o-,Target Aircraft velocity a-2.8 Mahh

Gun Fire fire own ship or any hostile

Missile Launch fire own ship o- hostile

Surface-to-air missile fire any of 18 types

Anti Aircraft artillery fire any of 2 types

(b) SurfAce Targets Up to 5 of 12 tvpes

Ship Select t o-360oHeading 0-30 knots

Speed Lat/LongShip position

4.2.2.7.-.15 Weapon System Tests. - Tests shall be conducted to

demonstrate operation of the armino and release system and weapon

characteristics such as velocity. ranoe. and accuracy. Guns and all

soecified missiles shall be tested using oreviouslv validated NADC

reaj-time weapon simulations as standards, and shall conform to these

standards within the following tolerances.

(.0 Missiles

(1) Velocitv at interceot: ±5 percent

(2) Time of fliaht: ore ter of ±5 percent or ±0.05 second

(b) Gun(1) Velocity of first bullet nearest to taroet: ±5 vercent

(2) Time of flight (first bullet of a burst): oreater of ±5

percent or ±0.1 second.

Page 60: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

APPENDIX B

F-14D TRAINER

4UEST FOR PROPOSAL

LIST OF THREATS

Page 61: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70Th eat/Emitter Group AlLocations (FOR OFFICIAL USE OLTY) 4/6/89

GROUP I GROUP 2 GROUP 3 GROUP 4

U DACKNET a S NIG-21 S RIC-23 C HIG-1

TALL KING a a JAY BIRD 9 NIGHLARK I C TU-95CO0 PAIR * B MERSHIP a NIG-2S C TU-26

SIDE NET * a EW SITE TYPE 1 I NIGH LARK IV 0 SU-20* BIG BIRD * I EV SITE TYPE 2 MIG-29 C NIGH FIX

B FLAT FACE * S EU SITE TYPE 3 a END RU 0 TU-16a THIN SKIN * B EU SITE TYPE 4 NIG-31 C PUFF BALL

' SPOON REST ' a EU SITE TYPE 5 FLASH DANCE 0 IL-38I SCUAT EYE * a EW SITE TYPE 6 3 SU-27 0 IL-76

* Ew SITE TYPE 7 8 SLOT BACK C TU-22H& I EU SITE TYPE 8 9 BIG PAGE E SUPER ETENDARD* a EW SITE TYPE 9 DOWN BEAT 7a E SITE TYPE 10 a SQUASH COME E KFIR* S EW SITE TYPE 11 a SU-24 7* a EW SITE TYPE 12 1 SA2E TYPE I E MIRAGE F-I

Ig EU SITE TYPE 13 S AE TYPE 2 C CYRANO IV'U EU SITE TYPE 14 AE TYPE 3 E MIRAGE 2000.5 LONG TRACK A2E TYPE4 7*I GCI SITE TYPE 1 9 FAN SONG E/V E JAGUAR• S GCI SITE TYPE 2 U FLAP WHEEL E TORNADOI GCI SITE TYPE 3 a FIRE CAN C DECCA 72I OARLOCK S SA2F TYPE I C MOKIM

I SAF TYPE 2 C SAS TYPE I

I SA2F TYPE 3 C SAS TYPE 2B FAN SONG I 8 SUARE PAIRa SA3 TYPE I C SA6 TYPE I

I SA3 TYPE 2 C SA6 TYPE 2S LOU BLOW C SA6 TYPE 3

3 STRAIT FLUSH 9 SA?I SAS TYPE I C SAI4

I SAO TYPE 2 a SA9a SAS TYPE 3 S SA139 SAS TYPE 4 E DOG EAR9 LAND ROLL 3 SAID TYPE 1I U DISH a SAID TYPE 2

B FLAP LIDB CLAN SHELLC BAIl TYPE I

C SAIlI TYPE 2STATUS COES: C SAli TYPE 3

* -COMPLETED AND SUBMITTED C SAIl TYPE 4

A ALL DATA AVAILABLE TO INCORPORATE U FIRE DOMEI MAJORITY OF DATA AVAILABLE - MINOR HOLES a TUBE ARMC ABOUT 50% DATA AVAILABLE C SNOW DRIFTD• ABOUT 25% DATA AVAILABLEE -LESS THAN 1% DATA AVAILABLE

Encl (1)

Page 62: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70Threat/Emitter GroWp Allocations (continued) (FOR OFFICIAL USE ONLY) 4/6/69

GROUP S GROUP 6 GROUP 7 GROUP 8

D KIROV 0 F-140 0 VAJIN E TICONDEROGA

C TOP ONE C APG-71 C POT ORUN/HEAO C SPY-IA/MKI-9O

C TOP PAIR E F.&S C SLIK NET C SPG-9, Spa-9A

C SHOT ROCK/OGNE D AUG-10 E WADI N'RAGN C SPS-550 SLAVA E F-SE C RAN 11/12 E VIRGINIA

C KITE SCREECH I C APG-153 C RTN-IOX/ORION C SPG-S1S-DD SOVIENENYY E F-1SC E NINITZ C SPG-SS

C FRONT DOME C APG-63 C Nt 95/115 C SPG-60

C NAND STAND E F-16N C PHALANX C SPS-10

0 UDALOY C APG-66 C SPS-48 E SPIIUANCEC EYE OIIWL E F/A-T8 C SPS-9 C IPOTAS HK23

C TOP PLATE C APG-65 C SPS-100-G E CHARLES ADAMS

C STRUT PAIR I E A-6E C 1N-66 C SPG-53A-Fo NANUCHKA C APQ-156 C SPS-59 C SPS-39

C MUFr COBS E AV-6B C 1PN-10 f VICHITA

C PEEL PAIR E E-2C E IOUA E ARLEIGH UKE

C nIUS E APS-125 C 11K 25 NO 3 OLIVER HAZARD

D KRIVAK E EA-68 C I"K zTNW m C IK-92 CAS

C HEAD NET A/C E APS-130 C SPG-3&. N 34 C NK-92 STIR

C DON Ii D HIKE C SPS-".6/LN-66 E TARIIAA

C LOW TROUGH C SNOOP HEAD C NAWK C SPS-528

C KRESTA 0 FOXTROT C NPI 0 OSA II

C PEEL GROUP C SNOOP PLATE C CUAR ?

C SCOOP PAIR 0 BRESHHEV C PAR ?

C BIG NET C PLATE STEER C RAPIER TYPE 1 0 CHARLIE I

C MO KASHIN f CAKE STAIID C RAPIER TYPE 2 0 OSCAR

C KARA C LUDA C BLINO FIRE C GIEN PATROL MOAT

C OSA I C UASPHO/SUVISR C ACCC DRUM TILT C RICE LAMNP C CROTALEC *SQUARE TIE C P/BEAN STICKS C MIRADOR II

C GRISNA C TIN CUiRVE C TMD-5000C STRUT CURVE C DECCA 707/909 D RSS-70C TARANIUL E SAAU4 0 LASER GUIDEDO ECHO It C PLESSY AWS-I 0 GIRAFFEC SNOOP TRAY C VITEX FC SYST C ROLANDC SNOOP SLAB C CONTRAV SEA HM C KPOR-16C BORIS CHILIKIN E LA CONBATTANIE C AAA S4MH TYPE I

C KIEV (BAKU) C NSA IA4 28 C AAA STuN TYPE 2C CROSS SWORD C OTO HKELARA C AAA 57PM TYPE 3

C POP GROUP C M-20 C AM 57MI TYPE 4C HEAD LIGHT C C DECCA 1226 C AAA 5711 TYPE SC FRONT DOOR S C DECCA 1229 C AAA S5?0 TYPE 6C KITE SCREECH E LEANDER I WHIFFC SASS TILT C $45, 24.4 C AAA 3SHKO RUN TUB S SAi2 C SUPER FLEDERNSC KIEV (OTHER) S GRILL PAN I ZSU-23-4C FRONT OR/PIECE C BILL BOARD C ZSU-XC OWL SCREECH I TIN SHIELD I GEPARO 3510C TOP SAIL C SA-X-1S C SIEUSC TOP STEER 0 SCRII HALF C MPO-I2C STRUT PAIR 2 C SA16C PALM FROND A/S 0 INC OON KAY

Page 63: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-901")4-70

F-14D WEAPON LIBRARY

TACTS MODELAVAILABLE OwNSmIP wEArON

I TO AIR MISSILESAIM- 7F/H YES YES

AIM-9H YES

AIM- 9L YES YES

AI-9K YES YES

AIM- 54C YES YES

AIH-120 YES

AA-2D YESAA-6D ACRIDAA-7 (AA-7A/C/D) YESAA-8 APHID YESAA-9 AMOS YESAA-1OA YES

AA-10C YESAA-1OEAA-IIM550 MAGIC I YESM550 MAGIC 11M530 SUPER DAAAMASRAAMAA-10B ALAMO -YES

IR TO AIR GUNS20 MM M61AI YES YES

'.A GUNS130 MH114 MM100 Km76.2MM57 MM YES50 MX45 KM40 KH37 MM35 KM30 MH25 MM20 MM,CIWS PHALANX16 INCH5 INCH1ZSU-23-4 YESADGM-63057 MM (MUFF COB) YES

GEPARD 35 MM Enc) (4)

E-1

Page 64: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-50104 - 7 0

F-14D WEAPON ALLOCATION

TACTS MODELAVAILABLE OWNSHIP WEAPON

TO SURFACE MISSILESAGM-84A/C/D HARPOON YESAGM-88 HARM YESAGM-65E/F MAVERICK YESAGM-45A/B SHRIKE YESAGK-123A SKIPPER IIAS-4 KITCHENAS-5 KELTAS-6 KINGFISHAS-11.EXOCET

FACE TO SURFACE MISSILESTOMAHAWKSS-N-2A/B/CSS .N.3B

SS-N-9SS-N-10SS-N-11SS-N-12SS-N-14SS-N-19SS-N-22S I LKWORMCSS-N-2CSS-N-1SEAKILLER SSMHARPOON

E-2

Page 65: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-7 0

F-14D WEAPON ALLOCATION

TACTS MODELAVAILABLE OWNSII1P WEAPON

IFACE TO AIR MISSILESSA-2E YES

SA-3 YES

SA-6B YES

SA-BB YES

SA-10SA-IISA-12SA-16SA-5 YES

SA-13SA-N-ISA-N-3SA-N-4SA-N-6SA-N-7SA-N-9IIIAWKRAPIER YES

CROTALESM-2ERSM-2KRPATRIOTSM- IMRSEA SPARROWSA-2F YES

SA-14SA-9 YES

SA-X-15R.S-70ROLANDSEACATSEA VOLF

E-3

Page 66: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

ADDITIONAL A-6F wEAPON LIBRARY

TACTS MODELAVAILABLE OWNSHIP WEAPON

t TO SURFACE MISSILESACM- 84A/C/D HARPOON YES YESAGH-88 HARM YES YESAGM-65E/F MAVLRICK YES YESAGM-45A/B SIIRIKE YES YESAGH-123A SKIPPER II YES YES

TACTS MODELAVAILABLE OWNSIIIP WEAPON

MK-81 .YES YESMX-82 YES YESKK-83 BSU-85B YES YESMK-83 YES YESMX-84 YES YESMK-76 YES YESKK-106 YES YESB-57 YES YESBDU-20/C YES YESB-61 YES YESBDU-36/C YES YESCBU-59/B APAM YES YESCPU-72B FAE I YES YESCBU-78/B GATOR YES YESCBU-88 SKOKEYE YES YESCBU-1O C/B MK84 LGB YES YESGBU-12 B MK82 LGB YES YESGBU-16 B MK83 LGB YES YESKK-25 MINE YES YESKK-36 DST YES YESMK-40 DST YES YESMK-41 DST YES YES

MX-52 MINE YES YESKJ-55 MINE YES YESMK-56 MINE YES YESMK-60 MINE YES YESMK-62 MINE YES YESHK-63 MINE YES YESMK-64 MINE YES YESMK-65 QUICKSTRIKE MINE YES YESKK-58 MARINE MARKER YES YESMK-77 NAPAI14 YES YESKK-20 ROCKEYE II YES YESBDU-3301B YES YESBDU-15/B YES YESBDU-48/B YES YESLAU-1O 5" FFAR YES YESLAU-61 2.75" FFAR YES YESLAU-68 2.75" FFAR YES YES

E-4

Page 67: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90101-70

A-6E SWIP WEAPON ALLOCATION

TACTS MODELAVAILABLE OUNSlIP IWEAPON

%IR TO SURFACE MISSILESTACIT RAINBOW NOT CURRENTLY YESWALLEYE NOT CURRENTLY YESSLAM NOT CURRENTLY YES

E-5

Page 68: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

APPENDIX C

F-14D TRAINER

REQUEST FOR PROPOSAL

OWNSHIP FIDELITY REQUIREMENTS

Page 69: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NAXC-90104 -'iO

-... ., Tolerances. Unless other-wise soecified. the

te'--- herein shall apply throuohoLt the entire ranae of operation of

the de-ion basis aircraft regardless of whether the range can be

considered normal or abnormal. The tolerance shall apply to desion basis

aircraft data in the 4ollowing order of preference:

(a) Directly measured aircraft flight test data.

(b) Corrected/normalized flioht test data.

(c) Data e!tracted from test stand and wind tunriel tests.

(d) Analvtical data.

Unless otherwise specified. the tclerance fioures shall be construe

to mean plus or minus values. The tolerances shall be applicable at any

place the values may be read: i.e.. at the computer. IE. trainee stEtion.

etc. In cases where the accuracv of the operational aircraft instr.ment

or indicator is less than the tolerance specified. the operational

airc,-a4t instrument accuracy. shall be the tolerance for that inst,-ument

but rct for the related ozreeter.

-1.5.7.1 Gen-rjl. Fer~ormance characteristics of the desion

t6s=-_ &ircraft nct covered bv soecific tolerance- shall be esipr.d the

fcllckwiro oeneral tole-ances within which the trainer shall oce-ate. The

general tolerence shell be aoclicatle to the particula- z-ramEter

invc.lved, as c.rovided in or derived from the aerodynamic data.

(a) Total mass I percent.

(b) Moments of inertia I percent or 0.1 percent of ma-:2mUm

value whichever is oreater.

(c) Attitude AccuracV I Degree.

(d) Attitude ReSolution '. 1 Degree.

(e) Other percent

Curve Slope. The curve %lope of a trainer oerformance

l,rve sh&ll be within ± IC percent (of same sion) of the curve slope of

he corresponding trainer criteria curve at all points where the criteria

,rve 2 continuou €S unless otherwise specified herein.

Page 70: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

liDC-9o004-70A

3.1.5.-7. Control System Toleraces. All force and moment

characteristics shall be measured at the pilot's nominal point of

application. Control stict and rudder pedal positions shall be defined as

the position of those mechanical elements normally in contact with

the

pilot.

(a) Surface deflections vs control 0.5 degree

deflection

(b) Control force vs control 5 percent or 'I pound.

deflection whichever is oreater.

(c) Breakout plus friction force 'i pound

(d) Friction band It pound

(e) Free play 0.16 inch.

(f) Time for operation of trim 5 percent.

system, flap actuation.

speed brale actuation, etc.

(g) Damping ratio 0.05

(h) Damped natural frequency 10 percent

(i) Amplitude response 10 percent

I,.4 Fiying Oualitie- Tolerances. -

(a) Steady state trim points:

(1) Angle of attacl vs trim 0.5 unit angle of attact,

airspeed

(2) Control deflection vs trim 1I' percent or I degree which-

airspeed ever is oreater

(71) Trim surface deflection 10 percent or 1 degree which-

indication vs airspeed ever is greater

(4) Approach speed vs gross I P:nots IAS

(Optimum AOA)

(b) Longitudinal trim changes due to thrust changes and activation

of appurtenances: during appurtenance activation (e.g.. landing

gear. wing flaps, speed brat:es. wing sweep). All changes must

e,:hibit the same sign as the criteria data.

(1) Control position change ('.5 degree

(-) Control force change I pound or 10 percent

whichever is greeter

U) Pitch angle change I degree

(4) Angle of attaci change I degree

Page 71: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

(5) Altitude change Leaser of 10 4eet or 10percent of total change inaltitude

(6) Airspeed v% change Lesser or 5 VIAS or I0percent of total chanoe inairspeed

(c.) £tatic longitudinal stability:

(1) Control deflection vs 0. degree

airsoeed

(2) Surface deflection vs 0.5 degree or I0 percent

airspeed whichever is greater() Control force vs airspeed 0.5 pound or I10 percent

whichever is oreater

(4) Anole of attac) 0.! unit anale of attecl.

ai rsneed

(d) Dynamic longitudinal Stabilitv:

(2) Undamoed natural 4reQUency 1i0 percent

(3) At,plitUde resonse I - percent

(e) Maneuvering longitUdinal stabilitv-

(1) Stic. 4orc per unit 1iC percent or I lbnormal acceleration

(-) Control deflection vs '.5 decree or I0 percert.normal eceleration whichever is oreater

( ) Angle of attac$: vs normal . decree or I' petent.

acceleration whichever is oreater

(4) Sur'ace deflection vs 0.5 decree or I0 percent.acceleration whichever is greater

() ic ~terval directional stability:

(I) Lateral control deflection 0.E depree or I0 percent.vs sideslip-srgle whichever is greater

(2N Lateral control force vs I pound or I(% percent,sideslio anale whichever is areter

(7) Lateral surface deflections 0.5 deoree or I oepcent.vs Sideslio anol. ehiehe-Ow 'o r,

Page 72: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

(4) Roll angle vs sideslip 1.0 deoree or 10 oercent.

angle whichever is greater

(5) Directional control 0.5 degree or 10 percent,deflection vs sideslip whichever is greaterangle

(6) Directinr'l control force I Pound or 1(: percent.v- sideslip angle whichever is greater

(g) Dynamic lateral directional stability:

(1) Dutch roll period vs 10 percentairspeed

(2) Vutch roll damping vs 0.05aIr speed

(7) Fcil to sideslip ratio 10 percent

(4) Sideslip angle vs time 10 percent or I deo,-ee ofpea amplitude twhichever igrea tei-

( Ev .i r a stetility:

Roll arole vs time 2') percent and converment ordivergent as in aircraft

(I) Late-al control effectiveness:

(1) Roll angle vs time 10 percent

(2) Sideslip anole vs time 10 percent

(2) Roll rate vs time 10 percent

(4) Ro] mode time constant 25 percent

(j) Engine Out Flying Qualities:

() Minimum Control Airspeed 1 Its.

(2) Dynamic Response to sudden 15 percentengine failure (time responseand magnitude of angular rates)

(I) Stall characteristics (lo):

Page 73: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-7C

(1) Buffet onset speed vs 2 knotsgross weight

(2) Stall speed vs gross 2 knotsweight

(7) Buffet onset angle of 0.5 unit

attack

(4) Stall angle of attack 0.5 unit

Power Plant Tolerances. -

(a) Fuel flow 5 percent

(b) RPM 5 percent

(c) RPM vs power lever Position 1 percent RPM at idle andgreater then 90% RPM: 2percent elsewhere

Cd) Encine windmilling speed 1 percent RPM

(e) Engine RPM vs time 5 percent

(f) E-:haust oas temperature 3 percent from idle to 75percent RPM: 1.0 percentabove 75 percent FPM and atidle

(a) Oil pressure 5 percent

(h) Thrust 3 percent, or 0.3 percentof maximum value whicheveris greater

(3) Light off time 10 percent

(j) Fuel ouantity 5 percent

Performance Characteristics. -

Page 74: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

(a) Rate of climb 5 percent or 50 feet perminute whichever is greater

(b) Level accelerati6n/decelaration 5 percent(time and fuel used)

(c) Maximum airspeed 3 knots or I percent which-ever is greater

(d) Turn'performance (sustained 5 percent or 0.1 g, whichever

and instantaneous) is greater

3.1.5.Z.7 Ground Handling Characteristics. -

(a) Heading angle vs time 10 percent(oarameterized against percentnose gear steering)

(b) Heading angle vs time 10 percent(parameterized against percent

differential wheel brakeapplication)

(c) Ground speed vs time 10 percent(parameterized against wheelbrake application)

Takeoff and Landing Characteristics.

(a) Nosewheel liftoff sveed vs aross 2 knotsweight and center of gravity (CG)

position

(b) Takeoff Airspeed 2 knots

(c) Takeoff time I sec

(d) Stooping time 1 sec

(e) Rudder and aileron effective- 5 kts

ness speeds

(#) Distance 10% of instantaneousaircraft value

System Operation Tolerances. - Unless otherwise

specified in the detail specification, trainer system tolerances shall be

as oIllows:

(a) Hydraulic pressure Io PSI

(b) Hydraulic transients I sec

(c) Electrical indications 5 percent

(d) Power (electrical) 5 percent

Ce Electrical device load 5 percent

(4) Extenslion. retraction times 15 percent

Page 75: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

(g) General time delay (switch to 10 percent

light warm-up. etc.)

(h) Control force vs control 10 percent

deflection (Throttles, gear

handle, etc.)

(i) Accumulator pressure 5O PSI

(i) Actuator response time I second

(I) Standby compass 3 degrees

(1) Free air temperature 2 degrees

m) Accelerometer 0. Ig

(n) Coc:pit altitude 100 feet

(o) Pyro horizon indicator 2 degrees

(all a::es)

(p) Turn indicator V/10 needle width

(Q) Sideslip 1/4 ball width

Navigation Tolerances. - The navigation tolerances

shail be es follows:

(a) Relative bearing 2 degrees

(b) Localizer beam location 1 foot

(c) LocaliZer beam approach bearing 0.2 degree

(d) Glidepath beam location 10 feet

(e) Glidepath beam angle 6 minutes of arc

(f) Gyro precession rate 2S percent, or Z decrees

hour. whichever is less

(g) Magnetic variation 0.1 degrees

(h) Field elevation 10 feet

(M) Signal attenuation vs 25 percent ma:imum range

distance

(0) Radio beam width 20 percent

(V) Distance indicator 0.5 miles

(1) Radio facility location 0.1 mile

Page 76: FLIGHT SIMULATION TRAINER THREAT ENVIRONMENT … · Appendix A F-14D Trainer Request-For-Proposal Threat Environment Appendix B F-14D Trainer Proposal List of Threats Appendix C F-14D

NADC-90104-70

Z.1.5.4 Data. - Trainer design criteria shall be derived from

F-14D/A-6F data and other data sources as may be necpssarv.

3.1.5.5 Scenarios. - The suite training mission shall be

accomplished through training scenarios. Training scenarios shall be

either automated or Instructor/Operator controlled as specified herein.

3.1.5.5.1 Automated Scenarios. - Automated (canned) scenarios

shall provide totally preprogrammed training missions. All inputs usually

reauired from an instructor/operator to conduct an individual training

scenario (e.g. initial conditions, malfunctions, navigational facilities,

etc.) shall be preprogrammed to occur when specified parame-ters are met.

It shall be possible, via the OS or the off-line work station, to

construct individual preprogrammed (canned) training scenarios and store

them on a disc (system or floppy) to be utilized at a future date. All

features available to an instruc-tor/operator during free-flight shall be

cacable of prepro-gramming for incorporation into an automated scenario.

Fifteen (15) complete scenarios shall be provided and shall be available

for selection and activation from the system disc at any time.

3.1.5.5.2 Instructor/Operator Controlled Scenario. - The lOS

control station shall provide the capability of tailoring an e:ercise to

meet the needs of the individual trainee. The train-ing scenarios shall be

under the positive control of an inatructor/ operator who will be located

at the lOS. The trainer shall provide the capabilities to permit