h i & Project Report Lincoln Laboratory MASSACHUSETTS INSTITUTE OF TECHNOLOGY PA-385 Recognition of a Target M. J. Lewis 12 November 1976

Similar documents
Technical Note Lincoln Laboratory. A Resynchronization Technique for a Sequential Decoder E5D ACCESSION UST. G. Blustein.

Using Excel for Graphical Analysis of Data

UNIT I READING: GRAPHICAL METHODS

Experimental Design and Graphical Analysis of Data

Detecting Polytomous Items That Have Drifted: Using Global Versus Step Difficulty 1,2. Xi Wang and Ronald K. Hambleton

Chapter 12: Quadratic and Cubic Graphs

Section 1.5 Transformation of Functions

OFFICE OF NAVAL RESEARCH CONTRACT N C-0118 TECHNICAL REPORT 94-07

A Self-Organizing Binary System*

Section 1.5 Transformation of Functions

An Introduction to Data Analysis, Statistics, and Graphing

This paper describes an analytical approach to the parametric analysis of target/decoy

Part I, Chapters 4 & 5. Data Tables and Data Analysis Statistics and Figures

SUBDIVISION ALGORITHMS FOR MOTION DESIGN BASED ON HOMOLOGOUS POINTS

Contents 10. Graphs of Trigonometric Functions

A new Eulerian computational method for the propagation of short acoustic and electromagnetic pulses

Improving Positron Emission Tomography Imaging with Machine Learning David Fan-Chung Hsu CS 229 Fall

The Last Word on TLE. James Brownlow AIR FORCE TEST CENTER EDWARDS AFB, CA May, Approved for public release ; distribution is unlimited.

Using Genetic Algorithms to Improve Pattern Classification Performance

We, the undersigned Councilmembers, approve the claims in the amount of $78, this 18th day of September, CITY OF WOODINVILLE CLAIMS

Confidence Intervals: Estimators

Version 1.0. General Certificate of Education (A-level) June Unit 3: Investigative and practical skills in AS. Physics. Final.

Magnetics. Introduction to Filtering using the Fourier Transform. Chuck Connor, Laura Connor. Potential Fields. Magnetics.

Graphical Analysis of Data using Microsoft Excel [2016 Version]

Chapter 2. Frequency distribution. Summarizing and Graphing Data

Structural Health Monitoring Using Guided Ultrasonic Waves to Detect Damage in Composite Panels

Application Note AN How to test IEEE 1394b Firewire Cables with the Mohr CT100B and Mohr TS-4 Adapter

Synthetic Aperture Imaging Using a Randomly Steered Spotlight

Unit I Reading Graphical Methods

About This Version ParkSEIS 2.0

Occluded Facial Expression Tracking

Contents 10. Graphs of Trigonometric Functions

Making Science Graphs and Interpreting Data

Characterizing Strategies of Fixing Full Scale Models in Construction Photogrammetric Surveying. Ryan Hough and Fei Dai

Face Tracking : An implementation of the Kanade-Lucas-Tomasi Tracking algorithm

Evaluating the Performance of a Vehicle Pose Measurement System

ACTIVITY 8. The Bouncing Ball. You ll Need. Name. Date. 1 CBR unit 1 TI-83 or TI-82 Graphing Calculator Ball (a racquet ball works well)

(12) Patent Application Publication (10) Pub. No.: US 2002/ A1

Real-time Monitoring of Multi-mode Industrial Processes using Feature-extraction Tools

GRAPHING WORKSHOP. A graph of an equation is an illustration of a set of points whose coordinates satisfy the equation.

Vertical and Horizontal Translations

JUST THE MATHS UNIT NUMBER STATISTICS 1 (The presentation of data) A.J.Hobson

NEURAL NETWORK VISUALIZATION

Modeling Unsteady Compressible Flow

1 Trajectories. Class Notes, Trajectory Planning, COMS4733. Figure 1: Robot control system.

arxiv:chao-dyn/ v1 13 Dec 1998

PARAMETRIC EQUATIONS AND POLAR COORDINATES

OPTIMIZING A VIDEO PREPROCESSOR FOR OCR. MR IBM Systems Dev Rochester, elopment Division Minnesota

EEN118 LAB FOUR. h = v t ½ g t 2

BioIRC solutions. CFDVasc manual

OPTI-521 Graduate Report 2 Matthew Risi Tutorial: Introduction to imaging, and estimate of image quality degradation from optical surfaces

Design and Development of Unmanned Tilt T-Tri Rotor Aerial Vehicle

Scene Matching on Imagery

Appendix A: Graph Types Available in OBIEE

School of Mathematics, Statistics and Computer Science. Computer Science. Object Detection using Neural Networks and Genetic Programming

To Measure a Constant Velocity. Enter.

Radar Target Identification Using Spatial Matched Filters. L.M. Novak, G.J. Owirka, and C.M. Netishen MIT Lincoln Laboratory

Appendix 2: PREPARATION & INTERPRETATION OF GRAPHS

TPC digitization and track reconstruction: efficiency dependence on noise

Monte Carlo Ray Tracing. Computer Graphics CMU /15-662

Two-Dimensional Projectile Motion

Scanner Parameter Estimation Using Bilevel Scans of Star Charts

SPARE CONNECTORS KTM 2014

Lecture 3 Questions that we should be able to answer by the end of this lecture:

Free Fall. Objective. Materials. Part 1: Determining Gravitational Acceleration, g

Implementing Machine Learning in Earthquake Engineering

CREATING THE ANALYSIS

Fatigue Reliability Analysis of Dynamic Components with Variable Loadings without Monte Carlo Simulation 1

Plane Wave Imaging Using Phased Array Arno Volker 1

Lecture 3 Questions that we should be able to answer by the end of this lecture:

Projectile Trajectory Scenarios

Uniform Motion Lab. The position equation for an object moving with a constant velocity is:

A Longitudinal Control Algorithm for Smart Cruise Control with Virtual Parameters

Section 1.5 Transformation of Functions

Detecting Geometric Faults from Measured Data

Auto Texture Tiling Tool

Learner Expectations UNIT 1: GRAPICAL AND NUMERIC REPRESENTATIONS OF DATA. Sept. Fathom Lab: Distributions and Best Methods of Display

A Multiple-Line Fitting Algorithm Without Initialization Yan Guo

RSM Split-Plot Designs & Diagnostics Solve Real-World Problems

MAC 1147 Exam #6 Review

CMU-Q Lecture 4: Path Planning. Teacher: Gianni A. Di Caro

Simuntaneous Localisation and Mapping with a Single Camera. Abhishek Aneja and Zhichao Chen

Detailed instructions for video analysis using Logger Pro.

Massachusetts Institute of Technology. Department of Computer Science and Electrical Engineering /6.866 Machine Vision Quiz I

Tutorial 1: Welded Frame - Problem Description

Scanner Parameter Estimation Using Bilevel Scans of Star Charts

LAB 03: The Equations of Uniform Motion

A Method for Comparing Multiple Regression Models

Driven Cavity Example

+ ".3+ ll-2 Decimal Forms of Rational Numhers. o'*- f : o.a::. 0hjective To express rational numbers as decimals or fractions.

Visual Analysis of Lagrangian Particle Data from Combustion Simulations

Minitab 17 commands Prepared by Jeffrey S. Simonoff

7 Fractions. Number Sense and Numeration Measurement Geometry and Spatial Sense Patterning and Algebra Data Management and Probability

Adaptive and Iterative Processing Techniques for Overlapping Signatures

Lecture 9: Hough Transform and Thresholding base Segmentation

McGraw-Hill Ryerson. Data Management 12. Section 5.1 Continuous Random Variables. Continuous Random. Variables

Object Classification Using Tripod Operators

SPAREPARTSCATALOG: CONNECTORS SPARE CONNECTORS KTM ART.-NR.: 3CM EN

V. Zetterberg Amlab Elektronik AB Nettovaegen 11, Jaerfaella, Sweden Phone:

Lecture 5. If, as shown in figure, we form a right triangle With P1 and P2 as vertices, then length of the horizontal

Transcription:

SLL 8-392/M Project Report PA-385 M. J. Lewis Recognition of a Target on an ARWBC RTI 12 November 1976 Prepared for the Department of the Air Force under Electronic Systems Division Contract F19628-76-C-2 by Lincoln Laboratory MASSACHUSETTS INSTITUTE OF TECHNOLOGY LEINGTON, MASSACHUSETTS ^toorf^^ Approved for public release; distribution unlimited. BMD TECHNICAL INFORMATION CBiM BALLISTIC MISSILE DEFENSE ORGANJZATiOS 7 DEFENSE PENTAGÖM ;, r Jj1r WASHINGTQN O.C. 2O1.?I9 ' " ".,;;' Iff y. h i &

The work reported in this document was performed at Lincoln Laboratory, a center for research operated by Massachusetts Institute of Technology, with the support of the Department of the Air Force under Contract F19628-76-C-2. I

Accession Number: 378 Publication Date: Nov 12,1976 Tide: Recognition Of A Target On An ARWBC RTI Personal Author: Lewis, M.J. Corporate Author Or Publisher: Lincoln Laboratory, M.I.T., P.O. Box 73, Lexington, MA 2173 Report Number: PA-385 Report Number Assigned by Contract Monitor: SLL 8-392/M Comments on Document: Archive, RRI, DEW Descriptors, Keywords: Directed Energy Weapon DEW Target ARWBC RTI Pages: 3 Cataloged Date: Oct 8,1992 Contract Number: F19628-76-C-2 Document Type: HC Number of Copies In Library: 1 Record ID: 2928 Source of Document: DEW

MASSACHUSETTS INSTITUTE OF TECHNOLOGY LINCOLN LABORATORY RECOGNITION OF A TARGET ON AN ARWBC RTI M. J. LEWIS Group 92 PROJECT REPORT PA-385 12 NOVEMBER 1976 Approved for public release; distribution unlimited. LEINGTON MASSACHUSETTS

ABSTRACT The task faced by the All-Range WideBand Channel (ARWBC) operator at ALCOR while trying to detect the presence and location of a target of interest on the RTI display was examined with the aid of digital RTIs produced by a computer simulation. Controlled levels of three degrading factors --- background clutter, missed target returns, and an unsteady target track were produced in the simulation RTIs and a subjective judgment made as to which RTIs contained detectable target tracks. In this way, useful limits were established on tolerable levels of the three degrading factors considered. 111

TABLE OF CONTENTS ABSTRACT I. Introduction 111 1 II. Description of Problem 1 III. Computer Model of Track Wander, Leakage, and Clutter IV. Computer - Generated Plots V. Conclusions ACKNOWLEDGMENT APPENDI A - Derivation of o APPENDI B - Radar Characteristics APPENDI C - Simulated RTIs 8 8 15 16 18 19 IV

I. INTRODUCTION The All-Range Wide-Band Channel (ARWBC) is a component of the ALCOR radar designed to provide range coverage greater than that available with the conventional ALCOR wide-band window (9 m), and to test designation techniques in real-time. One output of the ARWBC is a digital RTI displaying those range positions in each pulse in- terval where a target is detected. (A target detection is determined by a return satis- fying a preselected set of thresholds on amplitude, length, etc.) An important question in the operation of the ARWBC is the ability of an oper- ator to view the digital RTI and detect the existence and location of a target. Several possible factors hamper this detection, the most important being: The amount of background clutter. The proportion of returns missing from the target trace. The extent to which the target return, when present, wanders about on the face of the RTL The detection problem faced by the operator basically a psychological one is investigated in this report through the use of simulated RTIs which contain the de- grading factors to controlled levels. Although the decision as to whether a particular RTI would thwart or permit detection is a subjective one, it is believed that the ground rules developed in this report establish useful limits on the levels of the degrading factors. ARWBC. The ground rules apply equally well to RTI displays other than that of the II. DESCRIPTION OF PROBLEM An RTI can allow an observer to follow the track of a target provided that the tracking gate is being accurately designated along the trajectory of the target. Figure 1 shows a computer simulation of such an RTI, where time in seconds runs along the vertical axis (increasing upwards) and range in meters relative to the tracking gate is displayed along the horizontal axis. After an initial range displacement at time,

T PA-385 (1) T r B I J..J L..-J-. J-.U J I- - - - - - j Fig. 1. RTI without degrading factors.

the tracking gate is accurately designated on the target trajectory and the line of asterisks continues up the center of the RTL The straightness of the line is an indi- cation of the precision of the designation source. Because there are no other targets in the environment, the rest of the screen is clear. Because all of the target returns passed the thresholds of the RTI system, the line is continuous. Under such conditions, it is an easy matter for an observer to follow the target path. But the situation is not always so simple. Several factors can complicate the task of detection for the observer. First, depending on the thresholds built into the ARWBC algorithms, some of the returns from the target of interest may not pass the algorithms, and gaps may appear in the line. These will be called "missed returns. " More important, an environment filled with penetration aids or clutter may cause addi- tional returns in each range sweep which can obscure the path of the target of interest. In a typical situation, the clutter might consist of several kilometers of chaff, and the target of interest might be an RV. In this report we will occasionally refer to the pro- blem of detecting an RV imbedded in chaff, keeping in mind that the conclusions to be drawn apply to any general detection problem. In addition to clutter and missed returns, a third factor working against the observer is track wander. Depending on the source of designation information being provided to the ARWBC, the target of interest may wander within the RTI range sweep. For example, the ARWBC may be designated by a beacon track. In this case, the target skin return will generally be at a constant range relative to the beacon, with very small range deviations due to beacon instabilities, and the operator will have little trouble following the target through moderate chaff, even with some missed target returns. But in a scenario more realistic from the defense point of view, ARWBC designation would not be provided by a beacon, but perhaps by a track of the centroid of the surrounding chaff cloud. In general, chaff trackers are characterized by substantial range residuals. That is, at any given time, the tracking gate of a chaff tracker may be offset by a Unfortunately, some of the asterisks may not have passed the threshold of our reproduction facilities.

substantial amount from the actual physical centroid of the cloud, which is moving smoothly through space. These offsets will be random in nature, hopefully with zero mean, and with some standard deviation which is a measure of the precision of the chaff track. Since the RV is presumably fixed relative to the cloud centroid, the RTI tracking gate range offsets relative to the cloud centroid will be translated into range offsets relative to the RV, causing the RV returns to wander across the face of the RTL Thus, the standard deviation of the tracker range residuals will impact on the task of the RTI observer. Figure 2 shows a digital RTI in which clutter fills approximately % of the screen,l% of the returns from the RV imbedded in the clutter have been deleted, and a small amount of track wander has been introduced. An observer would require a great deal of imagination to pick out the path of the RV. The purpose of this report is to investigate the impact of these three degrading factors---missed returns, clutter, and target track wander---on the detection problem faced by the RTI observer. By use of a computer program which produces simulated digital RTIs, RTI plots containing controlled amounts of the three factors were produced, and a decision was made as to whether or not the target track was detectable. A track was considered detectable if the observer could correctly determine the position of the target roughly % of the time. It must be stressed that the detection decision was purely subjective. Another observer might find it harder or easier to see the target. A criterion other than % might be used. Despite the subjectivity involved, it is believed that this approach can establish useful allowable limits on the three degrading factors investigated. III. COMPUTER MODEL OF TRACK WANDER, LEAKAGE, AND CLUTTER A computer program was designed to produce simulated digital RTI plots con- taining controlled amounts of the three degrading factors. The wandering track that " Or at worst having a smooth velocity relative to the centroid.

PA-385 (2) 1 1-1 1 1 1 l 1 v. -,- w -Y -' -i # W i V- i i m -,' >: - M,y,yyy,«>.' ',< V,' -. i- >.< - If x - '.' ' < ',',' > <u W PH h. ww -.' -.' W -." - >.".'-. > ': -. ':" ':"'.< V - x ' ' ; Y,",' T 111 ii ^ ' ; '» ' '"" ' yyw w ' + f > > 1 -" v - -< - >:- '.'- v i >: - '...'.' V j_ -: - -5( ) - - - - Fig. 2. RTI with unsteady track, missed returns and clutter.

would be produced by a designation source less steady than a beacon was modeled as a second-order autoregressive discrete time process with zero mean and Gaussian white noise. That is, at time k A, where A is the interpulse period and k =, 2,..., 55, the range offset,, from the center of the RTI is given by = a +cc, + N, A k 1 k-1 2 k-2 k where a and oi are constants and N, is a Gaussian random variable with zero mean 1 2 & and standard deviation a Each point in the series depends explicity on the two pre- vious points. Points were plotted as integer values, but rational values of fc were retained for calculation of fe+1 and k+2. a and a must satisfy the following conditions: a +a < 1 1 2 a -a > -1 1 2-1<«<1 In order for the process to be stationary, If the sequence is stationary, its mean will remain zero and its standard deviation, which is a measure of the wander of the track about the mean, is given by a Z /T a 2 3 2 2 N 1 - a - a + a - a, a -a 2 2 2 12 1 In order to manufacture assorted values of a to provide simulations of progres- sively unsteady tracks, one can manipulate a l, a ^ or a^. The relevant quantity is o. It is a measure of the wander of the RV track across the RTI, since roughly x ~- The upper limit^ot55 is governed by the physical height of the RTI presentation on each page. See Appendix A for derivation.

95% of the RV returns should lie within 2 o units of the origin. Because the dependence of o on cr is more straightforward than that on a or <x, cr was varied by manipu- lating o while holding 1 and a constant. Values of (a, a ) = (.8, -.2) were found to be convenient, reducing the constant of proportionality in the last equation to 1.37. At this point, it is instructive to consider what values of o might be of interest. A. Previous chaff tracking performance of the KREMS radars was explored. The TRADE L-chirp waveform typically produces range residuals on the order of meters. ALTAIR, using its video Track Signal Processor, has produced range residuals on the order of 1 m. With its new Digital Track Signal Processor, the ALTAIR range re- siduals have been reduced to fractions of one meter, which would be undetectable on the range scale used. Thus, in order to provide a representative range of values of 2 a, six values of o from to meters were input to the computer program..a. IN Corresponding values of 2 o are shown below. It was assumed that the chaff tracking performance of any defense radar would lie somewhere in this range. o-.im) 2 a (m) N x 5 1 27 55 82 137 In addition to the wandering target track determined by the autoregressive process described above, missed returns and clutter models were included in the com- puter simulation. Missed returns were inserted by the following mechanism: before See Appendix B for radar characteristics,

each point in the target track was plotted, a random number selected from a uniform distribution was compared with a preset threshold called T2. For example, if T2 were set to.3, % of the target returns were randomly deleted from the plot. Clutter was randomly scattered across the page via a similar comparison between a preset clutter threshold and another uniformly distribution random variable at each (range, time) coordinate on the page. For example, a clutter threshold of.2 resulted in % of the page being filled with asterisks. IV. COMPUTER-GENERATED PLOTS Figures C-l to C-5 show plots generated by the simulation program with values of a =, 5,,,, and, respectively. There is no clutter, and all returns were printed. Values of c^, < 2, the clutter threshold, percentage of missed returns, a and 2a are shown at the bottom of the figures. Using these as baselines plots, progressively greater levels of clutter and missed returns were added by manipulation ot the clutter level up to % and missed returns up to %, and judgments were made as to when the unsteady track became undetectable to the eye. A track was considered detectable if at least % of the target returns were distinguishable from clutter. These judgments were, of course, subjective. Table I summarizes the outcome of the examination of each plot. For each combination of 2 a, clutter level, and missed returns shown, there is an indication as to which RTIs contained detectable tracks () and which RTIs did not (O). A selection of RTIs for the reader's inspection are provided in Appendix C and indexed by figure number in Table I. \ V. CONCLUSIONS Figure 3 presents a summary of the results tabulated in Table I. For fixed values of 2a, the highest tolerable level of missed returns was plotted against clutter. For example, at 8% clutter, RTIs with 2a x = 1 meters contained detectable

TABLE I RTI EAMINATION RESULTS N 2a Clutter (%) Missed Returns Result Figure = Detectable Track; O = Undetectable Track. C-6 C-7 C-8 C-9 C-

a 2a Clutter Missed Returns Result N (%) (%) Figure 5 1 1 C-ll 2 C-12 C-13 6 8 o C-1 C-15 I = Detectable Track; O = Undetectable Track.

<J 2CT Clutter Missed Returns Result Figure (%) 1 O O 27 1 O C-16 O C-17 O O O O C-18 O O O C-19 O O \ O O 55 1 C- O = Detectable Track; O = Undetectable Track. 11

a 2 a Clutter Missed Returns Result N x 'of wo. Figure 55 2 O C-21 O O O 6 O C-22 O 8 O O O O 82 1 C-23 O O 2 O C-2 O 3 O O O 137 1 O C-25 o 2 O o = Detectable Track; O = Undetectable Track. 12

CO ID CO < D- ON s-1 ) CO ) 5-1 f) a <D u o (1) o o 3 -) CO. S a> O cd CD co W H D cd i i n P Cl) 1 < ca o ID CO T3 CD -> 3 fi) in Tt o >> i- <u n CO en CM e O ctt m cn S O a» S i i a) i i 3 > rn Cl) i i "Ü i-> CD CO en.a CD I bn fan H H ih o fe xi «w o o T i r o CO O CN 3P 13

tracks with fraction missed of up to %. Missed returns over % rendered the track undetectable. No curve appears for 2a = 137, as none of the tracks from that group were detectable. Not surprisely, the highest tolerable level of missed returns falls off with increasing clutter and increasing track wander. The rate of falloff of maximum missed returns with clutter varies from gradual in the case of a steady track (2a = ) to rapid in the case of more unsteady tracks (2 a > 55). x In summary, an observer trying to detect returns on an RTI from a target of interest imbedded in clutter faces several obstacles. Range displacements relative to the RTI origin may be introduced by the designation information provided by the radar tracker. Clutter and missing returns obscure the path of the target. With a designa- tion source which introduces range displacements of standard deviation greater than a few tens of meters, the range of tolerable clutter and missing returns is severely limited. Limits of tolerable track wander, clutter, and missing returns derived from subjective criteria are displayed in Figure 3. 1

ACKNOWLEDGMENT I wish to express my thanks to Linda Simon, who wrote the computer program used to generate the simulation RTIs contained in this report. 15

APPENDI A Derivation of er x N k k is a sequence of Gaussian random numbers with mean zero and standard deviation a N is a second-order auto-regressive discrete time sequence with zero mean and Gaussian white noise. That is, V "l k-1 + "2 k-2 + N k We wish to find an expression for o- in terms of ay ay and o^. OK E[x k 2 ]= E[P lvl +«2 x k _ 2+Nk ) 2 ] = E^l 2x k-l 2+a 2 2x k-2 2+ 2C V2 k-l k-2 + "i + - 2(- 1 x k. 1 +^2x k. 2 )N k ]' = «E [x tl 2 ] + 2 2 E [x k _ 2 2 ] + 2^ «1 E [x k _ x x k _ 2 ] + a N 2 E t k-l 2] = E[ k-2^= E[ k 2 ] =a x 2 Cov [x k, x k _ x ] = E [x k x^] = E [^ x k _ x 2 + ^ x^ x R _ 2 + x^ N^ = ^ a x 2 + c 2 Cov [x k, x k _ x ] Solving for Cov [x k> x fc _ ^, a Cov[x k, x R _ 1 ]= T- L. a 2 x Thus, a 99222 1 22 " - "l V + +2a 2 \ 1 2l^T a +^ 16

Solving for o, 1 -«. 2 3 2 2 1-a-a + a -a a -a 2 2 2 12 1 N v / l -\ f 2 3 1-<V«2 +or 2 - a 2 a 1 2 (T - a 2 ^N 1 17

o co co CM r- o o C rn NO \ N c; OH OH OH. CO "(H ^ CN u u u u ^ cs J -1 J j -J TH OH CM p. ra a c n in irj i3 ^-< CM i~- a co a, CL U T -1 m a OH V a 3 P" i_ «5 51 c " n t- h.p,5 OH OH CD in OH 1- _, w CO h 3 3 as fa CM 3 D CO OH a u sz u a u x: O 1 -> E 3 C2 CN ä a OH a u a W Q -a U :5 OH ' O O N <! < N U N u U H- - O CO S CM p,- in 3 «a» ^ CO S". =' J < a - " 1 1 OS OS 3 3 - _ OH» U Jn x: " u OH < 9 J SQ ^- rrl K- < J3 u J ill U-Jffl W) O c/} y "B n H C/J 5 s ON in OH <) O m in CM ^H T-< W BJ H n U C3 u s < 3 > ca 1 m O O CM 1 < n <! - 'o to CO 1 _J T«- CM -^ ^H m co O ^o m m a O CM O Tf HO lo 1 in 1/5 ^ CM co rt W or! 1 a O N J < w a e OH CJ N J < Z f5 r^ in CM Ö UHU oi ci cd 111 < o c CD <U to.ti 3 S P. w CN :L CO CM n CO & xi o 3 n S tä O U1 crt ^ -A a 2 o ^o o o = O. J o5 O O i/> m m Q r-- i> r- m co co co - x: M J < ca J en O O D U w CJ T) OH c C8 C) N J < a & a! J3 u (J bo -1 O J J5 1/1 p. O! S N ^c? A1 o o! M Q (In OH a "C g»m s >. co a "o O P 1 > & OH ' 3 -a S 1^ n Ü 1.«af" c.3 V u 3 1 a ' CN CO I o O CM «CA CO ^ O 3 B oa B- i3 a D 18

APPENDI C Simulated RTIs 19

PA-385 (C-l) H - - - - - Clutter = % Missed Returns a =.8 < 2 = -. G N= 2a x = 27 Fig. C-l. Unsteady target track.

PA-385 (C-2) ' e t-h - - - - - Clutter = % Missed Returns = % a =.8 1 N- < =-. 2 5 2a x " 13 Fig. C-2. Unsteady target track. 21

PA-385 (C-3) B - -- - Clutter =% a i = ' 8 Missed Returns = % o = -. 2o x = 55 Fig. C-3. Unsteady target track. 22

PA-385 (C-] CD H - - - Clutter = % Missed Returns a = 1 1 2 =.8 a = N -. 2<7?= 82 Fig. C-. Unsteady target track. 23

PA-385 (C-5) r ) B f-i - - -- Clutter = a =.8 a = r N Missed Returns = % < 2 = -. 2^=137 Fig. C-5. Unsteady target track, 2

PA-385 (C-6) ± - - - - Clutter = 1% a=.8 a 1 N Missed Returns = % a = -. 2a = 2. Fig. C-6. Degraded RTI, 25

PA-385 (C-7) & - - - - Clutter = a- =.8 a = N. Missed Returns = % «2 = -. 2 x = Fig. C-7. Degraded RTL 26

jpa-385 (C-8) e ih ' f. Jf. - >.' I! I I 11 I I I ± - - - - Clutter = i'7o of =.8 Missed Returns = % o.^ = -. o= N 2a x = o Fig. C-8. Degraded RTI. 27

L PA-385 (C-9) e 1- i I» i If. If. if. if. If. f, L v w - 1! I W ' v, ' f- ^ 1. - - - - 2Q Clutter = 6% a =.8 CT = 1 N Missed Returns = % er = -. 2cr = ä A Fig. C-9. Degraded RTL 28

PA-385 (C-IO; 1 i 1 1 i 1 ' i. - J» J.. J J - ' - f > : W f -._. j l yy yy 1 1 -- i r 1 - - -- Clutter = 8% Missed Returns = % a =.8 ot. 2a x= Fig. C-. Degraded RTL 29

PA-385 (C-n: e i- - - - - Clutter = 1% a =.8 1 Missed Returns = % a 2 = -. a = 5 N 2CT = 1 Fig. OH. Degraded RTI.

"PA-385 (C-12] 1 1 1 1 1 ' f e - - - - - Clutter = 2% a =.8 a = 5 N Missed Returns = % a = -. 2 = 1 2 Fig. C-12. Degraded RTL 31

^A-385 (C-T3) ^. ' if ) H ' x ^ ^ - - - - - - Clutter = % a =.8 a = 5 1 N Missed Returns = % a = -. 2^=1 Fig. C-13. Degraded RTI. 32

; if 11 I l I ' 1 TT I fa-385 (C-1) i I I I - - - - - Clutter = 6% Missed Returns = % a =.8 a -. N= 5 2 x " 1 Fig. C-1. Degraded RTL 33

PA-385 (C-15J H I I l I I I 1 ^ -. + Jf W ' ^ if. if. 7-1'- I + Z 'f.» -. > + f - -!f \i ^. 1 f Z - - I I j 11 I - - - - Clutter =8% a =.8 Missed Returns = % a = -. 2 = 1 Fig. C-15. Degraded RTL 3

"fo-385 (C-16) B L. - - - - - Clutter = 1% Missed Returns = % ) a =.8 a = 1 N a = -. 2CT = 27 2 Fig. C-16. Degraded RTL 35

PA-385(C-17) ) e H i i r i i i i i w!» - - w w I w > l 1 11 - - - - - Clutter = 6% Missed Returns = % a = 1.8 a = N 2 = -. 2o = 27 Fig. C-17. Degraded RTL 36

PA-385(C-18) " I 1 I: 1 i I1 I», J.-,., ' ) B ft ^ H w J J Y -.. J. \! 1 i I 1 l -5C ) - - - - Clutter = 8% Missed Returns = % a a 2 =.8. N 2G x = 27 Fig. C-18. Degraded RTL 37

PA-385(C-19) i rr > -JU-. - - - -. Clutter = 1% a =.8 a = 1 N Missed Returns = % a 2 = ". 2^= 55 Fig. C-19. Degraded RTL 38

PA-385(C-) e - - - - - - Clutter = a =.8 Missed Returns = % < 2 = -. 2 = 55 Fig. C-. Degraded RTL 39

PA-385(C-21) e t-i 1 1 1 1 1 A ^ W ; 1 it >l - W 1 f vgtyl If. W 1 f --. W 1 W- - 1 1 1 1 1 - - - - Clutter = 6% Missed Returns = % a = 1.8 a = 2 -. a = N 2 x 55 Fig. C-21. Degraded RTL

PA-385(C-22) CD &»-I - - - - - Clutter = 1% at =.8 N' Missed Returns = % a = -. 2o =82 Fig. C-22. Degraded RTL 1

PA-385(C-23) G - - - - - Clutter = 2% Missed Returns = % a =.8 1 a = -. 2 a = N Fig. C-23. Degraded RTL 2

i r ;PA-385(C-2) o i- I - - - - Clutter = 1% Missed Returns =% a - 1 or.8 z = N - o 2? = 137 A Fig. C-2. Degraded RTL 3