93
UNCLASSIFIED AD NUMBER LIMITATION CHANGES TO: FROM: AUTHORITY THIS PAGE IS UNCLASSIFIED ADB023903 Approved for public release; distribution is unlimited. Distribution authorized to U.S. Gov't. agencies only; Test and Evaluation; JUN 1977. Other requests shall be referred to Air Force Armament Lab., Eglin AFB, FL. USADTC ltr 1 Oct 1980

UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

UNCLASSIFIED

AD NUMBER

LIMITATION CHANGESTO:

FROM:

AUTHORITY

THIS PAGE IS UNCLASSIFIED

ADB023903

Approved for public release; distribution isunlimited.

Distribution authorized to U.S. Gov't. agenciesonly; Test and Evaluation; JUN 1977. Otherrequests shall be referred to Air ForceArmament Lab., Eglin AFB, FL.

USADTC ltr 1 Oct 1980

Page 2: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

THIS REPORT HAS BEEN DELIMITED

AND CLEARED FOR PUiLiC RELEASE

UNDER DOD DIRECTIVE 5200,20 AND

NO RESTRICTIONS ARE IMPOSED UPON

ITS USE AND DISCLOSURE,

DISTRIBUTION STATEMENT A

APPROV«D FOR PUBLIC RILSASEj

DISTRIBUTION UNLIMITED.

Page 3: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

•} MMp?gwy»w^!WP4WW«W'^

a CO

o 03

.ii^.i'^-/" ' ■"■ ■■

i

AFATUTR-77-85 /

AN AERIAL GUNNERY AERODYNAMIC LEAD PURSUIT MODEL

THE DIVISION OF ENGINEERING RESEARCH LOUISIANA STATE UNIVERSITY • BATOK ROUGE , LOUISIANA 70803

JUNE 1977

FINAL REPORT FOR PERIOD JUNE 1976-JUNE 1977

Distribution limited to U. S. Government agencies only; this report documents test and evaluation; distribution limitation applied June 1977. Other requests for this document must be referred to the Air Force Armament Laboratory (DLYD), Eglin Air Force Base, Florida 32542.

AIR FORCE ARMAMENT LABORATORY AIR FOICI SYSTIMS COMMAND • UNIT» STATIS AIR PORCI

?.il-K;E^>i ■ / r. '.Mi, iitaUinUJi-.i

Page 4: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

111 ' ———

SECURITY CLASSIFICATION OF THIS PAGE (Whm Data Entered;

REPORT DOCUMENTATION PAGE

(S © I A. J.^McPhate

D. R./Fleming

^

2. GOVT ACCESSION NO.

'AN AERIAL GUNNERY AERODYNAMIC LEAD PURSUIT MODEL,

7. AUTMORf»)

£3: 9. PERFORMING ORGANIZATION NAME AND ADDRESS

The pivlrtwt of Engineering Research ^ ^Louisiana State Univoaity ^aton Rouge, Louisiana 70803

p" ft I. CONTROLLING OFFICE NAME AND ADDRESS

Air Force Armament Laboratory Armament Development and Test Center Eglin Air Force Base. Florida 32542

14. MONITORING AGENCY NAME i ADDRESSft/d/f/ersnt from Con(re/f/ru| Ofllee)

READ INSTRUCTIONS BEFORE COMPLETING FORM

3 PECIPIENT'S CATALOG NUMBER

Sjt TYPE OF REPORT » PERIOD COVERED

Final iepmi. Junm •76 —

mEEtP .>

PERFORMING OR« REPORT NUMBER

CONTRACT OR GRANT NUMBERf«; / F|8635-76K >25-76-C^f273j

10. PROGRAM ELEMENT, PROJECT, TASK A"\ir If^TKuW'r NUMBERS JON: I 9134|07/-O3 ProgramTl^^nt 62602F

12. REPORT Dt

(JT^. Juris »f?) ***'"" 13. MIIUBFR OF TIT NUMBER OF PAGES

90 IS. SECURITY CLASS, fof tM» report;

Unclassified

15a. DECLASSIFI CATION/DOWN GRADING SCHEDULE

16. DISTRIBUTION STATEMENT fof thi» Report;

Distribution limited to U. S. Government agencies only; this report documents test and evaluation; distribution limitation applied June 1977. Other requests for this document must be referred to the Air Force Armament Laboratory (DLYD), Eglin Air Force Base. Florida 325A2.

J '7. DISTRIBUTION STATEMENT (.at (he abstract entered tn Block 30, It different from Report;

D D C [nMaraiinizi

18. SUPPLEMENTARY NOTES

Available in DDC

19. KEY WORDS fContinue on reverse side if necessary and identify by block number)

Aerial Gunnery Aerodynamic Lead Pursuit Model

Uj JAN 3 19T8

JlissEircns E

20. ABSTRACT ^Continue on reverse side If necessary and Identify by block number; 7 A digital simulation of aerial gunnery was developed. A six-degree-of-freedom

attacking aircraft controlled by control surface deflections was implemented to perform aerodynamic lead pursuit of an evading target. The attacker is capable of flying within the bounds of its performance envelope. The target is a coordinated flight and aerodynamically constrained model capable of some evasive logic. Three sight systems have been Implemented into the simulation. The program was written in FORTRAN IV and has been checked out on the XDS Sigma 5, the IBM 360/65, and the CDC 6600 computers.

DD FORM 1 JAN 71 1473 EOITION OF I NOV 65 IS OBSOLETE SSIF

IFIOA'

UNCLASSIFIED

SECURITY CLASSIFICATION OF THIS PAGE fHTien Data Entered;J^i

317 Mi >^ -"■""""^

&aaB^teiteAifeAtea^^^

Page 5: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

■ ■ r- ..,i.fw.^.iW.l.l,.,n.J..v ...IM...I.. ......w..»........^....!!..,.,!. .HI. i... , i..! .,,»m,mmmi«mmw'mm»'mmm+)f*^^^^^^^^ mm.

UNCLASSIFIED SeCUWITY CLASSIFICATION OF THIS PAOEfWiwi D»f Bnltnd)

UNCLASSIFIED

•;:i>^'-::--:—

Page 6: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

" —— ~" '

PREFACE

This report was prepared by the Division of Engineering Research, Louisiana State University, Baton Rouge, Louisiana 70803 under Contract F08635-76-C-0273, with the Air Force Armament Laboratory, Armament Development and Test Center, Eglin Air Force Base, Florida 325A2. This effort began in June 1976 and was completed in June 1977. Mr. Gerald Solomon (DLYD) monitored the program for the Armament Laboratory.

This technical report has been reviewed and is approved for publication.

FOR THE COMMANDER:

jj R. MURRAY // diief, Analysis Division

(The reverse of this page is blank.)

Page 7: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

u1"111 ' i "l ^W^»P"

TABLE OF CONTENTS

Section

I

II

III.

Title Page

INTRODUCTION 1

Objectives 1

Literature Survey 1

Overview 1

ATTACKER SIMULATION 3

Purpose 3

Subprogram PILOT 3

Error Computation 3

Single Channel Controller 3

L*OD trO-L-L 61 IjOf^lC ••••••••••••••■••••••■■•••••••••••3

Total Controller 6

Aerodynamic Simulation 8

Data for the Attacker 10

TARGET EVASIVE MANEUVERS 17

Introduction 17

Target Maneuvers 17

Equation of Motion 18

Integration of Equations of Motion 19

Input Data to Define Maneuver Program 25

State Vector Indices 27

111

r-7_^_—_„„

irtiniMiwMainti^

Page 8: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

„. .^T^^,,,,,,^^,^,^^,,,^

TABLE OF CONTENTS (CONCLUDED)

Section Title Page

IV SIGHT SYSTEM 31

Sight Modes 31

Sight Algorithm 1 31

Sight Algorithm 2 31

Sight Algorithm 3 32

Data Requirements 32

Data for the Sight Programs 32

V IMPLEMENTATION INTO GAMES 34

Games 34

Structure of GAMES 34

Pilot 34

CDC 6600 Runs 35

VI OVERVIEW OF INPUT FILE STRUCTURE 36

Initial Call to Pilot 36

Subsequent Re-runs 37

References 38

Appendix A - Program Listings and Sample Run 39

IV

-M..—***»*,*^*^.*,- iiiiimiiiniiinii mi, i

Page 9: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

■-■■■■ " ■ ■ ■' ■-.■■ -. ■"■,: ■ ■ :■ : ■■

■MM

Figure

1

2

3

4

LIST OF FIGURES

Title Page

View Through Heads Up Display 4

Flow Chart of Controller Logic 7

Alrframe Simulation 14

Flow Diagram of ESCAPE 20

i

(The reverse of this page is blank)

iiiiffTiri'iiiinr-fiiMMii

Page 10: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

-■--—-•-------—™'»P'^»B!*r^^

-

SECTION I

INTRODUCTION

OBJECTIVES

The design intent of the effort described by this report was the construction of a digital software simulation of an attacker-target encounter in aerial gunnery combat. The simulation was restricted in scope to the target tracking phase of the encounter with no particular attention being focused on tactical aspects. The primary effort was expended in obtaining an optimally controlled attacking aircraft capable of flying within the boundaries of its performance envelope, the emphasis being placed upon obtaining realistic aerodynamic lead pursuit in the tracking phase of the encounter. Complimentary to this effort were the simulation of the target and the sight systems and the overall problem of fitting the simulation into GAMES (Reference 1).

LITERATURE SURVEY

Consistent with the proposed work outline, a literature able simulations was made to determine the basic capabilities simulations (References 2 and 3). Based upon the requirement attacker be able to fly realistic uncoordinated flight in the the IMAGE simulation was the only viable candidate for the at simulation. The development of a totally new simulation was was deemed infeaslble within the time constraints allowed for Thus, the decision to extract from the IMAGE simulation the a and aerodynamics was made and Implemented.

survey of avall- of those that the tracking phase, tacker airframe considered but the project,

irframe dynamics

OVERVIEW

The overall effort was divided into four basic tasks: (1) Attacker airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES.

Attacker Simulation

Section II of this report is devoted to the description of the attacker simulation. The attacker is a full six-degree-of-freedom airframe model with a zero time lag pilot and control system. All data defining the attacker is read in from the input file and defines a three control surface airframe. The aerodynamics data is stored in table form, and a table lookup scheme is used to extract information.

[■ifiirmmnifttirfMfdTinr- *■*-*********•****-**•* liMätdlit«a«lkMto»ka^^ ,. ^ ^

Page 11: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

WlgWP^awwy'ww^p*''!^^^

I': ! Target Simulation

The target simulation Is described In detail In Section III of this report. The target Is a psuedo six-degree-of-freedom model In that coordinated flight Is assumed and attitude Is computed in a dependent fashion from the lineal velocity and acceleration. Acceleration Is computed as a demand quantity or as an input quantity based upon the type of maneuver specified.

Target maneuvers are defined by preprogramming a battery of sequentially activated maneuvers. Up to 10 steps or maneuvers may be programmed to define the target motion profile with the sequencing being influenced by what the attacker and target do. Tabular data Is also required to define the perform- ance envelope of the target.

Sight Systems

The sight systems have been Implemented in subroutine format, and first and second order perfect sights as well as mechanization of one other sight have been structured. Section IV of this report gives the details of the sight system implementation.

GAMES

The final product of the effort is documented in Section V of this report. The attacker-pilot, target, and sight systems are imbedded into the GAMES program as a subunit that updates the state vector for both attacker and target on demand from the executive part of the simulation. GAMES it- self has been minimally modified to accept this alternative to Its present approach to defining the engagement.

maMMMüiM iiiiiiiMtmiMimiMiim ,- • -.,-, ,,■ ■ i

Page 12: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

SECTION II

ATTACKER

PURPOSE

The attacker simulation is a stx-degree-of-freedom digital model of an airframe and a controller. The controller simulates a pilot whose aim is to maneuver the attacking airframe into firing position. Firing position is achieved by nulling the tracking errors between the line of sight to the target and the pipper position in the heads up display (HUD) computed by the sight system.

SUBPROGRAM PILOT

Subprogram PILOT is an optimum controller for the airframe simulated in the subroutine TURKEY. The task of PILOT is to maneuver, by setting the control surfaces, the airframe into the best position for a successful aerial engagement with the target. All control decisions are made utilizing current information about the attacker and the target, i.e., PILOT does not have access to information concerning the future conditions of either the airframe or the target.

PILOT utilizes the fact that the most rapid means of minimizing the integral of the error is to use maximal rectilinear and angular accelerations and decelerations for the airframe. PILOT communicates to TURKEY by means of a control vector composed of aileron setting, stabilator setting, thrust or throttle control setting, and rudder setting. Therefore, the Individual components will, in general, be set at their limits while maneuvering to achieve near aerodynamic lead pursuit. Only in the final stages of the engagement, when the magnitude of the error and its first derivative is small, will the components of the control vector be at some intermediate value.

ERROR COMPUTATION

The error vector is composed of roll error, pitch error, range error, and yaw error. These quantities are computed from the elevation and traverse tracking errors and the range to the target (see Figure 1).

SINGLE CHANNEL CONTROLLER

PILOT uses four single channel controllers, each responsive to a single component of the error vector. Roll error controls the aileron deflections; pitch error controls the stabilator deflections. The thrust is controlled by the range error. Rudder deflections are controlled by the yaw error. In effect, the control vector is the sum of the output of each individual

Mmmgii^Msmii^^ ^ „^ ,

Page 13: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

»•wpwpw'f^wpw^qwswpiw™"^^

Y i ■ Yaw i

-^ Error ^;rget

Plpper / Pitch Error

a i j / 1 «

y

f -/--I J-^-W Roll Error

!/

y Pseudo Zero of Head Up Display

.,

Figure 1, View Through Heads Up Display

— ^ - ■ ■ ^•-

_ , —— —.—r.— --. -. ■ ■ ■■ '— -' '

MiiiiMih

Page 14: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

MIWWKWWipiftWiwwyB^^

controller. Each controller assumes that the other components of the control vector have a negligible effect on the error which it is trying to control.

CONTROLLER LOGIC

In PILOT each controller tries to minimize the integral of the error which it senses. This is accomplished by nulling the error and its first derivative as rapidly as possible. The controller treats the response of the airframe as an unknown transfer function. The controller, sensing the error and the first derivative of the error, is able to sample the range of second derivatives of the error by changing its respective component of the control vector. This enables the controller to choose an appropriate value for the control vector component.

The controller is at liberty to adjust its control parameter and is able to obtain a complete range of values for the second derivative of the error. In general, these will have extreme magnitudes when the control vector is at its limits.

Control Decision If the error at any time t be denoted by x, its first derivative Is denoted by x and its second derivative is denoted b> x. The controller has at its command all available values of x. The optimal choice will be. In general, between the maximal positive and the maximal negative values of x. These values are assumed to be constant over an interval in time. X- and x. is the error and its first derivative at the start of the time interval. x* is judiciously chosen as the second derivative which will improve the situation over the next time interval, t... x» and x. are the error and its first derivative at the end of the time interval tj^ and at the start of the second time interval t,.. x, is the second derivative of the error to be used during this second time interval, t, t. can be obtained from Equations (1) through TA)

The magnitudes of t, and

2 1/2 x" t- + x t, + x1 = x-

Vl + ^ = ^2

2 1/2 x2t2 + x2t2 + x2

x2t2 + x2 = 0

(1)

(2)

(3)

(4)

At the end of the second time interval, both the error and its first derivative will be zero if x* and *x'- were constant over the two time Intervals.

This method will give reasonable results, but it is more economical,

^Hk^^AtMmM^mmM..: ;~ l^«k^^,i)m*iiM^i^.:toi%^^^

Page 15: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

since the simulation marches in time, to merely ask if the simulation has reached the end of the first interval. This is accomplished by assuming that the first interval is over and by using Equations (3) and (4) to evaluate the projected error at the end of the time interval t.« obtained from Equation (4).

-*2/x,,

is

(5)

Equation (5) is obtained from Equation (4) by the requirement that at the end of the interval t_ the derivative of the error should be zero. The projected error is then calculated.

If the projected error is sufficiently small, then the assumption that the end of t.. has been reached is correct. The component of the control vector is set such that the second derivative is x-.

If the magnitude of the projected error is greater than specified limits and if the value is of the same sign as the present value of the error, the end of the interval t. has not been reached. In this case the control vector should be set such that the second derivative is equal to x' .

However, if the projected error at t2 has the opposite sign of Its present value, then the airframe is predicted to overshoot the desired state. This means that the roles of x* and x' must be interchanged. The component of the control vector again should cause the second derivative of the state vector to equal the new x' .

.

The algorithm used in choosing the proper extreme second derivatives is shown in the flow chart in the Figure 2. The assumption that x* and x- are constant is permissible because they are updated, and the above test is made frequently.

TOTAL CONTROLLER

The assumption that other components of the control vector do not noticeably affect the error sensed by any individual controller is permissible because the errors and their respective derivatives are updated, and adjust- ments to the control vector are made frequently.

If the magnitude of the component of the error vector and the magnitude of the derivative of that error which a controller is sensing are sufficiently small, that component of the control vector is attenuated.

If the total error, pitch error plus the yaw error, is large, the rudder is not operational. However, if the error is sufficiently small, the rudder is used and the aileron deflections are set to zero.

^.^.■. ■■;,.^:^-..l. r.. . ■■*—~~~r,. ^-^V-^^^^j , .'■■:. ^ ■■ ^i :__ __^ 1_

Page 16: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

^#^^-W^¥^^^ W'l^^.^W^pf^^ .Vim .^mv Kmj ^^^^i^^^^i^ j tij )|W

• • • • • R, R, R(l), R(2), J Are defined

a )

1 Assumes Most Positive R Rules

<^<f" |R| .LT. ep y=^

T .GT :"~ö:ö>^ | Switch K, Most negative governs j

R(l) * R(2) .GT. oTÖ^>

815

R£ t = Sign (R) (R + R * T + R * T * T / 2) future * v /

R * R(K) .GT. 0.0 ^—»■

R * R(K) .GT. 0.0

Figure 2. Flow Chart of Controller Logic

Page 17: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

^wwwgwwapwpffl«^^ .- 5---—~" ■ -' ■■^T.....;..,..

Aerodynamic Simulation Subproeram TURKEY

The airframe subprogram is a generalized six-degree-of-freadom simula- tion. This subprogram is based on the airframe subprogram in IMAGE (Improved Model for Aerial Gunnery Effectiveness). This program was rewritten for the sake of economy and to allow the calling program to efficiently obtain the derivatives of the state vector of the airframe for various configurations of the control vector. This subprogram simulates the airframe rectilinear and angular accelerations and the wind angle and euler angle rates.

The forward acceleration and the wind angle rates of the airframe are calculated in the reference frame of the wind by the equations:

v = cos 0 [T cos (a + 6 ) - q SCj /m + q S sin ß C /m - g sin Y (6)

ß - sin ß [-T cos (a + 6 ) + q SC- 1/mv + q S cos ß] C /mv

+ g [cos a sin ß sin 6 + cos ß cos 9 sin <t) - sin a sin ß cos 9 cos <|)]/v

+ (P sin a - R cos a) (7)

a = [- T sin (a + 6 ) - q SC + mg (sin a sin 9 + cos a cos 9 cos 4»)]/

(rav cos ß) + [Q - R sin a tan ß - P cos a tan ß] (8)

The flight path angle, y, is defined by the equation:

Y • ARSIN (-sin <|» cos 9 sin ß - cos ß sin o cos 9 cos ((i + cos a cos ß sin 9) (9)

The transformation relating the wind axis coordinate system to the body axis coordinate system is defined as:

TWB

cos a cos ß -cos a sin ß sin a

sin ß cos ß 0

sin a cos ß -sin a sin ß -cos a

The angular accelerations and euler angle rates are calculated In the body axis coordinated system by the equations:

lil

^^^liii161^^ M<mm

Page 18: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

w*pmw«.ww/w«pjwp'w^^ Mtmmjmmm

i

I - I

i XX

I - I

p = _2)L zi QR + _2Lz (R + PQ) + 1^ [cos g cos a öä . 8in a cn] (10) XX XX XX

Q = _5i^ xx Rp + .J« (R2 _ p?) + Sac c + M T/! ^ I I I m t yy

yy yy yy

XX j S PQ + Y^- [P - QR] + ^ [cos ß sin a C^ + cos a Cn] zz zz zz

= P + i^ sin 0

6 = Q cos (J) - R sin (|)

t|) = (R cos <|» + Q sin (j))/ cos 0

(ID

(12)

(13)

(U)

(15)

The transformation relating the body axis coordinate system to the Inertlal coordinate system Is defined as:

TBE =

cos 4/ cos 0

cos $ sin 0 sin $ - sin t|» cos <()

cos \\i sin 0 cos (f) _+ sin ^ sin 4»

sin iji cos 0

sin tj; sin 0 sin 4» + cos ty cos ()>

sin \\i sin 0 cos ip -cos i// sin ((>

-sin 6

cos 0 sin (|)

cos 0 cos $

The rectilinear velocities and accelerations in the Inertlal reference frame are obtained by the transformation of the velocity vector and its derivative from the wind axis coordinate system into the inertlal reference frame.

v = FT ITT Iv E L EBJl WBJ w where v = w

^E = AE = ITEB]fTWB]vw + tTEB][TWB]vw + [TEB][TWB]\

(16)

(17)

(18)

where

~.-— »« HUI ■ ■.■^■-^--■' '■- iim.1 ■- »~r~~—"—'-■■ ' ■ ■—rr ^—'i ""—-".w:.

la^lt^ai^afli

Page 19: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

■s^^-w^^'T^w«^^

— [T 1 dt l WBJ

-sin a cosß a -cos o sin 08

co833

cos a cos ßa, -sin a sin 3ß

-sin a slnß ä +cos a cos ßß

-sin ßß

-cos a sin ßa -sin a cos ßß

cosa a

+sln aa

and

0 -R +Q

Tt "BE" ■ 'W +R 0 -P

--Q +P 0

The airframe simulation subprogram is constructed so that the recalculation of the derivative of the state vector is done efficiently for various control vectors. The majority of the calculations not involving the control vector are saved in dummy variables. Figure 3 is a flow diagram of the airframe simulation.

Data for the Attacker The data to describe the attacker is read by subprograms PILOT and TURKEY. In the read sequence PILOT reads first, then calls ESCAPE which then reads Its data to describe the target. ESCAPE is described in Section III of this report. Subsequent to ESCAPE reading data, the SSIGHT subprogram reads data as defined in Section IV of this report. Finally TURKEY reads data to define the airframe.

Data Read by PILOT PILOT reads a minimal amount of data ~ only that necessary to define the integration, control, print out, and initial conditions of the attacker.

CARD

1 2,3,4

FORMAT QUANTITIES READ

(AID, 215, E10.2) LABEL, NF1, NF9, DTIME (A10,7E10.2)/10X,7E10.2) LABEL, (SV(I),I=1,15)

The quantities read from the four cards are:

LABEL

NF1

Any identifying label up to 10 characters long.

Control frequency indicator. Sets the number of integration steps between control cycles.

.. -. ..J.J.^.-..^.........^ ;.,.

Page 20: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

T '■■■■'" l^"^J™^^?^^^'^'^''^1V';^;V^^';' ■■■'■■■■' ^^-.—^rv;-'-:.-^^^w^^.i^jirmw:w^ww..wm?^ -■■^wwmw^MWMwmm^

NF9

DTIME

SV(1)

SV(2)

SV(3)

SV(A)

SV(5)

SV(6)

SV(7)

SV(8)

SV(9)

SV(10)

SV(ll)

SV(12)

SV(13)

SV(U)

SV(15)

Print out indicator. Sets the number of control cycles between printout by PILOT.

The integration step size to be used by the Runge-Kutta integration algorithm.

X1 position of attacker

X- position of attacker

X, position of attacker

X,

(X* + x* + **)*

Roll Euler Angle, 0

Pitch Euler Angle, 6

Heading Euler Angle, f

Angle of Attack, ct

Side Slip Angle, ß

Angular Velocity, Roll Axis

Angular Velocity, Pitch Axis

Angular Velocity, Yaw Axis

Data Read by TURKEY All of the aerodynamic performance tables used by TURKEY to simulate the airframe are read on the first call to TURKEY. Four separate reads are involved for the four COMMON arrays: IDUM1, TDUM1, TDUM2, and DUM. IDUM1, TDUM1, TDUM2, and DUM are only read once. The read sequence is IDUM1, TDUM1, TDUM2, and then DUM. IDUMl is integer, and contains 131 integers that describe the data made up of TDUM1 and TDUM2. TDUM1 and TDUM2 store REAL data and have 550 and 4700 words, respectively. IDUMl, TDUM1, and TDUM2 are punched into cards by the data input program from the modified IMAGE program described by Reference 5.

Array DUM contains the following data:

11

Ut^, ...—^»..^^-g^^^p.^^ **^*. ftuute

Page 21: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

DUM

1

2

3

5

6

7

13

16

19

20

21

22

23

24

25

DATA

Angular orientation of the thrust vector

Wing surface area

Wing span

Mass of airframe, slugs

Acceleration of gravity

Mean aerodynamic chord length

2 Moment of inertia XX, slug ft

2 Moment of inertia YY, slug ft

2 Moment of inertia ZZ, slug ft

2 Product of inertia XZ, slug ft

Angle of wing with respect to body

Moment arm of thrust vector

Rudder upper limit, degrees

Rudder lower limit, degrees

Stabilator upper limit, degrees

Stabilator lower limit, degrees

Aeleron upper limit, degrees

Aeleron low6r limit, degrees

Thrust value 1, pounds

Thrust value 2, pounds

Thrust value 3, pounds

Thrust value 4, pounds

Maximum angle of attack, degrees

Maximum side slip, degrees

Maximum normal acceleration, G's.

12

mmmmmmimämM aag&m

Page 22: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

r i.i i JBI|ltl||ipwuHl|Jll,JIIJIU.,|i,.l.ll,ll|ll.|l,ll III, lipjljpilipi wrnmr-' '—'■—■'■•i- " ."'.•..."■M.i.i., li:iWXiptWpK|iipi||Vipii||RH,jm „„,..,i,ii.uiiWpip

I

: !

DUM is read under a FORMAT of (8E10.2). Subsequent to the initial read of DUM, selected parts of DUM are re-read for each initialization of a new case, including the first. The re-read uses the same format, and the quantities re-read are DUM(A), DUM(7), DUM(8), DUM(9), DUM(IO), which

are the inertia parameters.

13

'Vr-wmmMnirin w iumMiifrrii I nw friiiliiiiritiftma«^ -^ mm

Page 23: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

i"11 mmm^^mmmmmmm

Read Data Defining

Airframe Dynamics

I Transform Degrees to

Radians In DUM

1000W

^JTRY. LT. -l\

Read Inertias

Set Control Vector

to Lower Limits

( Return j

(1100^»--

Set Control Vector to

Upper Limits

J

Calculate Body to

Earth Transformation

TBE

I Calculate Wind to

Body Transformation

TWB

{

(wo)

Calculate Wind to

Earth Transformation

TWE • TBE*TWB

NTRY .EQ.oN-

Make Table Look up

for Aerodynamic Coef-

ficients

(jSo) Figure 3. Airframe Simulation

14

•' if iiiiiMiMiiiMiiiiM laiHfiiiiiifiiidraMniimi ;tMa'iifa«^Jii!i!äli^

Page 24: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

^■■.—„^■.■■■"-■■.II™.. I „ y ||Jj!l||||ll|||l|!||[|ll||[||||||||,UtJ|jJjp|||CTCT> f (2ÜJÖ)

Calculate all Simulation Terms

That do not Depend Upon Control

Surface Deflections

.W Return

NTRY.EQ.2 J

Set Control Surface Deflections

Calculate VD from Summation

of Forces In the Direction of the

Velocity of the Aircraft

I Calculate Rate of Change of Angle

of Attack from Sum of Forces in Wind

Axes Vertical Direction

I Calculate Rate of Change of Side

Slip Angle from Sum of Forces in

Wind Axes Horizontal Direction

Figure 3. Airframe Simulation (Continued)

15

At^aMtaMM^^^^g^iii! |rr1| j

Page 25: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

■i--''r^f-,':",'V'!""-""".iI ■ i **wml''■mv>^^wfmm.mml'•.l ■»^■^■p^^^^^^^» BH^POBI

i Calculate Angular Accelerations from

Sums of Moments about Body Axes

I

SL

Calculate Lineal Accelerations from

VD, Angle of Attack Rate, and Side Slip

Rate. Set Derivative of State Vector

Set Rotation Acceleration Matrix

Truncate Acceleration if Needed

(4003)

( Return 1

Figure 3. Airframe Simulation (Concluded)

^■.:.,.....^mmM mlmmmjatimmm faiii»iaifMiitfcj^^

Page 26: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

■■■■■, _■__■■■■ ■■■•- '■•■ ■■'^flwwapBiijM ....,,.^^ .^ .npinwiwuiiiiiwffiwiiwiwjuip.iiHiiMiiiMMinni in.." imim^m^m^mmmmimmmmmmmimm

^

SECTION III

TARGET EVASIVE MANEUVERS

INTRODUCTION

Subroutine ESCAPE was written to simulate the motion and decision of the target aircraft. The target defined by ESCAPE Is a slx-degree-of- freedom aircraft with realistic aerodynamic characteristics. Basically, the target files coordinated flight along a flight trajectory that has been predetermined In a generalized fashion by the Input data.

Within the target simulation, note Is made of the state of both target and attacker, and the target makes evasive decisions based upon those states and bounds established by the Input data. A serial decision sequence with no branching Is defined such that at each decision point the simulation decides to either continue with the presently defined maneuver or to proceed to the next maneuver in the program stack of maneuvers. If the target completely exhausts the program stack of maneuvers. It simply vanishes by exiting to infinity.

Within the above concept, the analyst is able to program the target to the extent of defining the sequence of maneuvers in the program stack and defining the attacker/target state vector limits that dictate the termination of each step of the target program. There are seven basic maneuvers defined for the analyst to use to program the target. These are described below. Any component of the target or attacker statt vector may be used as an upper or lower operating limit for each step of the program. A detailed listing of the index numbers of the state vector components is also given below.

TARGET MANEUVERS

Target maneuvers are designated by their index number, IZG, with Integer value 1 through 7. The following gives a detail description of each maneuver:

IZG Maneuver

Fly toward a specified point in space making changes in direction at a specified acceleration. This maneuver can be used to cause the target to fly a straight and level course as well as a circle in some circumstances.

17

ilifilffiWilil^^ !a^^aa^^---tifliltii1^^^'^^

Page 27: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

"T «W'WW!1WW'WW,IWB»P»^^ !!lll««JP.I

r

f ^

1

IZG

2

Maneuver

Fly toward a point specified In space as an Increment away from the target's position at the beginning of this maneuver. This maneuver becomes maneuver 1 after the new point Is defined.

Fly toward a moving point a specified Increment away from the target using a specified acceleration. This maneuver differs from 1 only In that the point always moves with the attacker. In the limit, this maneuver will result In a target velocity vector In the direction of the Incremental position vector.

Change the direction of the target velocity vector to a new specified direction In a specified amount of time.

Make an incremental change in velocity vector direction where the Increment is specified and the time to change is specified.

Chase an Incremental change in velocity direction. The change is a constant, and the limiting velocity is parallel to the change vector.

Fly with a specified roll angle and normal acceleration. A linear function of time may be specified as the roll program for this maneuver.

EQUATIONS OF MOTION

For IZG =1, 2, 3 the target is attempting a change in position. Over an Interval of time. At, a change in position, AX, would be accomplished with constant kinematic acceleration according to

AX = 1/2 AvAt2 or A= -^

-K IC At2

where AX and A^. are both vectors in the earth system.

The sensible acceleration would then be given by

AS = ^ + G

(19)

(20)

18

^;waa»H Mäii^iliiiirii^^

Page 28: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

"ww 11.„" 1.1. > unnHwiiiWMipwwiiii« ;illlill«'l,i[|p'>l«iiut"li!ipipiiisipippwpp f»W mmmmm*

i

where AQ and G are vectors, and specifically G is the vector repreoentation of the acceleration of gravity.

The target is assumed to have small angle of attack so that the normal acceleration is considered normal to the wind or the target velocity vector. As such, the normal direction, N, is defined by the vector product (V x A-) x V where V is the velocity vector for the target. To achieve an acceleration of A- then requires a normal acceleration. A.,, given by

AN = AS.N (21)

In the event that the calculated normal acceleration is in excess of the maximum allowed, the normal component of acceleration is truncated and the normal direction maintained.

The tangential component of acceleration is calculated by

A^, = AS-V/|V| (22)

where V is the vector velocicy of the target and |v| is the scalar speed of the target. If this acceleration is not within the performance limits, it is truncated and the simulation continued.

For IZG ■ 4, 5, 6, the acceleration is computed for a change in target velocity rather than a change in target position. To this end

A mH **. At

(23)

where AV is the vector change in velocity to occur over At change in time. The same analysis and constraints for A„ and A- are used in cases 4, 5, and 6 as were used in cases 1, 2, and 3.

IZG =• 7 is essentially a maneuver where the roll angle, and therefore N, is specified as a control. AN is specified rather than being calculated, A_ is specified by means of throttle setting. Using A-, AN, and the roll angle, the kinematic acceleration is established and the motion of the target set.

INTEGRATION OF EQUATIONS OF MOTION

In all maneuver cases a program of acceleration is established for a small interval of time. The equation'for velocity then becomes

V(t) - v(t0) + Ag^Xt-^) (24)

and for the displacement

19

HI m iriiiiüiir iiUMniiiniiirfiiMiif mmi i SE^M^'A.^,....,.: JifettkU

Page 29: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

-•"' "•'^"^" "" •"•"• """' »"" ' ■ ■"■ '" " ■» — .llll»l|IWWIIII«IPI,l ■II—p^wp—III

yes First Call?

Initialize

TAAF, FAN, FAVD j

^>

Read JMX

3

:> ^/jMX.EO.r x T Use 01d "N

Manuever

Read Data to Define New

Manuever Program

/Read Starting Point,

Initialize

..-'

Calculate New

Position, Velocity

for Target

315

i Calculate Wind

Axes Transformation

Unit Vectors

Matrix TUV

£.

EL

Calculate Body Axes

Transformation from Angle of Attack

RTUV

l

345

Figure 4. Flow Diagram of ESCAPE

20

^^r^^m^

Page 30: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

r ■ i i ii mmammmimmkimKmitmm

i Calculate Euler Angles

I NTRY.GT.

>

^NTRY.LT.O \

Pass

Pass

Save Target Vector

1 Test State Vector\

gainst Lower Limits)

Fall

Test State Vector

iAgainst Upper Limits

Fall

Increment MNVR

I £

■/MNVR.GT.NMNVRS \.

Zero KIK

I Load Manuever Vectors

From Program Arrays

Inltlllze IZG

I

Return

-^

900

Figure 4. Flow Diagram of ESCAPE (Continued)

21.

i

fTiTiitif mmwM^a&limi,M^mM^äm*' ' .■..■::-.VL;:___...:...^ I-.--.

Page 31: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

if I ■J,llVi|Miiia|||i."Jlt • W "»l*™' r tt-i <m.m |. PVI^W iiwiMiniiiHipiPHimiAii, n-i ^ggp

'

^ZG.GT.oX-

Transform F Vector

into Earth Coordinates

-^(uöy*-

Make IZG Positive Z

-*——azG.GT.aS

IZG - 8

Map F into Future

Target State Vector Add F to Target

Old State Vector

Map Into Future

Target State Vector

^Qp TFUT - T0LK + F(4)

560 m-

Figure 4. Flow Diagram of ESCAPE (Continued)

22

^..^**mm^ MSA&L&M&t&fii* mä&mm

Page 32: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

I wyß ^"^i WHi'iM mi imiim mm

(m)

DLT - TFUT-T0LD

—^IH0P.NE.O V

Calculate Acceleration

Based on Incremental

Position

,.

<580>»-

@

Calculate Acceleration

Based on Increaental

Velocity

J

Calculate Wind Axes

Unit Vectors ^-—^KlK.NE.o\

Calculate Roll Rates

C^> Calculate Roll Angle

I Calculate Wind Aces

Transformation TUV

I Set Normal Acceleration AN

Get ^ from FAVD

-*OM)

Figure A. Flow Diagram of ESCAPE (Continued) 23

J

™™--^'~~-******'^~'

Page 33: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

IS^WWWgffBy^llPjW^^ wymmmmwmwm 1 - ^! mm mmmmmmm^^^

(600 j

Get Max Normal Acceleration

From FAN

Truncate AN If Heeded

Get MAX V From FAVD

Truncate AV if Needed

I Calculate Sensible Acceleration

^610 3 From AN and AV

Calculate Kinematic Acceleration

KIK =» KIK +1

I (Return )

Set Position and Velocity to

Large Values, Null Remainder

of State Vector, Print Message

f Return j

Figure 4. Flow Diagram of ESCAPE (Concluded)

24

■■gS^^KÄM^-if^- * ■-■"'■'■■■ ii Mliillll■l■illrllM^a1^TTlTlllfiiT^lT^ fefa^iai^iBiteM^maa^MiaM .. .,-.■

Page 34: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

■ 'rMl«.^»l,.iluWi|i||:).JI,J.i|)!lwwl^^^ '—- ■»■ ■ im ii» tMi—mmmmmmmmmmmmmmmmmtrmmmmmmmm

n mmuMmmmmwm mmmidmM»,^^m'imitmt*

x(t) = x(to) + ^(t^-^-

In use, the maximum value that t-t will normally attain is 0.1

(25)

second, ^(t ) is repeatedly updated as the simulation proceeds and, for V >, wh instance, when IZG = 1, a feedback loop is established and the acceleration

A^-Ct ) and time t are continually being updated based on the present posi?ion of the target. Figure 4 is a flow diagram of the logic of ESCAPE.

INPUT DATA TO DEFINE A MANEUVER PROGRAM

Card No. Format Data

1. A6, 14

2. A6, 14, 5E10.2

3. A6, 14, 4(15,E10.2) /(10x4(I5,E10.2))

4. A6, 14, 4(15, E10.2)

/(10x4(I5,E10.2))

Card title, number of maneuvers in motion program. Maximum number of maneuvers is 10.

Card title, maneuvers index, maneuver parameters. Maneuver parameters vary with index.

Card title, number of lower limits, sequence of (state vector index, lower limit value) pairs. State vector indices are defined below. Maximum number of limits is 10.

Card title, number of upper limits, sequence of (state vector index, upper limit value) pairs. State vector indices are defined below. Maximum number of limits is 10.

Cards 2, 3, and 4 are repeated in sequence for each maneuver in the program.

5. A6, 14, 6E10.2 Card title, starting maneuver index less 1, initial conditions of target, x1, x_, x», V-, V?, V». The simulation

uses X- down.

Card sequence [1, (2, 3, 4), (2, 3, 4), (2, 3, 4)] may be repeated for additional runs of the target. The minimum number of cards in a data sequence is 5.

MANEUVER PARAMETERS

There are five maneuver parameters read from each No. 2 card, and

25

:Tr ..^.. .:■!■:...\.-V..^^.J

^^&aaäi*^^ ^ \^ -^^mm ...

Page 35: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

„on. l..l..1i..<.<.ila.FIW..|<i • »ISWWWSWPPWP^SWJ!^^ .■III!«, hill IP I III. IIII^I «

the role played by each parameter depends upon the maneuver being defined. In all cases parameter 5 Is the throttle setting. Negative values for IZG Indicate that the parameters are defined in the target wind coordinate system.

IZG 1, or -1

IZG = 2, or -2

IZG = 3, or -3

IZG = 4, or -4

IZG ■ 5, or -5

IZG = 6, or -6

IZG = 7

Parameter 1, 2, and 3 designate a point in space x-, x_, and x_ toward which the

target will fly. Parameter 4 is the time allowed for the maneuver.

Parameters 1, 2, and 3 locate a point in space an increment Ax.., Ax», Ax» away

from the Initialization of this maneuver. The target will try to fly to this point in the amount of time given by parameter 4.

Parameters 1, 2, and 3 locate a moving point that in the limit leads the target parallel to Ax.., Ax_, Ax. specified by

the parameters. Again parameter 4 is the time allotted to perform the maneuver. In effect, a constant acceleration is specified.

Parameters 1, 2, and 3 define a velocity vector that the target will attempt to achieve in parameter 4 number of seconds.

Parameters 1, 2, and 3 define an incremental velocity vector that will be added to the present velocity over para- meter 4 seconds.

Parameters 1, 2, and 3 define an incre- mental velocity that is used with para- meter 4 to define a constant acceleration. This case is essentially the same as IZG = 3 except velocity rather than displace- ment Is used to define acceleration.

Parameter 1 is the initial roll angle in degrees. Parameter 2 is the roll rate In degrees if parameter 4 is zero. If parameter 4 is not zero, the roll rate is computed as (parameter 2 minus parameter 1)/parameter 4. Parameter 3 is the specified normal acceleration in g's. Tangential acceleration Is controlled by parameter 5 as a throttle setting. Para- meter 5 has values between 0. and 1.0.

26

-•--^-^-■^

\ • -«i ~*~*~*'~^

Page 36: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

i>l-^f^iWWIW»)^^

STATE VECTOR INDICES

As described in the data and programming subsection, the target motion program steps up to the next maneuver in the sequence whenever a lower or upper limit is violated. A maximum of 10 upper and 10 lower limits is allowed per maneuver. At least one upper and one lower limit must be specified. The state vector quantity desired as a maneuver trigger is specified by state vector component index. The following list of indices must be used when formulating the limit control cards:

State Vector Quantity

Simulation time

Attacker x.. position

Attacker x- position

Attacker x,. position

Target x.. position

Target x- position

Target x- position

Range, attacker to target

Attacker velocity V.

Attacker velocity V»

Attacker velocity V-

Attacker speed

Target velocity V.,

Target velocity V-

Target velocity V-

Target speed

Closing rate, attacker to target

Attacker roll angle $

Attacker pitch angle 9

Attacker heading angle 4"

Index

1

2

3

4

32

33

34

31

5

6

7

8

35

36

37

38

56

9

10

11

27

ivtSamaMfsa, ■ - [jiwfaMimf'ii W»um.- i.-__._..' -

Page 37: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

i^»»B^ü,ii.w..|.,ji,ii1i,,lt,iiyT,,,iil i.vi1.i..,|W.i>|y|,|Mlg|itiii ''^'-P'-''''L«<y'tfppipi»W,'.'•<"mi '-■'-''■"W»w^iBlfpH!p|i|pi^^

Target roll angle <|) 46

Target pitch angle 6 45

Target heading angle 4* 44

Angle off, attacker to target 57

Target normal acceleration (lift) 42

Target tangential acceleration (drag),

(thrust) 43

ADDITIONAL DATA

In addition to the target motion program control data described above, the target simulation requires tables of performance data. Specifically, four tables of data are required so that the aerodynamic performance of the target may be realistically constrained.

Maximum Normal Acceleration A two-dimensional table of maximum normal acceleration in feet/second^ versus mach number and altitude is required. This table gives the maximum available normal acceleration as a function of the target's mach number and altitutde. It is used to make sure that the target does not outperform its capabilities. This table is described by the ordinate data arranged to vary with mach number most rapidly (down the columns) and the two abscissa arrays, mach number and altitude in feet. Formats for all are (10x7E10.2), with read order of mach vector, altitude vector, and then table.

Maximum Thrust To simulate the speed characteristics of the target properly, a table of maximum available thrust versus mach number and altitude is needed. Thrust in feet/second2 is used with throttle position to control the tangential 7, acceleration of the target. This table is also two-dimens- ional with mach number as the column variable and altitude as the row variable, The formats are also (10x,7E10.2), with reading in the order mach vector, altitude vector, then table.

Drag Drag coefficient as a function of normal acceleration, mach number, and altitude is required in a three-dimensional format. The table defines a volume with each vertical slice defining a two-dimensional table. In the two-dimensional table the data varies down the columns with normal acceleration and from column to column with mach number. Each two-dimen- sional table is associated with an altitude. The read details are a format

28

-«MMlBft ̂ ***~^~. jafeiasfcAim^^

Page 38: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

r ■«■»■■■■■■■■■■■■■■■■■■■■^■i^B^BMI^WB ' " """ •••—"•""■»»'——w^—wp—wpp—y

of (10x7E10.2) and read sequence is normal acceleration vector, mach vector, altitude vector, and then table.

Angle of Attack The target simulation does not need the angle of attack for aerodynamic purposes. However, the actual attitude of the target with respect to the wind axes may affect the evaluation of a gun system. For this reason the target angle of attack is used to complete the attitudinal picture. For this purpose, angle of attack is considered a function of normal acceleration, mach number, and altitude. A three-dimensional table is used with column-wise organization with respect to varying normal acceleration, row-wise organization with respect to increasing mach number, and slice-wise organization with respect to increasing altitude.

ANCILLARY PROGRAMS

The target simulation uses three ancillary programs to do the data reading and table look up for the normal acceleration, thrust, drag and angle of attack. These programs are described briefly In the following paragraphs.

Function FAN handles the data manipulation used to describe the maximum normal acceleration available as a function of mach number and altitude. Upon the first call to FAN, data describing a table of normal acceleration versus mach number and altitude is read and stored. In the read sequence, the reference values for the mach number are read first and stored in array AM in ascending order according to magnitude. Next the reference values for the altitude in feet are read and stored in the array AH according to ascending Index and magnitude. Finally the tabular values for normal acceleration in feet per second are read and stored in FMH. FMH is assumed to be structured as a two-dimensional array with the column entries indexed to the mach number array and the row entries indexed to the altitude array. Each data card has the first ten columns reserved for a label which is read and pointed via LABEL. The presently Implemented program has three

data entries in AM and AH and nine entries in FMH. Variables NM and NH indicate that the data is 3X3.

On calls subsequent to the initial call, a value for the normal acceleration, FAN, is calculated by the two variable table look-up program L00K2 using VM and H as input values for mach number and altitude.

Function FAVD controls the data and calculations needed to obtain the maximum available tangential, or V, acceleration. On the first call to FAVD data is read and stored that defines two tables; One for maximum available thrust as a function of mach number and altitude, and one for drag- to-lift ratio as a function of normal acceleration, mach number and altitude.

29

%9^.tB^^)^&*Jki-'£jf!.-t ro*"«rt ^*ijW>,,>BtoflWw^^

Page 39: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

'«^^■''''■""'■■'■"'-''■'■."■""■■I *.WPii|liWPi,iijuPii<«|.iuipmi!ipp!i;i 'mmmmmmmmt^'f

r

*

The read sequence first reads the reference values of normal accele- ration in ft /S^ and stores them in the array AAN. Next reference values for the mach number are read and stored in array AM. The third read fills the array AH with the reference values of the altitude in feet. In the fourth read the tabular values of the maximum available thrust are read into array TRST in a two-dimensional array format. Row-wise organization is indexed according to the reference values stored in AM, the mach number, and column-wise organization is indexed according to the values stored in AH, altitude.

The fifth read ingests and stores the table of drag ratios into array DRG. These are nondimensional ratios of the drag to lift at the various normal acceleration (lift), mach number, and altitude reference points stored in AAN, AM, and AH,respectively. The array DRG varies most rapidly with normal acceleration (row-wise organization), next most rapidly with mach number (column-wise organization) and least rapidly with altitude (slice-wise variation). DRG is structured as a three-dimensional array with first subscript associated with altitude. Again the first 10 columns of the data cards are reserved for LABEL to be used strictly as a label.

On subsequent calls to FAVID, AN, VM and H are used by LOOK3 to look up and interpolate a value for DRAG, and VM#and H are used by L00K2 to look up and interpolate a value for THRST. The V acceleration for the target is calculated as

FAVD = THRST * TP - DRAG * AN

where 0. £ TP £ 1. and TP is the throttle position variable.

NA, NM, and NH show that the implemented program expects a 3 X 3 TRST and a 3 X 3 X 3 DRG.

Function TAAF is used to read and control the data for the definition of the target angle of attack. The angle of attack is considered as a function of three variables: normal acceleration, mach number, and altitude.

Upon the first call to TAAF the following read and store sequence is _ activated: first reference values for target normal acceleration in ft /S are read and stored in array TAN; second reference values for mach number are read and stored in array TM; third reference values for altitude in feet are read and stored in array TH; and finally the three-dimensional table of angle of attack in degrees is read and stored in TAA. The assumed organi- zation of TAA is that of a three-subscripted array with the first index linked to the values in TAN, the second index linked to the values in TM, and the third index linked to the reference values in TH. Each data card has the first 10 columns reserved for a label which is read and printed from LABEL. The expected data organization for the implemented program is 3 X 3 X 3 as indicated by NA, NM and NH.

On subsequent calls L00K3 uses normal acceleration, AN, mach number, VM, and altitude, H, to look up and interpolate a value for angle of attack TAAF.

30

■^»^■Mm***msm^Ai.i:m •J;l«n-,«ste«.u .isria-

Page 40: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

TOlw^BspWWWTWSipBBP^BTOli VBSIW »»WWflSJJIlWIllM.WB'JIllliHI»,!«!!« wmrnm.

i

SECTION IV

SIGHT SYSTEM

SIGHT MODES

Three basic sight modes were adapted for implementation in the lead pursuit model: (1) A perfect first order prediction using the basic methodology present in GAMES (Reference 1); (2) a second order modification of the linear prediction model; and (3) an existing sight simulation. Modes (1) and (2) are perfect systems in that they assume position, velocity, and accelerations of the target are all known and available. Mode (3) is the disturbed-reticle sight supplied by AFATL personnel (AFAL-TR-75-52).

SIGHT ALGORITHM 1

In the first algorithm, the perfect first order prediction, the time of flight, and range are determined using the iterative procedure described in GAMES (Reference 1). The relative position, relative velocity, and acceleration vectors in the inertial system are calculated from

P , = P - P rel targ att

V = V - V rel targ att

(26)

The initializing range is taken as the present range from attacker to target.

The projectile average velocity is calculated as was done in GAMES using the appropriate projectile drag coefficients from subroutine DRAG (in GAMES). From these, a time of flight is calculated and used to calculate a new range. This procedure is repeated until the change in range is sufficiently small. The final range and time of flight values are used with attacker position and velocity vectors and gun information (muzzle velocity and position) to calculate the future position of the projectile one time of flight in the future. The proper pipper position is then calculated by backing up from the projectile future position an amount and in a direction determined from the target velocity and position.

SIGHT ALGORITHM 2

The second order approximation is accomplished by the addition of acceleration terms during calculation of both target and attacker positions after one time of flight. Otherwise, the algorithm is exactly the same as algorithm 1. In fact, the second order algorithm is imbedded in the linear prediction model and controlled by a flag.

I

'■

:

Page 41: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

i'wnwm ■ wmmmm *m

The entire first and second order algorithm was extracted from GAMES, modified and installed in a separate subroutine called SSIGhT. Information describing the gun is transmitted through common block GUN while encounter data is transmitted through common block STATE.

SIGHT ALGORITHM 3

Subroutine SIGHT contains the disturbed-reticle sight algorithm. This routine was taken from technical report AFAL-TR-75-52 (Reference 4) and modified to accept encounter information externally through common STATE. The algorithm presented in Reference 4 assumed a particular encounter geometry and contained a loop which carried out the encounter. The modified routine uses the attacker information available in STATE, and makes one pass using the lead angles calculated from the previous pass through the algorithm and stored. The routine does not utilize the target information available in STATE. Thus, the algorithm assumes no target information is available and positions the pipper to indicate the position in the HUD of the Impact point of a projectile fired one time of flight prior.

DATA REQUIREMENTS

The general data requirements are that, in the event that sight para- meters are not fixed, they will be read in upon the first call to the sight program. This means that the subprogram writer will have to include logic in the sight program to recognize the first call. Further, some sight systems

may require some standard initialization whenever a new case Is begun. This report contains three implementations that can serve as examples for the programmer.

The first order sight requires a minimum amount of data. The gun muzzle velocity and the gun angle are the only data needed for'the first order sight.

The second order sight is imbedded within the same program as the first order sight and consequently its data is taken care of by that program.

The disturbed reticle sight program SGHT is an example of a mechanization of a sight system. It is Included as the third option for this attacker- target simulation. For this program, the program listing provides the best display of the needed information. For a different sight, this program would be rewritten and subroutine SGHT mi^ht read different data entirely, although there would be obvious similarities.

DATA FOR THE SIGHT PROGRAMS

Upon the first call to SSIGHT in ehe initialization phase of each new engagement, data defining the sight system is read and stored. There is one

Page 42: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

-...-.-. —■-iillii[IMIali

READ command using the FORMAT (A6,IA,7E10.2). The following quantities are read from one card in the card in the card input file:

LABEL

IORD

VELMUZ

GUNALP

GHR

DA

DE

HALF

SIC

a six character identifier,

order of sight system.

IORD = 1 = first order perfect.

IORD = 2 " second order perfect.

IORD = 3 = sight Implemented in

subprogram SGHT.

muzzle velocity, feet per second

gun angle, degrees,

gun harmonization range, feet,

location of gun in azimuth direction

from HUD, feet,

location of gun in elevation direction

from HUD, feet.

HUD angular displacement from airframe

longitudinal axis, degrees.

Sight system damping factor.

33

ri i ii in iriiiiiiiMiiiiiiMii'iiiiiirittin" ■iiiiitiniirii*ii^iii«iiinii'i^ii iMII^iiriWiiilttriifaf^^

Page 43: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

wm.,,ufw<mm'. ' ii .'.. Hl, iiiiiipiii! 1

SECTION V

IMPLEMENTATION INTO GAMES

GAMES

The Joint Technical Coordinating Group (JTCG) guns study program GAMES is essentially a design program for aerial gunnery systems whereby the effects of gun system parameters can be studied. The effective procedure of using the program is to set the gun system parameters and then evaluate their effectiveness by running a spectrum of engagements. The relevance of this concept to the present effort is that provision had to be made for a sequence of initial conditions and engagement descriptors to be read in by the simulation.

STRUCTURE OF GAMES

The structure of the GAMES program was not violated by the present effort. In fact, the program resulting from the inclusion of aerodynamic lead pursuit into GAMES still has all of the features and capabilities of the original version. This was accomplished by taking advantage of the fact that GAMES was written to be able to receive flight path data for both target and attacker from an outside source. The present attacker and target modelling program simply becomes another outside source of data. In this manner, GAMES itself was only modified to the extent of a third read option, a call to PILOT, and a few branches to take advantage of the fact that the new simulation produces more data than before.

PILOT

Subroutine PILOT has been explained in some detail in Section II of this report, especially with respect to the control algorithm aspects. PILOT as a subprogram also has executive duties. It must make appropriate initiation reads when a new case is started as well as initiation calls to TURKEY ESCAPE and SSIGHT. It also must envoke ESCAPE and SSIGHT after an integration of the equation of motion has been made and a reference state reached.

As indicated above, reinitialization is needed each time GAMES goes on to its next case. This is accomplished by calling PILOT with time set to zero. Upon this call PILOT calls the other programs in the attacker-target simulation with the initialization flag set, as well as reading its own initialization data.

For regular calls, time greater than zero, the PILOT program is first called and after integration of the simulation by PILOT, a call to ESCAPE is with the reference point flag set.

34

*

mmm • ;r iji^iiL jililLj^ljiyfiiJi tisäiääässimmmmmmm ̂^^&j^^^M m-- -— ~»i,^...-.

Page 44: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

■ mrnr^" mrrrrrr- ■ --^mmmmmiw PippwwwwspwiwwiipiSfiiii! MI i- jnuiimi ^

Subroutine PILOT is a slave to the main program of GAMES and does not have the capability of terminating the simulation. A listing of the main program of GAMES is included in the appendix along with PILOT and the other

programs used in the simulation.

CDC 6600 RUNS

The modified GAMES program was implemented on the Eglin AFB CDC 6600 digital computer system. Test cases using engagements and data supplied by DLYD were run. Sample output from the simulation is included in the appendix

to this report.

35

i MttilüilBnfi'i'rnnMTf ttiMftfontofrw.fd'^ ..-,.,.. ,... üftjüäMäiÄ^&a

Page 45: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

^■^:5"5W''WW^^^ ymmmm.

SECTION VI

OVERVIEW OF INPUT FILE STRUCTURE

INITIAL CALL TO PILOT

Upon the first call to PILOT with zero argument, a sequence of reads is initiated. The structure of the input file must be consistent with this sequence of reads. The basic initial sequence is as follows.

PILOT

Integration and prints out parameters and attacker initial conditions as described in Section II. Requires 4 cards.

ESCAPE

Data as described in detail in Section III. Upon the initialization of ESCAPE as now written a minimum of 25 cards will be read.

SSIGHT

Each time PILOT is called with zero argument SSIGHT will read one card as described in Section IV.

TURKEY

Upon the initial call to PILOT, all of the tabular data described in the IMAGE (Reference 1) program will be read. The card file must contain the following data sequences'.

IDUM1

TDUM1

TDUM2

DUM

Integer data totaling 7 cards.

Real data totaling 69 cards.

Real data totaling 588 cards.

Real data totaling 4 cards.

Additions to DUM totaling 1 card

Total Cards on Initial Read

The above described card files give a minimum card set of 699 cards to be read as the initial data.

36

********** dtttttiMsäftäau&ä -.■iMiaaaateamfe;-.

Page 46: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

mmrmm*m*mmmmmim

SUBSEQUENT RE-RUNS

Should reinitialization of the simulation be required, a call to PILOT with zero for argument will cause reinitialization of the programs. A much reduced data file is required as follows:

PILOT

ESCAPE

SSIGHT

TURKEY

3 cards, initial conditions only.

2 cards minimum (see Section III).

1 card

1 card, update on DUM only.

37

f~——"■ **Muaa «»tfMfe iA>Aa*ii"**,*«B«^t'fii^

Page 47: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

.-llIVpi;<«l.l>.|I.I..U> «,,1 11 "■'■■ "' ■■ ■' •^w» WFmiwwBrwa!»»! i^

1 REFERENCES

1. Solomon, G., Caluda, M. J., Gunnery Analysis. Modular Effectiveness Simulation (GAMES) AFATL-TR-75-118, September, 1975.

2. Berger, J. B. , M. Meyers, R. R. Wallace, Improved Model for Aerial Gunnery Effectiveness. AFATL-TR-68-112, September, 1968.

3. Whitehouse, G. D. , A. J. McPhate, L. Theriot, A Research and Analysis Program of Studies on the Analysis of Weapon Effectiveness. Phase II Results.'ÄFATL-TR-71-110. August, 1971.

4. Manske, Robert A., Air to Air Gunfire Control Equations for Digital Lead Computing Optical Sights. AFAL-TR-75-52, January, 1975.

5. McDonnel-Douglas Corporation, IMAGE User's Manual. Supplement to AFATL-TR-68-112, September, 1968.

38

*mM md i'^jj'^ivi-.Zii.i ../.■V' ■'X.

estiü ^tesiamaui,^

Page 48: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

,.,- ,.vvj ■ "IP" '■ "" - —

APPENDIX A

PROGRAM LISTINGS AND SAMPLE RUN

39

iUa&BatoatitfMrta

;

■M

Page 49: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

___Z^ü; fiiBnnwfiiiiiiiiwinm,'r~"~''-T:"Tr fl^^^^^Hl

ooooooooooooooooooooeooooooooooooooooooo

x CD ii oc 33 0) B T T * a3 cu in ii s x ^ o ffi »tr a 12 r o D 01 is X! c- J2 ;u ,1; Ti r i; a: :o i, a a a a a a a. a a a a a a a a a a. a a a a a a c n. a a c n. a p a a a n c. a r, c c

■fe -^ Q 2 <~ Q V ii 3 •» — I •

i • O #• %# -U

<-« — U -~ V I < fn r> 3~ i5o -> ai

» • I > w MV? KO — Xlfl > w QM

** w • O vT • CK'-'i—

i ^ QU 1" - • . S "3 . . ^-.z

• o X id ~ a • LI a, a

; N >.2 - >-. » »Q •* • * — ->ONN T

n ■ * Q>. rj— »ifi^waf

A -^ 3 U Ö« ~Z'Xi'M<t w Nu -^ X^ >-^^.— «(N«-.»

«. 'r1

•4 0* X • •«»*• O « CD Vj 0 « 4 ^ 1*~. •^ •oo'UO'v

— *^ > »T *,> — -^> xn^oo« m > > mw inz ««"»a tNjJxi.! • H • «"M -<-• L. ■* •-J«' »wwJJ

*> » o WO — tO O -"«< *^> * «Q M Px Ali 11 v5 3« f ^-•^•-«i

Q vO •> "1 •a >* < w)*.*» ix.ic<'r ll i pl *** Igt "'U mz er ^-'j-^-i^a« II ■* %* no PH • • < • «a-xozo H w ^ «te« M «> Qf «,XW^C<—«* • > £ X« TC« o<n ^'-o»o>ü'»

— ä o QrO t-«- r^w *^ ^•>#*»J3»»^^ W • N o« U- **• • *■* Q^^Cw*^**** • ^* w •ÜJ >Q ><»• ^« <-» >Ä«rf«» • ^ f>» Q.

l») v£> • *»(- »« a^ ü)^ vo »•>#»m«.«»o Uw in ^% m in'» ua. l-.rt ^.-.-. »w^-J^NN.^

i-ijj * *•* W «<}• • ijjx «««--.w ^.x z«-«-a (rti «tf 1— ~ w w « • O — OJ ^o>'»'«ini — <ula, ^ HK m > ^* a k-c •*-» • oHoxini/i «»a •□"*•■*

•■> c •«o >• > > oiar — «QnuujKw. •H'~"~_j'^ »ci.* » «"K • M • »uj »- • «^>,JU>'»D>-,< '«OO'-

3 »r^U J ^ A «PI MNJ • «• ^•%ii.!>uz>(/''-C'0«-. »a—oa — ill C »Hu. *.VÜ' •* *^ n »ir • —i i V w wM •<Qf • »Vt-O^i • B£0«x- Z '»jno • MUKt -« »^w *^ •-* ^* x • ~>c. '5 •'»aiüLJ-- • »x—ns-w.*»^ >- ini~»ow w<r •> f)> ̂ Q m w ro • ^ f vj (J i: 1 CÜ-'*D • »O^Q^w« »w » »C

«acD ^ Wwt o«. -^Owl/Iw N. ̂ w » Q >: rw H ^» z u i< •-' •••*•< UJ Ä ** C - ^jars<~ -i > m «* ■ -'XCCD w: li Ifl " ■*i-,wC'*<c;Z — Ä>-"'-,^H'5' (• Z<>- J* •n«^ >»>->X lÜfflO * l-^DwC5!» «>*•(/)••»'5 ZCS o ov au,- • *• «* z t--* «t/l »«-.-»(-l - f? w N i/irv>ww>.w-twcc-«C<r _J OlflNUJ »u. OüC »r^ #-* • *^ ro ''0 '.^ .&■ - (/) \ m • • , w • T C >- T « H-U)J-4li. -ZZM <^** rn ro*^wQ a ir, k» uj -»w v"* 5B » ♦ *» atysxojoowNc — ♦ O«" •^x>o < r. ru. w ^w«^*«^.

NZOO-«<Z — aNu • H>. XOlüT Ni J<!iJUUl U. • '.'j'J, ^ NC'II

Ua jo-aji jomo «J WM Z I-«>-uou W ~ "j'j • • y z^eiflu. u.y->jzz -zz zzzz Z2Z o. in z 7 ? 2 - r -^ N >- / •-KINSNS aoü.'i«:ao oooo -ÜC SSUJÜjlxl DJ ~ !J.IUJW«*UI •-J -1 J n;s w J ^l-l l-l «* MM"* irt»"»« J JJ J " J J -•- -■ J 3 ZZZZ<< (UZ tn<oi/)^ tn'/i'^i/) T'Jlf: 7 7<<< < «-■ <<--««• C 3CÖOUUOO Z>NJZ2: zzzz UJ Z Z D ■_)>>> > • >>0;> aussaa«- UJ i JJ ^ w uj uj uj y UJ u > UiüJ i >.-•i- - -~JD- ü<Sä.SS.JC »»4 i O SX 245.2 -5 2 s i j 3 3 o o j a - J 3 tu a c o o o c ZO im r? #kM taH M ■-* h* pH QMM ü r? o o o c o o At a 9 IrtClUUUU J J -> U -3 UJ au a a o c C U U U UJ lü UJ U U 011» *« 'JU

uj a 10 lO «0 Uj :«' u5 •*' C'J

ooooooooooooooooooooooooooooonoomoccooo -« N """Kr '0 (0 N "O T O -< <V) "n * iP v0 N CO ? O -" M ^ * ffl '0 N o, ff O »- ^ "^ •? '0 0N r 7> o

u 3T ÄVAIÜ\B[E COPY m&mikmtimmimmmska*mä ^äsMtkäMMmakäa^iSM

Page 50: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

%jSi

ßEsr Mmm COP 0000 00OCOOO3O3O00O00O0 0O00O00000OOOO0000

•ff•»■*■*>3■•»■^*•s■lr,,^>^fnn^^tf>^^l^|^^/,)*o^oc|0>o>o>o^D«o»o^■N^■^.N^^•N^Sflf

1 I

+

•* *^

N

\

s I''

o I •

o

ii t

v «

* <

\ N

J- b? C O • »o

o s

N

< <

< <

<< oo

N SNS

/) •» o o • » • o oco

o ooo • • • • o ooco

— fvi

C L'1

i" —t -• o oo • • • tC o

o o »s

ft Ift i- --b o o ♦ • t tOO

X S V oxs s -u. a - r. ^ C S i/i ji •.', t," 3 f a. 5, a -> t1 tJ 'x- OJ

<<<<<■

< < < «1 -a a w c 'j u

N O

o

o » T O-g o • — O • •

OO 00

rn

rro T S ec n • v: ou

r) rr > c rvjfv

in ty »c p " S Q N • •

UJ i U

<l <t <

< < <

o oo oo <r-

v o Nt-C

»- ^ oc r; n o ir« — • c «■> o -c

• »o v «noo

• •

Si iff i? Jil • •' cn <- » a' yaus j T2

<i- -> < K

<OU.U. Q w »■*

i 2 O

no oo *

oo c U.U. • •

LL a. r. z • • j j

5iO ■ ■?<

II "ONa I-U.I o,azx

s <«- ouja»- ->r a J

'aJ!U ? tno -jo »-< # uu.

• o II •

II rr S. UL ujcyf

t-JlL QU.I-

« *

> * » i 1/1 ui

^« %^ »4

IP> •

• + H — Mi- ll * • "- # "

•-• ^^ ^ ^> n >^w tr • *.—j »t-a.' JKE lÜO<

•U.UJC(/! J r3< •

il I 2 J II T»

« UJ

»v

•*o • t -o II ^ II

N || I- <■ — K

< ? J < -^ "* J U. O U.' > T U. 7 K(A(l

no CO

G Jj ON

O — • I

O w tu

II o a • <

-»ou w. II UJ a:

UHU

n

II

o OOJ

o II -

UJ u z <o

«

I

> UJ

T + < UJ ^p- 9*0 I l ZHww <ai-> acxuj

II tno UJ 101- ou ZO J J <2 JJ a <<<

aruu c^ c

OOOOO "5000 3000000000000000000000000000000 — (Vji^^L^o^-r^o — w'^-»,>niON'nf^o — 'U',|,,*inoNOo?o — w'""»«'irt<ON<co*o * * <t ■» * 5- <• •» <nr '^l IT 'fl IPin .1 Tiir 'JT 3 ^) -0 ^ 0 O vO \0 O vO K N» N N N N K K N. N 33

Al

Httrt iü tjmgifaiAiä&iiisMk^^ J

Page 51: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

' .-,..,. ,,,,.,,,.....,...

■ ■' ' •• - ■ ": OT«Mil 1

I BESTIVAIIABLE OTY ooooooooooooooooooooooocooooooooonoooooc •*Rjin»in'ON(ioo*o«-<Nj^<in\ON.co-'?o-N'«,*ir>oN<oo,0'-|fM'^'»ir>o^'Dc»o ait)ct)ODooeowa}or(y3,'7><T<T'T'fl'iya|,*oooooooooo'-'-'—-«•■-•-<•-•-••■{><

aaaaaaaoaaa-aiaoaaaaacaaaaao. aaaaaaa?. p. aaan

** «fl -) ** ** •■^

T i lo -«k

oo U rr oo > '«-' r\jK O c c *

■».

«Hi

oo H» *^ ^-H I ^^ o

< * oo * J r\i • • Ov9 • « w ♦

<m *s w* •M o II "1 II rf*» ^ o II + » *»* ->— n^ o n *^

a •» a» « p^ ^* *»* (\J M

K w 'Jjlu <T ©i *i ** i u K > i Oj ** »•• c Ä n > P M M a #0 0 u w t-K Mi t«* X + u — *-*

> oo 3 Olu") ^ o ron my ^•11 CMU 1 1 c — KNw l n-« 2 ^ jg o o I « » Ui X oo#0 n »»— C IT . * M O-'-O II < £ UUJU'SU ^s r.o-o' »<» X«- 5- r rj-Mfi Olfll «ZZ>-H. C Kill —'« — ^ c 5- —

1 1 *• ooa <t-Ht-< V« "IN — - w i w «*"« 3 + fj— (\IO •i n u ü - u,i # • • I *■ u. i f) ^— ^^ II1") *% 1» n H

* >■ * • - o i in UJ u » y^ « •» <f 3 II UJ >■ V ^. «a Ut«- i nIU -> o '- l| II II U | « • J O H.l • o » o a a1 n -1w CJ <3 H. N- -) • y. »n |C7>>-0 • • Z O ♦ lii • n *»< k II »«^ Ci g 'J-. t C C- i «rr "»A -'-'-'■'•-" UQ 'ilUJK z •3 ->oor > ~ < y • 3 -3 •-I w -n « u. z II11 ii ^ • "5 !■-•«•« 3 ■la« I' * 1! J- II W cs *H0 Ujt* Li-Z WW^W? II '"••-'II ^ y o • -I1UKO-1 II o o ■" i*» a: a: K ar K K n w >• i* r« K -)-l- Ow jj il _' n ro II C II O J U>-3 KI-(-l- Ii ii ii II II UW J J -X "O <.'J »^ ;\i

JJ 3U>-UUJ'J ^OOs-^UU «* -*r > j j c« -) i. i3 t - iM It i 30<00>liJ>>>>^ü'-'-U.U.-- ^a. <«; U i y W « ^ o «-< .r, c ■/? 3 w3 aiTjtjQ(mja:(j(j(JUi£^<<,-',-<<y-«v:ü'-"M U v a ■ ;V ta z aa'/i U^

«N C\J o o mi M —« o o o o o O o o a o O O M cv. o 'O **, «n <t ■* •M

OOOOOOOOOOOOOOOOOOOOOOOOCOOOOCTOO ceo j» r> gj o o — MmÄi.CsON^^O — NfO^ftvON-S'fTO — \ fO .j .1 ^0 N. T, -»o — *1 IT <»;' nN « "* (ft x,o«'nt)occcr3«ff'(T'T«(*fy'*9'5,(T9,ocoooooo'3 o- — *" *- —• — ■* -f«i

42

"-■ fJriMaii«iliiliiiiiiiiiM um iülitt

Page 52: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

■WfWHIH'' i "■ ii"i "i '■ ^.ui'.iwu »W)H»W.'UUII»MH »inn 11 WIII<IWIIIIN I ILIIIIU iiro^wp^w^wiWWfffliWWIW'^^'^^WWWni

BEST AVAILABLE COPY ooocoocoooonoooooooooooooooooooooooooooo

ZZ7.Z OäflBSS

o

X o i a a

lb' S3

0 i-

Q a.1

z

<

if)

a

|

5 u < ii1

r

Q 7 "^

* J iJJ-

H U

•w tUt" •

K — < r ii Ut-J.

"SO DO UJ U ,Ü ü 1.0

I- JM Q OZ o

u

> *

+

> UJ

c i

> ■iJ » —

3 -<

+ S II

mo

Ifl II

Ü 3

.1 o IT

~>C il

■JJ ->D >- a .o

r- ^ w — w UJ *■«

• U H- > ry ffl 'JJ

|l + £-t-

• it 1 «rt U c 3 »-ft tn n

<T M II ■Du-' in "-t-H

S-DO Q P UJ a Q äviKaa:

oo I i

xi aJ oo t *

ti li

>> It1 UJ

a Ow • • >

'■" o a I.J

— • • * oa

h- • • ■»" i w ■fc" ^» -^ >

D j: -<- ^ü^ >> ii w J !.!J H_J n Z -i — -' -) a < LL u. a u (j w -, ^

MT V) a-

> rr.

CfllL C: LJ I

O a

i

ro

2 > < 'JJ

*

UUJ t H

3

I >

I

-»<*•«» Ot- I

>Z

WlüXfl

—< o >«»

li H n

(\J o

zz z <<< >•>■>

a K 3007 IOV:< a3z>

in* 1 l

«i- * a zee >z

2 >• <,v or > *

«-*:* 2 ? 70

< n II II

i a W.ZZ zz<<

acr *» o o

in in

»-* <** **

s* ** ^

a- u (J rr o>> miTK n

ITUJ II —

II II IT) a w Ot/X/lv

^"•ai/) uitnLi»-

</> o u «

o u » a

2 M

« >• z M

* a *

o o >■

2 M

* > c Q * o

oo DOT z * ' t/)

< I *•

Z«2UJQ <ino>-3 < II tn x

II it — II i

o c

o>oo H« (/) l-< »I

inH-4/)U5

V)

o u • z

vfl C in i.o B^tfi

11 o

ooooooooooooooooooooooooooooooooooooooo

43

I IIMIM ■MMMiMM^ ä^ia&iiM&^ä^^i

Page 53: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

^WWWWIWWÄP'W!^!«^^ mmmmm

BEST AVAILABLE COPY oooooooooooooooooooooooooooooooooooooooc

O V3 tf O O O V3 V5 O Ü> C» O !J O U O (J 19 13 O O O «J O O O O O v9 11 ü O O V^'3 O U «5 J O (D O (D (D (0 O (D 03 03 CT D C ^ C 23 O OD CO 33 OD OC tC (t I X ^1 X OJ ,L X X Tl X O! 1:1 x r X tl cc aaaaaaaaaQ.oiaQaaaaaaaa3.aaaa.ca^. oaao. aaano. ia

c < i '71

UJ

«

<** >o

<

LütT IS # -f

-z ><

*

* z • >

11 II

aJO

>* ÜJ>

a

-j V)

a >• s

J<

VW)

< <z

KW <tn + z*a

O (fl2>-

X OO 0.0. X Vf JÜU I 2 < z« < "♦■ • «

QZ O«

v)>(rtr»z >- +w# ^a

tvaz« ^vz^v • H-<;<Z «v. 0>>< II y> 11 11

11 11 a II (\QC\<

xy2W2W

iu>aj>cu>-

S tu

O

< z 15

to

+

Q

XZ in< a> tu • *

UJ -Ix &■<

II II -

"■) o ua «ä 11 ja U.U j

ÜJ

•■- OV)

a« ^ 'UJ 11 N- O

X

s-> * «

> UJ-

# * in

o

1 v; ^ 1-1 •*

*im >■ I s "»

(\J »< ^, •-« m* Jt

11 + >- 11 a 11 •• ■••

»»je« v •- "» ». z U! •* -»«UjyiiJ II O 3 3 0-.^ DJ3 • .0 Z*"* —ZZI-Z-^-oc -««■ K 11 a o •- »- in — r J'HI K u t-«H jKin wir 11 ui — 2 >>UOZJZ X 4 £- C 'J U 3 > i/) u < ü ^ ü co D 3 '^ U ü T U < U U U C CJ 'J ,T O ;.1 »

1 11 1

IM O e • • o

ilT II >m 11

a ,1 (/1

II 5

>«: J '.n

m 11 in

- -r II I 3 3 IT-

9 11 tl 2 »

—«- in

s 2- 5Oöö M 'j •- a

. fO ^ w -c

• UJ)» X

*•»■ I

II -t-Z

r ^t 1 v • 3

o in II N

II in 11 -. ip m

Z I- 3030

• 1

r, o o <-

N X) LT IT' ilip

0000000000o000ooe-sooooe OOOOOOO 5coooo-5000 — fvin«ir,.0N'nn>o-'?Mn*inia^r^o-«"(i!,rii,'r!3vt(J'o — ,\,r>itii,ONx'To OOv0v0<0i0\0>ev0NNNK.SNNNVN'CX--y- 0 ST. S V T Ti »> * n. ry r* y-r. & 3 y. 3

44

iSMBl ■MIM1 fiftiii^üialiiiiit

Page 54: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

"iWUm.pili „ il, HipHIIIHIfniKil flWIBMIHlllI«.«!!«« ..„„m^mmmmi^rm^Hf wmmmmm>mmmmmmmmmmmmm^mmmmmmm*'*m MMKMIMWMtfli

^

B5I1VA11ABIE CC i#*. r* ♦ l

3000

zzzz OOUO CO COSCO aaaa

ooo dfXON

WNCV) ZZZ

flOODO aaa

ooo «0*0

ZZZ

SflCOD aaa

* a i i UJ I

ON

trtQ a< >s

-.9

«■^

rt •*

* —

-UJ

«'» — M

u +

>

I

» ON

# +

wtU

I- it

'L' II

II

i.0 Jl

CUJ

« N

PJ ft

g'ZlAN z<in* oa* >-U>-Q M Sit

v->z I <

— 4 >- K X +

crv *!? # W Q M •~ O ^1

*• zo:

UJZVO < I -

+ >oin go*

a ; o *» CO *-. ^* it '"CülZ «aw < 0 j<:a.>

< Z * - IMI II " H 1 > VZ

< WWW >■

IN

: •

■ ■*

oo o QOQHO

KZZOO

uj 03 >• a w

o

o o

CO o

M C '5

CM

■*

a 3 O

II

tart i

II II II II II

I ■ 1/5 • < i: ft 3

00 us ir—

aaoc v jt v: c ZZZft < <c «: fr

Cl-

3 3 'J3U

J3 J3 J-IU » « • • » O _J

Al -^ 10 O • <j *-< ^# «^ -^ *^ + o UJ JJ tu I4J U J M M M *-« M ^J tt

3 3 3 3 O M i. 00030 il.- U (D U OJ CU _| ►-• ^

to

u.«

U.Q

- a ^ •-• • — »N j^ N w

(M win — (\j • ttl «ü C S O O'-' :.5

IU0O + •- + •DO

a ca — — > >- r i

CO II II II -J -»(I

C -«>• it - a a no iLtrc ■-»mi-< <

a CQZ

T I I I

I

UUJ >>

U'UJI ^-» I-*

(JO oo oo

PI 5, M ii

az it HOC

azacr x -u or a

a Q o-

< it ii

az

tu ai >-h

in o 30

O

a < en a tit

■ wo OOJ az

N <t

CO oo oo

ii II o in m zoo

az-zz OOK ooz a: a: o « r«i orauoo < <

II ii

a -< o ii

ooooooooooooaooooooooooocoooooocoooooooo ooooooooo — — —-N-«"*— — -«—^.rjcjfVjMr^'MMNMro'nmiTnrO'OrOfnfO* Ovi^(\iev:>i:,,^jr»;(\jt\ir\j(^(\jrvicv .\r«<\jAjrj(\jrvi(\(ru«\<c\jNC\i«vi\oj'>jryrvjC>jw(\iWNe\j

Page 55: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

'■'^BwapiiPMiiifiiiiiiaroMi r "r'^:-T^?:,,7»»7!m'rfff.T ^"T^

*■

i^rw, i»!,,!..!. ■f«i«inp!ii«rj»f!»m,i, w^w^piipiiiiiwiiippi^iig^i

BKAVAIIABIE CDPV oooo

zzzz oooo CD 000(0 aaaa

oooo

♦ «*♦ OICVJNM zzzz oooo OB OQ IS CO aaaa

ooo

(MR) CM tzz OOVtf CD COO aaa

ooo

zzz CD SOS aaa

ooooo

»n in in 10 in CV (M (VJIV (V zzzzz ooooo DIDDLE aaaaa

ooo O««M \C c o «MfViN ZZ2 OOO XXD aaa

ooo n*ip

2Z2 OOO

aao

ooo ON«)

<\J«NfV ZZZ ooo DODCD aaa

ooo c*o *« ONN CM CM IM ZZ2 OOO CDTiE aaa

ooo

(VIM««.' ZZ?" O JO a;i, x aaa

ooo IP «ON i»NN

zzz ooo

aaa

ooo O^O KNOC WMVI ZZZ ooo

aa a

^ O O in

k

c

o

[-

30

a o

oo

o o

a o

o o

o

< in a

oo«* m N

» o

*• • o

o a • r a < UJ

uja «55 Q2<

O OD

o o

• O tu mo oo

a oao ff< • a o- < v

orc o- K • rr < < t-

I

in o D K a. <

-z II ILOILU. U.

n o 30

u

<a

11 u.

a« ct <o oo tO

•x <

•I o -■m so

u. go t-ü oo o

in in

o o

o o t

o

o

a o

o o

a a w m «in a «a • UJOUJO • # ♦»

w o 5 ■x a <

zrr o< ma

UJ « * (PH DO U. • O O:J

U. Q M aoa

u'ncr (POcO<

3 K au.ou. (j ►< O"-

in c c K <

>- • ciu

-a a • SI H

TJ

« J o< on. 0 • r.

ii I!

er. ui - o -) o or o 3 ^ o T ip < in 7 < '0 •-' "^ 00 ««-»Xfif u.

a oz ooo t- u. K 3 II K > z o-oo ooo O O iC O it

>-o 3->

0 4J-»

»z — n,

^-zo z uou ouo^

o <»o

II -»

3

o

©A o •*

U. i -

I z I o

z ~ uou. oo«

* o "O

«•> Ü

t ->,tl -># • »c\o PJ »z • N<

r*<w t -LI" UJ*"1 MOW oo- oo^ ccoa i ^J •^ •

cna. j c< • « o

ii o n o

Oil oo OOLL OUJ-

->_ii

>- ")*- ooo >CJ> oco II c ii

z 1 * n

OPJO >n> UQ o

It'

j t

ä C

C i; z Ok -o IP3 OQ <

* t t" g • ft

o> SO Q

II ■

K" v9 • ft

O z

> a: u ■>

st or — • < J JJ J

U — Ottl- 5« 3 • ZX t- •-< II

m o « m - « ft ft ft lO Q0 T t) * T

o o ft

Z -' uu.

I I o o

<• o o«

J Oli.

«

oooooooooooooooooooo — fti,p«'iP\0NG00,o»*ftpr*iP>0Nef»'O ■» * *♦ * ♦ ^< <tf LOtP IPIPIT 'P iPlP 'P ^»6 >l/ vv .», .v j ■,.„• -.v •■V W I- '"" '- <- !»; ft ft ft ft <M ft ft rM 0, ?V ft ft CVi ■vj ft ft ft ft ft ft ft ft ft "^J ft "VJ ft ft ft ft ft ft ft .A« i

oooooooooooooooooooo "•ft'p«,iPON'T>n*0'-ft"r*.',»oN-!,o'^o -0»0OvD^0OO-CON^NN^N»-NVfv«r ru "u AJ a: ^l ^ m CM IM p^; fM (\J AJ rvr "v ft.' *. r^ AJ ru «ft ft ft

46

pmmmm ij^ia^tejuaa^imi.hjt^^

Page 56: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

—— ———— ■"^—— ■W"

ßßi mmit COPY ooooooooooooooooooooooooooooooooooooo (T300 80C00a)n0C0ajrTCMJ>0>0*(^3>7i'7'O>OOOOOOOOOO'*"""<-<-^"»"«»«

ZZZZZ^7Z^ZZZZZZZZZZZZ2ZZZZZZZZZZZZZZZ

I'CCDECDCSJaJUXXiCCaDDDXCCIUDaDQXTIIQaCDOfflOBiriEiDQBODODCDOD aaaaaaeaaaaaaaaaaaaaaaaaQ-aaaaaaaaaaaa

o

a a •

Q < S o M

< z

.

o n

u.

t + IJ —

^ • ■*

^ o •

^ w n y H ui

K it«- it«

> in

-5 —

> in

IT

> uj-in

»- II -5

» ♦

win — UJ * a! i--ct-

II w -» .r • »- - u -» > — Ü

k- II y • > -

w II cv • f"» UJ

;',J • co

T — o M -LiOwt-

2- ZC aaroou

C>

X

< a

LLC

sV —

ITZ«

Z^a

trina

in c Q

0 a a

m

Q 2 z <

Q i za <Q aa • ao re. »o mam • a

►-ino

•> era-« • a *Q

>a«o • a n

<< u use* »s 3 • • z z-oo <m\n&Z II

zzz z a«< »»a

a »«z

o •?

Q a I

2Z c\J<<

x< ax o«

QD OOI- 5t5tC zzo <<o 0D>-ß'

II II II II II II II

zzz a a

n a a zz

i

o>> za>-

zz aa oo zz

>>

ZS£

aoo zzz

>>>

a x

a > < • z a O D * a <n i x

M »O c •

-«'JJ-JO ax

ZZK II a « • at- &< ZZHI □ zu

— U — H > ao I- tH5

O o o in

a Ui •

i UJ

<

a ZH <z

a aa < a UiO • t

-i • t «o aw or • UJ

ODUUJ <t-a

oz — o- u. t- «-Z

«u

e

ooooooooooooooooonooooooooooooooooooo «wr?^inn^r.;'TO'-M,A'*inaN?)!To-<^T«tio>ONa)CT,o-<(\in#inveN

47

HL'

MiMllltlliliiiiiiiiillMt^^

Page 57: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

mmmmmmmm";" T ': wpifps

I

i

BBOVAIUäE COPY ooooooooooo

xzxsxsxzxzz ZZZZZZZZZZ2 « a a or« a a K a a CE a a a a a a. a a a a. a

OOOOOOooooooooooo «.wn^i^tc-fn^o — Mfn^inoK

U.tLU.U.U.U.U.U.U.ILlLU.U.iJLU.U.U. aaaaaaaaaaaa, a. aaaa

• z u M

*

> in + ->

• o -•> II V)

*

X u

o O (flU o« O M IM O in -» + < «o<f -o^ + o wlAwiu v > >zu; u- II l/X-K

t-Of II -» II 3

-> II H

O-»

ifl

->imuj j - Q w X j

o *->>•-< o > a u o m io in H-u o in a

a < u

om n ou

•* * .j

o u. - ■ • LU O s -

CM • o • x UJOO in —— aujw

«•um • o» i-o

i^ X' X s • • ^ • oo< -

• -• ITUJ

UJ • a

x « o •

o

4

•.0

a -

MT* tU • *^ ^ ^ II CJ • • tX

IPSOO »" ^Jf -• ÜJ I- HI «^

U »CM c>in • v« MO

• aiv«- rj o »UJ «« ^xK • rr<t •

X Üw »o ^ • vD "■ » •<<

MX»» o r» x x

ii —

rr o

u.

u

> u •* a M -ä j a<o-ii|

ujra-i'' Q.U>-»7 0.1- Z X <

aouwi ix» oo >0 vO » CL" •« • »X

X X cx X »a1 »cr

2^J_|_(-H-^-t-l-l-t-WI-t-

Sifxxiisxxsitftz H a a ^ ^ "J. ^ T i ri: i « a v •u o o c ^ c o ü o o o c D c a:u.u.ii.iLU.u.u.u.u.Uuu.u.u.

35 »

O »4

X

< y

X in * x o

• z

UJ it am »* » • x

en » w x

< — X *- :.( <i O i. X 1 ,J

O ^ U.U

o o in

o o

o a

ooooooooooo -MPD^lftONiOT'O-

— .■V if) 50 •* ^

OOOOOOOOOOOOOOOOO ••(ivin*in>o'>-Ti>o»"<vj'n*in<ON

A8 I

—-^^^^ MMTFMB

^'-^^■^^

Page 58: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

^..I^^^p^^^^^p^

, T-.t, ;.;,i,. ,~,.^-;.-,i..,-;...-|,

.p..

BESlAVAflÄ

ocooooooooooooooocoooooooooooooooooooooo

1 Q

o o

#

Q

oo

^< N# ^

OK»- 43) CD CVrf>-J

Q Q ^. --» ^-^ ^» —s ^OO^ ** ** O ^

a to H ►-1-a: t-^ a ü7 < Q H a H < < K —-> oocaQ.aa:o<OQ<aQaoQa:HH' J2Z>Z>->-NNNJXa£ZJZ>2J«

o

N N

mo» CO«'

3>

u -0

o 3

A» ^* ** A» *^ *^ ^* ^-»

in 'fl m "^ in ifl IT LO • www«-"»-»'««

o If! If!«

— n •- 1- • 5w «

*-2in •

Q -ST

IV OS U « N O t" <!- — VS £ < < K 01 • O t» UJ 1.7

U1t-«€ JO w N u w a < i-o-ilL 5: vav

0QOC _! 5 >- i 2; <£S.25 UJ O O J o CE Ü U U O

OH ou x >

• • ^^ ä *■* fO nin • w — n Q «^ »^ X C UJ X>£

~ »!/)>-

CCIP-

> wf» •- m C w c ox>o

• '.TX S^. » •

k- •-•

t~x wz vc

z« az

o-

<<<<<<< < vjoc^aa « UUJSZVZ >- <<<<<<< <

IT-JI

N J <<

» • • • »

n ifl sn m ID *■*<** w W '^

N< NNN

JZ zuo << <r<<

• •■»

no «-a

• X

if)

< a.

<

^IIXXIXII

r >_iOQaaaQ NUUJSZVZV

J

rinxixiix a:o<QO<oQao >NNIN JX22 JZ <<<<<<<<<<

xxianx NNNNOQ: aJXHUH ZUUQ J <<<< <

i/)i

3 3

-a-jujszvz)-

a

OOÖOOOOOO

aDcrxsajmooocKixtoeoccooioCDNOo o ^* ^* O-4V0

aro<oo<ooaQoajxt-ii- >-NNNjiszjz>-2uuo(rj

Z2ZrZZZZZ?2ZZZZ2Z ocooocaoogacaocaa

tn n '^i in a; tom u~, (/; (/i w u-, ^ (/) 'vi irt io (/) ifl to ly) in (/) w en«) ZZ2ZZZ^ZZZZZZZZZ2ZZZZZ222Z u.' in j in u. 'JJ J '^IJJ j LU ixj uj UJ ui u u ai UJ tu aj at uj u Ui u axsas^. iszzzxixilxzxsxxilii ü'jcc^LjQCQouaoQaaQaaaQüQQaQ

-zs 033 XOQ < • ly-

22 - OUJ^ r* Jin

2>Z lUt-3 Z30 »1 O w auj

Is) '^ ^

I

O0OOO0O00000030C00ODO0300 0O00OO00000OOOO

Page 59: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

^7::^^^^^OTT^^^^^^^ro^^^',^^ -" ' ■".■"■»■I H" M ■ H I I ■NNII ■IIHIJIP H IH '-^y^^^WW^^WWWIWPWIWWWWWIIWBHWWIIIIWIIWiWl

1 -.■.:;-.../"!.-^V"

I ■

i

^

BEST AVAILABLE COPY oooooooooooooooooooooooooooooooooooooooo

:

J j

a c

■0

V,

O H w »Cl • -a Jh-K

KOtM

< • »«•

— IfiaO

»33* aaan w • •!/) • «^ ^* (X ~JJX » J Jt- ja< •

*-* «* »^ 2 ^ «p» %rf ^

zzxo OOQ •

X o X • V3 «* • ■♦

10 "M •>»

x • • 3 ^ ^

CO >- • in «a N • ro

Q^ *-*•* <*ky^

k-*0<fN trMn^)0",icN«-wiT'»"Na)aiCc ^o u Nrt-t in,,«>«Ji-'C\J'r*0N50O-f\J<t/!N f» «M

> »-- — ---«-« C\i fV fv. -j CJ cv ^PO

u ^^ **

oo

x •- a-»x K<^ LUH » JDUJ — •X<

— h- K

CVI — SD

3XN

«^ • «^

<~i »• «^

xz • xa-> a •< J^I <aoa ~X«f m *^ *

oc

x y •I

«oxzzx W3333

-»•»QQOO

101 • • • • Ct ^'^ ^ '*• ^

ÜL W -« D ÜQ o or

•->auuuj -»ainx<<«<<t cvitro » — www

2S1XZXXZZXX>S:X>XS zz 33333333333333333 33 OOOaQQQOCQQQCQOQO OC

l<:iZ<<ZlIIIX<SiiZ ZI f^N.i/lNNK.NNOrNNO'-'X'iNQr << xrrarijo.aao^^'tc0400 so J_iZZ^>-ZZ>VNrxjN_|i>. z zz <<<<<<<<<<<<<<<<< <rf

Xv

• X ^ w '^ •

cm XM

• u «»X

< • ac

• WWN^W -«# ^# "

fN

»ZZZZ^ Z2.ZZZZZZXXZZZZ%.ZZS>. z -3333M 333 333 J3333 33 3-)33 J33

• • »(VJ *■* *^ ^ ^w

N J JW X33Q:

HQO*-

onso W W W *i^

iZSS 3333 QQOQ

X> 3 «w O-'X

iin-cc i

wCC xxx Ox

Xw

H5,

'**••»••—

z LU J < >

>Z<IZ en mCD as ->->-JO »UUU J

<:< <<

— in

a«- -IT w

<IZ<IZX<SXZ55III1XX<

ocrcacDaac. Ofro<CQC<ooo-3 J J f X 2 >■ >• 1 >■ > M W M N J ». f 1 J1?

3 O UJ

CM « * ^ ui u5 to u: .o '.o o <o t<i

,ü W W w I ** > W W W U- UJ 'il U.' 01 U H. LL1 'J. 'J U,' MJ U.I U lü UJ UJ UUUU »inuUU'-iUIJUIJUUUtJUU j u u U U u zzzz .rzzz^zzz;'zz2?'^T2^-'rz7 U; W UJ !iJ w il UJ 0.1 U UJ LU UJ lU UJ Hl Ü. UJ ly 'il 'J-1 ÜJ U UJ UJ V J_|JJ »-UJ-J-IJ-IJ^ J_lJJ„iJ-J.J.JJ-J <<<< <<*<<<<<<<<<< c<<<<<«r >>>> >■>>>>>>>> *-->>>>>>>>>>

3333 3333333303333^:03J3J o o c o ooocaooocoouooooo'jooo UiuJOj ijj ;ii UJ UJ UJ :j UJ UJ 'J u "J u1 a.1 aj UJ iu UJ UJ U UJ W

u) u3

OOOOOOOOOOOOOOOOOOOO^OOOOOOOOC^O-JOOOOOOO

♦ ♦♦♦♦♦♦#* !f> !/»!/» ^ 10 ift '3 i/)'" O »T O vT C -/) O >0 O >C \C "* ^ S N- V N N N N- ^ ti

50

i

Page 60: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

iipji iiiniiiiM,.:. ■ ■ -vpunnnawMPHpijwimpmi'lWffWWIW»Iw>wiwiwBPWiwwii»w»wiPtl^> "," "SJJ^i,

\f Mil copy ooooooooooooooocoocooooooooooooooooooooo -4C\ji»i^'/?iüN.,C0'O"lNl^<'ir,O's>n^O-«(\ir0<J-ir\0NB3'O — WW^'^ON'rOCT'O i. x v x: a; Tnx93oo(?o>»(ro O'c^c*1?'? oooooooooo«-«-"»--""-"«"«-'»-*-^

rO vO ^ Mrt 00 •* •♦

00 o

SS ffS -S.-22

000030300

• • • • h- *K • » #N *■% -■» ^^ • *** » ^s ^

N.NNr«.aQ:o<fN a: _i s a: N t- x a a

<<«<<o<<<< S^ ^^ ^-^ 1W <f ^* 'W 1^ >*-»

N<\J«ViftJ sxxz oooo • • • »

JJZZ uuuu

o (y It

^ (0

3 3 o o

5 3 a

a o •n

CM

3 P

-^33333333 NVDO DQOOQD

m*«I<<t<<<II <-"»«ffl(0* MflNN-N M CM > J o 3: a B a a ssuojjiffci 33>?Z^ZZZ2Z

z 3 a

x a N Z

o N

I- < O Q Z V U u

^OCM

zz 33 OO

irssc — 'a —'P^*'-< •»o"'» ♦ moxo-Mr <r -• nnN n^ lo in m ifl *»%»•»•«»

f) w WCMNCM <-»NW^-'*^»— WWN^*-*2 XZ Z

ZZZZJZZZZCQQD 333DC3333KHt-h- OOOQt-COQO • • • •

CM»- —OT "^ * T o — <r -y in ai »- (MM (M W CM fvj

CM CM CM CM ^J CM CM zzzzzzz 3333333 OQQOOQO I-I-K K K t-t~

vT|w&OK*<«a«<<a*'*s4*<«l*«<»4a4P«>* «l-NJZZZZZZXZZZZXZZ 00*UU3333333333333 «oi-nwwa^ooQOQQaooQQ «■^ Ct ^"^ ft-l h* h* M M M ** M M to4M M M f\J U CM >*•»••••••»»• z-z • •IIIIII<<XIXI< 3 »S-^^OXa^CO VNNttNNQU) C'*Q-.'->-jOQ:ocaaoci:o<o --.KNNUUJJZZ>-Z>>NNN

a» CMOZZ zzz^zzzzzzz CM ^. f\J *^ ^^ *^ »^ *-• *^ *rf «»^ *^ N* ^ ** *^

^ w» w* ^^ *^ *-* ^ -^ *-» ^"^ -—» ^«^ ^» ^^ rfWi ' «>.

«- CMN-^'»-«'»'"-'"-«'-«-» —'«',» CM z z-<* Nonvot^cMinNO^ —n z 03 —«««(MCMcycMnn 3 OQ Ql ^ (v H^ >^ «^^ «»« ^«^ ^« ^^ «^^ i^%^

• s^zzzzzzzzzzz -» 3333333333333 -"-"•ocooooaQoaooa

i<X5;.r<^<<«tzt-cu,'i-rr>-wcp<»-wwa:»-HS?;zszzzz2Zzxx «TNsv^'jLi-N-ssNXDoaoTo^cQ^-KKKQraccaNinN.NNaNNQi/' OJJ5-^'-Jür>r1_>.js>.>.rs;N:5f2'2'jSQj>.j>.jo0rQri}aaOaO<Q XUUUGJOJ?. JUUOUUUOUUUUOOUUÜUUJJZZ^ZVVNNN <<<<<< <<<< zzzzzzzzzzzzz LU '.U UJ UJ LU UJ li-l 'U 111 'L' 01 UJ UJ UJ U UJ UJ Xl U.1 ijj JJO.1 UJ "- U UJ a) 'JJ U- 'Xl IL 111 UJ HI UJ UJ UJ UJ UJ HI

-ZZZ .^ 2.2 T.7: 7 ZT 27 7.^ ZT 77 7 7ZTZZ7 ZZZZZZZZZZZZZ Z UJ It' UJ U. HI UJ UJ LJ UJ UJ <*l U UIU 11. U: II' ' J ÜJ 'xl U li) L'J IÜ UJ UJ UJ U UJ W UJ tu UJ U UJ UJ UJ W UJ U J_J_I.J_I-JJJJ.JJ_JJJJJJJJJJJJJ_IJJJJJJJJJJJ_;JJ_I

3333333333333333333333333333333333333333 cajicooociocoooaooocoocjcootjooo^oaooaoooooo ■.U UJ lU UJ JJ MJ D 01 UJ UJ 'ii U.1 ilJ UJ 'JJ UJ ^il UJ 111 U 111 dJ UJ JJ UJ 'J.1 UJ UU 'ITiJ U UL' UJ UJ UU UJ 'U Uj UJ UJ

OOOOOOOOTCOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO -.Mr^<f!r.o'^x^o-<^j',Ktin',ovrofj,0'^cM',>*in>osao(T'o — cMfo^'/tONOO^o

Page 61: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

sflWPfiipw 1 • ' ^M

BEST AVAILABLE COPY oooooooooooooooooooocoo

aaaocttitaaacraaatttra'raaaarafr

in in io

§ 333 oca

x < o z z

IK jxa zzz • • •

f^ JJi •« ", ifl N

2.Z21ZZ 333333 oooooo MIM^ MM M|M • ••••» IIIIK

Q<ocao JXZZJZ zzzzzz

inmin

333

-iza uu -» zzz

• ••*-•

Ä I")

o

CM o

z 3

>OCOOM«tO(D

zz zzzzz 3333333 OOOOQOQ

^ on »o

z zzz 333^ CUQO

zzzzsxz c<ooaoo JZZZJZ^ ZZZZZZZ «^ «^> ^M* «^ «^ «W« ««^

JJ lU HI U UJ UJ UJ UUUÜOUU zz zzzzz UJlUlUUJUJtUtU JJJJJJJ << <<«<< >>>>>>>

z<<<

fl? JZCE zuu> zzzz "m* «W «^ ^

"UUili1 u.

zzzz UiUitUUJ _l_l_) J <<<< >>>>

- ZP5« O Z 3N-» M 3 Q « • Q M wOO^ M * M -»X • <zwa3rE i N3-<>K

j» z-a^z O Z Q-« — Z ** wZ "

••**» 0'~Ä

«MW OO 9 «0 vO •- «» l/^ ♦•^«** www MM •~ MM s at 5ZZ 3D D331IJU.EOO

i- I- M K h» IU ♦ * • • «QWO

K izazx< NON»-WMCa

otrz«—«-J J zzz zz

o o u

u

U1 UJ UJ UJ U HI IT IÜ uuuuuuuu ZZZZZZZZ tu UJ oj UJ HI unu UJ JJJJJJJJ

3333333 oo ooooo tUUJ UJUJUJUJIU

D J03 coco UJ I.U LLl 01

JOJD3333 o o o o o e o o ill UJ UJ UJ UJ lil U UJ

vv a OC «.5

M'/l M

«CVi O to • o asv •

ITOUJ NNSW

a. • aa:z> u o j rr

z <«' < MHKw « < <u.

OOOOOOOOCOOOOOOOOOOOCOO Mi!\in.*ijniONflO'Tio-<cj,r)*'^tf»N.Ti'TioMMin {vj?\j(\j<\i(ViWCM«Mtvj'on'^mm''i'"'^nro*4'*«»

52 I ■■■■■.

Page 62: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

sr

(?OOOOCOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO

«-.«--.«^-,^^cvj(\jfyc«cM(viPJCMojojrTinfnnr,)fn«ni»)fO<' ZZ?2ZZZ£.Z2ZZZZZZZ zzzzzzxzzzzzzzzzzzzzzzz

(-(-l-k-l~l-»-KI-l->-»-h->-t-l-t-k-»-l->-H>-f-K»-l->-t-K-(-l-)-t-t-HI-KH.K

NM

I

+ O VK OJ O »-* • K "1 Q

or a a a -k-N (/» » o o ÜCQO -< • M a: z - Z O

QQCQ N- X < II es < n o Q QM^- H w ~> # tu

3 SNNS t~<- * + I « z o OI->- t* r N I 1-

Q N ^. *-*—.<-% '? •>- t" »- X K Q l- >"»« <J) •* O o x1 -^ M -«T <• ~»>- *- fr i K | • " ",- O-CJCVJ- — »—* • I

•X -t-x h — o NX> | ■* ^ WW« wUJ HJ O .X .JK Irt NJX>- J^- w ^^ S X X g 0 0 1 x« - J3^_JO IM UMNJ J J(rt_| o

C "2 3333 X t- L") # 3 ui er 3 -< KKI-N jwa j 3C3Cww X • '-' • '.o < o x r c M <oia • • Sk C W.^ £ H-»- vo * rvi u C •- O • O | | | 1- aoi-Q o

w — — M 3 II II II II II 3 « >r _) »V5 • o • » ai O 2 i ä 0 II UW* «i/Kti/lOh II II II O >• N X X M n Ii- II • •-D3^^ - ** *i^~. o i/i s i w II >-NXX

c o a 5os» - UJ II II y <r » < II ^ «'S *«> ^ || M MMM rs **,**,*** y S IM l» >► Q 1*5 3 "*""') # •i -; s ^ £ -• cM"n<r — Ht-i-t- «•«Min-* sr jll«.». ryj-. zo — uai i- » Zw w^.w -5 *"* Z*^*^«^*^Zi* -) <-" Cy (\| f VJ t- •-• M lilW X X -M H < (Toraa • -> ii ii ii ii a a et a « a z a a a c ö z - r- ww.^^UG t uz II UJ K K t- K -) » 3KKf-l-3 '^5.^<<<"H ^ 2 X * 2 » 4 2 u»-< ►- XUUUÜ — -)MwwH>-UUUUh-w L. 3 UJ u' ^i u a o 5 U3333Ü- ou.ujaxx>>>>oo wX>NUJUJ>>>>iUil. «-i2''ra raacuo.:uou^o<«Q!:aol-uuuuQasxxNaa^Juuua:«

o o o o o SÄ o o ' M o c — o

~* WM — *l <\

03 0 000 0 000000000000000000000000000000000 — .M-nvt '^•.o►>.■o't•o•-(^J'^*|/l!0►-^5'To»«(\J"o*^ovO',* 50^o««r<j

f0*inON'e09,o -.«-«^M«-.««W(MMryM<\j(VM{Vi{vroronrnnmilOl»>fOin*

53

Page 63: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

wmm^wr^.r...l„, „,. , , , iiiiinuppii]! lUmiBIWIH

BEST ÄVAIIABLE'OT VJ. i

oooooooooooooooooooooooooooooooooooooooo

ZZZZZZZZZZZZZZZZZZZZZZZZ7.ZZZZZZ777ZZZZ7Z

XI Ii aa aa irtl/l ZwT oO ■»••I UU tf(/1

#» »« MM M M lOtfl UUrt aa aa zw iirt MO «O vl Ü 'J1 u

1 ♦ ♦ 1

M Ml M hrt II IX aa aa zz WIT« MM ou ■■ftV) uu

< •- «« »# <

<H •u UJU IL U) >-" JJ Üj "■* HCD < £ xr IIIXII mz U M Nt" •-»- ci. H-1- a. (/)«-• coin ÜUO r*zzzzto oto 0 OD MM M MM O u c# uu m t/i m t/j in u « g

i! * aa »«!♦#**** a # J j <«»« H <-»— a ja < «r N. w ZMMUJMMIU -*'-'j<_i<< azv; < < ^.^^. -'tnin Mi/n/jii/mi: < < <10<H1- J-C

- l-t- aa v) c i *- a a *- iK'tWOZfC'E <inu N-»-ÜJ U. « -- «uiz w z«"' w ? 7i 'Ot-k-CUMZiT/OZ 'r%"' •#* • mmixiX'^ino« I QMCC-D _j _i lü tu u w *•» a •M | |

— • »Kv-aa. aaum u i/i u u « o <'?XJC3 1 lOuOl/1 •• * <af«»M »«^wwwww -•II it II II n II II II II ww«.w II || |i 11 || || || || |l MM M

M« -L rt i r^ ^-. i—i t—t r*> ■ i d& _ ** ^_ *^ I...^. _ _A A ~- ii ■■ II n i i M W w y « V 4/>-< •- M cvi cv ryn "'"''> uwufMtvinMai-'Oji it • • o . • , » » • • • » M -, O '.£

w ii ii ii ii it r. i» ii ii n X

• M II II II - M M {V ry "j "in*} » w w w M c; o o

AMMAA^I^^IBIMM >-4JUJUJLluJUJIllL,UJ a a < «r ü a3 J ra xi '0 _ 3 r o o «• I Mi^'o-.^wiiixjiuix^aDU'aiiB.x^ II JJWKJUSaeS:1«»«.««-!! o

• » » •* •(«•»-aao ai-i- Kr-t-KKt-i- < < J (L H t-H ►-K M^- M ^. M

n - -. <v rg ro n ui ^ i.-) Z -^ «.' ^ 1.1 Z10 z i

w«»>ww»*w(J"<tJ-*fJ Inn 3 C M 3 M a a 5 g i««»*j^uinu^o^ n u ^i u in Ü.JJ-.

oooo oooooooooooooooooooo^oooooococcaooooo ■♦iniONtJCOMapn^i/ivo^'yffOM^jtr-ffir.oN.BCOMrjma-'rijjNxiTo ■* ^ < « ^ •9' Ul irt T, i/) IT '/l LI iT) /l '^ ifi 'ß O vO n <0 »3 O >C vO K- ■>> ^ N- ^- N- "^ »>■ ^. *» f!

54

Page 64: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

^:wrr^?i^:!w™w<iw^^

■Wy^«MIW^.>lWWWI|»Wi|lll]iillM||^

;

WSrAVAIWBLE OF oooooooooooooooooooooooooooooooooooooooo

Z^i:ZZ-T:2ZZZZZZ2ZZ2Z2ZZZ2ZZZ2ZZZZ2ZZZ2222Z

:

OOOOOOOOOOOTOOOOOOOOOOOOOOOOOOOOOOOOOOOO

55

Page 65: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

vmmfU'üF* mvfwm^wmwi i'ü'mmo^^o^-'' inpniKittimiiappiHTpui..

BES1 WA1U®* W ooooooooocoooooooooooooooooooooooooooooo

ZZZZZZZ 2 ZZ Z Z Z Z Z Z Z Z? Z Z Z7 Z 7 Z Z Z ZZ Z 7. ZZ Z Z ZZ Z Z

t- o o o o l» < • ä m, • • • a o H o O K ►- H P z a • • 01 ca O j u z (- h- >■ J z u ■ u J Z u w u • *^

< • u y • • • < o < < • • < < < or • o s < < 01 cc N i» IM z a s N >• J s J a z z J Z u o z z u » z g y z z z • »

< • z • • * < tr < < • • < < < tr N a s < < D ao N. dp H z er N K > -i CO J o < z J Z y y z < z • < ü u < «t < • m » » < 1 » • «> Z < >K < X • • z z z a i iK.

0- N z z 03 n N t- i tl- zo 1 N ft> > J 33 j i • U z • Z J z u u Z z • I< • *• z u •J z z z • t i • *< 1 z 1 * • • z . • Z <Q X • • *• % z z rc i »N Q>- N z z o CD 33 N i- i )!■> ZU er N N • y J oc J i •O < • z J Zt- u u z < < »1 • z < ü uo < < < * { » • aa £« • < <I • # • X l • z j j <o I • •K X X X a i • N << Q^ N X XU 03 m N H i • t- zz zz a N N » >• J rx> J i »o M IM

z • z J ZU u (j z z < • < uiio ^»« ^« • z z U ux z z z • t ( • r< ff) z ZK • » • X i ) s «» --nn <o z # •Z X t X a « ' < • • • • Q>- N X I • a S N H i »X X Q. rn-« f) -• Z< a N. NO > j a J ^ < » z _l zr g u z < 1/ JJ 4 1 w«*»*w • I < u tjcr# 4 < < • i : < SffinoD »u » < << » • • S < : • ,—« fL5_ in ssv« << s • • •> » m 9 < l» -X UWU!«* -IJ T KKt-»- xs < B XX < < < xarc 1U Otntfl • «<■< >c a • r < «r »♦ X X X f! 0< r < a P •" w ^ o j< a I XO n. a a jea i * + JJ-. >CJC! «* »*«# <c j a axa j j j <\ • «c < ui ö y u u H • >• < j jax < < < •SU :Q «<-•*»> f 1:0 > ^ IU • < ? a • » • X<" -u X1/; zi-^v-«^ *uv^tn u- i • • s^ i z X UI *^ 0.3«- r> in* p «öS v? W" <».r)0",nifDX-#nu''Tünuc'<ai r TM UJ j u oi i o N a T: o x1 (/) u u * 33 ca OJ aj Zv.< *< VUitU* Si < « < . *<*:sjc ;x ^ «r • « o ^ f>' D c r c o • oozo<o«oinos.oxo£o »«ti :D^ (1 II II MO ffl O * iUO »UZOiiU • O »i J »! J • CJ 1 II u«- II II M O II II II ♦♦11 • _IJIJ •. J • JO jl jl _|X j »ieo )_)!- UJ U ^ II II II "> < • X I * • » nr<- 4 2 ILi Ifl ^ < « (M 1! O > u. ujjcrj »j ».jiijujajjdjK-x _i o in a a o > > z z er uf «s u. « « i) fl » 2 JJZJ J Ji -1 J>_J j j2 j ja? t_IU 0. J _j z o r J 4 < '/) -1 -x c .-3 U «. < U < U < U 4 'J <i>J<V<tU<U J< ei j < < •-• * ü ^ 3 •' c: T U 1- Tf - u ^ « w u u •» u ^ U w u o (j —( J—I u-i Jw<J .u < u i^ in K UJ u u c tv^ i- ■.'• > n.i -^ ii ti w * w « w « #

< l J o l o

■ • :i

^ i

i

00000'300000'-''-»OOOOOOCOnO'5000000/3 0->0'>->00'50

N W CM N N «VJ t\i C\J ry ^ "On P^r" "O ^ ^ f" IT ■» « #■•##-## <f!* « ift if» iA ift (fl ift'A'^ 0 (Vfi

56

^ -.. >..--

Page 66: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

■V^:"™^!«^,WH!*(^ ■,,:iT~ tßn^njiim :"•--•' Wßvmfmi'"*» mmmmimmn . ■ .mw.iapi

BBT AVMAßtl Co?y i

cooocooooooooooooooooooooooooooooooocooo

z s < < 3 i O z ♦ ^1

a > u +

#

1 2. > 0

0 • «a tl V to z in ** 0 0 < < u it 0 •

a 3 £ u. II to #« O V in 00 «* * «m » a< 11

<< ~ a -u < <x 11 wf-rvi > li. i- xa a UJU'HtV u Otl - m a JO< coa;*k- ** ♦ u.-» 1/) j<<»- *# ** * »<_l a < t-iu aacjoj > KX-i u -UJlß JZ a <\j oaxz « 0 UU + 3 NZ < + O m

+ >-»- O U-'+ 3 m 0 •« + + - UJ Ol to O -^ to 0

I-«« a a + * — O'J O to • N >>#t-S V ♦ n*<<Ai»UJ«o x (\;^tM* -»-» ■ < > • Na zu jo • «- OCX- a -vj-.-0<UD<O»flU H cnir x "^^J * CO^"»- 3 tOUJJ * # » w XX < 0<UJB»+OQ<0» « *^^^ W W4 »•« a. Q aa «2 <X tQ

♦ + KK e < y.< > OK « ILU 1 xao< a cjrvj * * a 0 0 a U ♦ * ifl it. 0 a J<H-(D3# zzaocvj- 72 ZZ I s 3Q>J<HlJJ#»a <r < # » UuU. uu 00 + tn 0 1 t-J < UJ1D'*Ä

^JOCli. X N'M«*XX»» CijJ i/1<C N iBJ < < 1 OO** 20 NNji i^X Xi 5^ Z < QtO 1 < u tQ tQO # # M N H I«. --ZZ---2ZZ < t- *a >~ 1 »OQZ •Q*«£r »nr x x mm 1-•-3 3 *-K O 3 « lU UJ in JUICD s Z<OZ(VM# J7-*- »W-)-»»^-. TD 3L ffi C<WV)<X*< •Z<'*(vK UUt->- + ♦ M^iOSD^^UÄ»» X « Nua UKC t < t<<

c n BB a IJJ t- 0 U#_IU C3U ~ X t w + 4- + 1 N X ■•• + ♦ ♦:{? >■ s< in 1 rvjxa x + ■♦■

My + + + + ~ + ~u *TV)*C^ •xaxs + - ^ fif 0 ^ - ry < rv <■ «^ Q* u » "i a j x H a tr 7 z * * t- K NNOÖNNCÖ •«^ *^ * + _J^£0 < - J<>-UJOOft < < O Q * « XX_| JXX_|J- ^r (J — I » ♦- IL < 1 IUO*## 3 D # » •«• fti t- *- t_(_i-.w(jU'--'UOO w(M w ■*ai 1 #0^ x» • »B 1 "«»-a ca»-'>-u.u.uaJix;uj'-K»»i-i-** • a »».ft jVQOw^O SZ^-UJ'U • »««iv* #**Mu.ii.:2c cc»»j£;**»**o k-cr^^-*U*K 1 «■> — O J UJ ÜJ < < « tia XN3_; -■^ZZna-ffZZUJ (ji-uua*in» — win t toj*.w> JZ ^KNvss!rnDDia.DD» >U>>CI/)DI.T 2; ^f < < t t* ♦> VJ (j II 11 w w ->-) -5-)>-lLU>UU>-XOCH>S + II<<

—'.\i ""■T M II <t <t 11 11 5 <t -Y J u uo u 11 a a ^-K« Nu »# w •• W%» •< CD 33 ftj S h 2 11 n II II «-Q + J JUJUJ<<

a. UL i: »: II II iii ^ M 11 Z '- 11 II II < Q <<mn k II II U.U. II II II II II II if. Z 2 Z H £ u. II J. < II 11 z

00 03—WDD-fM«-^ l/)X 20 j a tm w w w w 3 — c^t-H—^r-rvj ■"•a-->->-<-i-s-)^ryu.c<aoa3U.XOj U u.ULU.u.Qon t- K Ullfl < 4 ' J u ''jii:<.-j<<<a<4«uoa(jQU(.ix>< a MMMI-lQ, X O

0 0 0

OCNJ id

oooonooooooooooooooooooooooooooooooooooo -(\/nvjino'>-oo'To-<(vji,^*"ivo'»-'Si>o-M',i*LnvON«?TO — rvjfri*i.n«o^oo>o 'Ovoov;ovOo»c-3ii-N-^,»>^^'>-NN.s'm5a5-p(0(C'flt>,orc»'iT(*'T>o>(Jift<y>o,To

57

mmmm^misä»tmmimimmmlimtwmät n w r witoiiiiiiftWakita^.,^.^.

Page 67: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

"' ■■ ; ■ "■■■■ ■■■'■■ ■ .^.^^-..^.^rv-,.-,—,—^ mmtwi.nii .WLWMIHI innniin im^*^^mmm

BB1 AVAIUBIE'COPY ooooooooooooooooooooooocooooooo •* tvn * \n *o h- to >* o — w* * <f> >c f* %• ^ o ~ (v *> * m -a t* w * o ~

ZZZZZZZZZZZZZTZZZZZZ2ZZZ2 7ZZZ7 7

# >

UH

+ V

< axib JOI « ♦ (fl Qt-O <a:u x< Ü s

+

CViQIX o»aa UWZ£ nroMM

s wo + u*» ♦ onr

zu ua+ i

in

#OII u aa cr* mo tn oo xyuu

o I <

c u s <* to i z in ■»

z <

Z< <I

uj a j I < z V) <<

CM

a X X + t *

p

m o a —u

o*« + >>>

i a ii ii n

a o

w(/)

■* II

w |l Q || *»-.^ < »"«vifn

II CJl- U ww

omxxcraa oai-aooa

II n + II «

« ->> -C 34

• en -< -• O (NJ >- O O II « w || ^ w - to

atfooini/i o «a

w — fvia ac~x

OQO»»QX ncoa s i + i i i i «->

II II II II II II 2 O

CM i"o rn -«« M • »•»•» II

<- •« CM (vi n i»)

ooaocoo « 3 S X £ Y I/)

Ü

X o

um «r\ • x

>MM JU • u z<

O II

0.3 a

2

Q a x x

H 11 3

* cv

tu o

«~ • or

MX H OliJ MOO»

OO

-»«ZI-t-K —1-0,<< <

u o ta. a: T: t a < u w 5 o o a; x a: u. LL u. u.1

« m oo

ooooooooooooooooooooooooooooooo -"(V'f'^'nMOS«P^o-<rvjn<r'O^N.cpfl,o — ^^«'^or^tr^o-« OOOOOOOOO-«-«—— — »<-« — "• — Mf\ifMCVJ(<'

,Jt\l\(\j(\('n'« cvjW(\lftiN(NiC\iC^c\ic\ir\jrg(\irvj(Vit\irvjc\jfij(\i;\ic\j<\i;\i(ViC\itvi(vic\i

O'

58

kMteiM ItMHUfflMfeBimMBM ifiMiiMinii

Page 68: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

——- ——^— ^PP! 1

.

i

OOOOOOOOOOOOOOOOOOOOCOOOOOOOOOOOOOOOOOOO

— -« — »•—-• — — — —MMW(V)OJ(\i(\|lMCVJ(Virr,»)»^'nT^'t»*5'0ll0#

ixixirxxnixiiiiixirrrxiiixirxxriiirxxxx O 15 O O (J O J O O ^ O U O O O O O (3 O ij .? 1.9 ^ U O (J o o o o o o u o u d o o ü o

i/^ ui i/i ^ in ^ /; (A vi «I '.fl (/) ui (/i (/) ^ u) i/: v/i t.v/i ^ .1 Ji co (fl;/) (/i </; !/i in (/} in i/i tn (/»i/i ^ w i/)

o

t- (fl >• M -<

LOW Q |M| - J oiKino «^ -LU H< LUCD w •> < ZH <

•-•DZUJ r^

augf» o

u u <

. .0

w» Q C?X x UJ«» u J> 3 Di/) X

u at- < vO • w *« oo y o< ♦ INO #% • ^ MM

>c -- — > AS» *» (/)l/J 00>2 «»n in or »«M w » • u a o ^ — -' o • w .^^ > aa r o si w «ri -.>wiTin j J

sa N j • o ^.o v- < o << arHJ — wyj ^ - l." _| 2 - TT UJ^OTK 2> — « "^ WUJ o • m • ÜÜUJS! 3 »fO * > »»UJ« aiuj

«^ l.^<iCM »^.w t«|l I/)»« • •>■ oo X < t- U O -o f) J < OÜJ«-»3 • » tu K^- <a "t*» ^ J - a uo - 3 << f- t» < H — ►- <r u • M ri ro r oa i.O < 1- 1- i- 10 t- > <»►-»'*'''> • • > z < (j a a a ~ J • O •>>'~ a a in 1- z-t < cna »n UJ — • -.(/) m B IX

UJ - 23. Li •»*»««' a m -*«oo^ co J o ir-iIQ — '^i'K > — J) W WW * • < y i O w • ro r. — _i • > -> • •> aa H4 < IU K a «-'<*'>- ■.'5 u J M w CO—>^i/) -i-j IM ^- VOO 3_l<^> UJ 'J >l5«%-»t5 << « UillK2 •üJU< < « - I/) <^ »^ «H N^^H 22 yj J o ouoa^UK • a -«13 • W W • Q DO 2 0 > u> t" IJJ>- I << > — • <* il —-* H 1-~ >- OV3 « — t- t-2>H,J»»»r' - « jj »omux Q • •

««, w ? f- M rv tf Q Mi *mt0*0*^ ^0— " j^XOUQ3 in N)M O« U 0 mii>tfi a.r"*'*)*! -in.i « • aaa« DXI* o 33

> «to 3 *■ IJ.*-HC) _J—wwU •"wrj < ^•»»»x**"* o £S K ^ C J u o«Ma«j<a.u • IJ w '.0 p <*» ^^ *^ ^» »^i^O in J-l i~>Z<Z L: ^J au z JJ_IX< *5 M C *• a ^'**C)(\IPN^«0 » LULL' Z t- C t ^ > > ^riLDuaaua«! — uooa0'-fvirr,ros(nas 0 >> m - - IL' liJ I cQJjn".3a> • • K Q 0 « • ;3WWW»,NW_J t t- • • •

»' U t- J > M I.U iij t~ K ü.; LiJ3 • • ttm*» joa«"-> D>>>>w><-. O QQ N KO -HLU— X _l 2 U UU>>- N*»-«»«^ .j T r, > ^ «r io in in to > in x • 13 aa in X Ji^U»- 1 -•- /uu.'O D^f^rww D mw D O 13 (J O i/) O • oor v 0 Ul 0 Ü «t KI <> > < ii.; u. £ —— ;.' "> ir N \ «J > w w. •* w w '„T w v o M M • a " > 0 < J U. 'J J «^ _i Jj^rT • to >- N in • »•••vftlO» O • »N J ifl u X :.u - - >-11- u UJ 'U in «r 1 UUJUJO • V- »NO J_|tf)< WMj vi-:: w-! . 'i.' ^l-ü.t-j>'rc'-> C J K - XOO * tJJUJ\2

> > > o u. > "s: w ij y ■»« v > a < < _) .3 <t UJ CMVUJ'iJDOQaO l|J •* ^ "^ J UJ 'X —' ■j u u i" 2 --k-U -N\Ü)X<<_J\3 ^ i_ w. K < i :• a x »- JC. t ">U 32^2 2 ^ auiz ini-a • '--J_J< w < < <<• u,,-» 5 < < jt- ouooooa \SS J- S-J>- - • »X II ^ J J JC<S':- Tt I» UJ >" CtlN*-"-''-'-- J 2 XT MCVJ

o u 'j-i y t~ a > it 'x 3 >< a. O 2 m IT. i/T tO r2Z< 2 D S h- H II a o t a ^ t s. K 1- X 32T2:Z jao> Q 2 K J r ii ii - ta4 II II II a 3t UJ Lü a.' UJ £^2- l<< 302a< aD it n it ii i- II i a 2; s i £S5.0 ZHI- «a# _I<'--J2 3 KU.! II i«r-oil OP*mmm Doaa a<<ijLOuja:< D io_j j<r. D-Y ii K jua uoü oa UUJ'D UQQ *-4 - a a i 'sT

U ^ U _j z < •— - u.' u a a UJ 4> ü5 u5 J ui ui ii3 ix e at tu < o it rv a><i >IL >a<rer3Ka: ^ < < < n

uuuuuuuu J u g u y

I

I

ooooooc'noooooooooooooooooooooooocooeoooo

-I

■ ■ -•'-""

Bflfeife|^^^Sg M»g.'iWittiliiBi»triwsai^WMiii^^ ninnüitiriiinKiiniiii ll*a^lii>a™^aiM^Wa'J^^*M"*Mai*a^^

Page 69: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

SWIPIfWMIHWWtWP» IW^WPJHPBilipp.lUPJII! rrrnxmrni wmmmm^^^^^^f^^^^mmmmmmmmmm

BESl AVAILABLE COPY oooooooooooooooooooooooooooooooooooooooo

ZZIZZXXZZZZZXZXXXXZXXXZZXZZZXXXIIXXIXZZX

10 tn w «n u) (fl w j/i w tfl in w ui u> i/> ifl w JO to irt ifl k/i </". IT, to tn ui v) to (/> ti i/51*! i^ in o ifl f/i to ifi

z o

?

r

I

■.

oo

mm

n

<

o a (VJ z Q

•-H JZ OOUJQ Ol.3>U

u. nroNUJ OODO • »XU

• •>-> cc o SS«i oa a •- —-»

u.u.a <

•a o o

a j

wer ii 3t

7> a<

aroa* <o* z J-.- '3 IX IJJ OQ

uu II o

n II II UJ

T #^ ^. *- IM

aouu

UJ 15 Z < or #

z Q Ü

- I

iz zo <u a*« # roo ■«ZO ION QU 'JNO •» MK -Z ILOC

»-luUlJ IO-' OU»" U«"

I - • * —TO

Cu -«xu • U. Ui N >» UJ I O'J CO • • u •-

II II II ä o

ZZ<- O'JSU. U U 3 M

Ii.

U. *

*o# -«o '-'C\i'">

UJ u >ou

13< +

r < i

o<y i5 OWUiZ

zor KC- ZKk- II - 2 SO JU.

o

•« — - • II J *<■•

— 'i; O "• -1« a j a u. a »rj:

m

c. ft

a

M %•» — O Q.in T » a

a- Q:

o + •

-_J — •

s * UJ

-z — a. a i

A U.

w —w «

— II O II — o S *~ «'■^C^* <C "« M« -4 a w w aj —»<'- G o a. u. i u. ^fc-a:

o o

a ä

u U! 0 — 3 5 in r T II is >- i-< <

W- H t- 2 Z«- Gcau. u u ,r «-• oo o-?

< '11

II 3 Z

X'>-

2Z <a

o

c UJ 3 II Z

Zt- om 'JO.

O m

to o a 0.1 K D

U.

UJ J M

u U.I -) a

a o z <

y o j ÜJ > * z o

in c 0.

IL'S: >ÜJ «-►-

Jin i'

3<

z<

-in i ****** <j< u UJ J UBÜJ <>>

# « #

• • •

** •** -^ ara a laww j JJ

UJUJUi

+ + +

- - O (J < ft S J

M il < < ai t • • k-h- >

wonc: -><><■

II II II II ii ii

0 ^ ^ Mk 0^% ^ M» *y

it? ^^ ** *^ V^ ^» N^ »^ Z < J '" ;■) ^ < •■*

;J « •■i < «V 2 J > r- ^ C. >- - > C 3 < X Q -« » < U

c o -.1

;

vu

OOOOOOOCOOOOOOOOOOOOOOOOOOOOOOO^OOOO^OOO

«•»<«■•*«««* '0 in :/> LT lOir fl'0 011^ >C'3 O C O 0 >0 O'O O N S ^ N I». ^ N ^ S V ^

60

^ * ^■•'-^'g—"^>^!' ä^m -—--^"^ittmumrintf -' m* mmmmtmmusiim tätmiillmmmmmämm

1 I I

M

Page 70: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

■»■Tir-'r1 IIW iipw^gw^^gr"» T^.r|twwM»WWl,!^!i;ifWIWl«ff.WPpilWPI mmmmtn

SI ÄVÄ11A8LE COPY

i

oooooocoooooooooooooooooooooooooocoooooo a3JO'D(OCO»a3I)X^O,^»a*'>OCrtTTlOOOOOOOOOO««"<««"<"*«'«",«««M

1XXIXIIXIIXIXIIIIIIXXIIIXXIIIXXIIXIIIIII

ir .: u* ii (fl ui (/? tn in a> w 7) (/) (/) yi in r- ^ (/i «■- ^ IT (/> ^ i/i i/i i/i i/i w in (fl 'JI w (/i in »n </} ift tn </)

UJ I

~ ^0 • ** «^ ro < <y ^ j j ar II! IU 'U > > J < < 3

lb' + -f ♦

a a < < z z s5 <J

in C

#

in a

n

Cy »»3 M wNI •

_)IU_| II J > UJ >< >"- II II II

•*■ i*^ *-* o — r-j "n ;-) ^ *m* «>w* l^

er ac K ^ ä 15 > >> _) < sr < ^1

#

*^ ^^

a w IT

> < II tu

U-Q

Nftl OLLO. O^-l-

►- *s *^

U. C«-"«' v- US O If

c & « — •* <r

I-H ->-< < — • + +

< ^a a I- u. li.

a

I I

O o

n a t- a o

II II C il II 2

c in m

i «w It OL 2 U> d. U> i. Q l- fc- 1- K- ' J

o o H'1

► N

U.U. u — K t- tc o ->

1 1 z<oc I < a o J ÜJ

*>^a' s »a • {VJ « \ Hg 1» >, -I «- w > c. O I • o c a. a c T • Li u • • u. u. "J l >- äL •.:> o o I -. 4 «- «

ll n t- t- h- 11 11 II II ? Li

x;>- 11 >-x

XllIi-ü«J.X

oo Nts.

OO • • O O O !jj

-3 il ll *>Z

in 1-1

330U

o o i i

OO *> QO 3D XX

I I

x> a a rr

n 11 u D

X>K Ü02 33a xxo

eg x>. K OCU-1 z 33S >* it«* »-

I- U I II ll 3 'J

M z z 2 m 00 &-*& X >■ Ü 3»- O J 00 Jl- ?►-J 3 3 O -J J W <

<

j J 3 a a z < UJ o z < ac IL o

3 o in

o

i ~. in • 11

in -»tu

• < - a M •

# a • 00

UU. LU • >■

UJ H OK zx <o

J M UJU.

> UJ HO

crintr m < «IUZ Kint-t-

u.» • x o

ZH a:< 35

U-'O «eu.

x x

Ht- << £2

U-U.

J3 10

17

IT in in

♦ —O O OO O OO

• OOOCOOOCOCOOOOO^OOOOOOOOOOOOOOOOOOOOOOOO -• M "0 •* 1.1 n N- r. ■• o -< "M *" •* n '0 v ^ T o — (M ^ ■» m -o N 151> a -«^l "o ■« in 0 ^ xi 9* o co ^ to ^ r » * a « fl> o» * jh* ^ j ^Äi * o o o o o o © o o o *••*■*■'•*•>•••••*•*' w

61

i iibi'' ■,atiÜ i .kj.. .JL,' !■, ^Mk it iiiiiiiiiriMnMi(ii«iir>Ma'-'1^j,','>-"'iB' ■• viMjiiB'iiiitiwiifti

Page 71: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

1 ,,r-i .:^",;..-,:;..-iv-i TTR'"'' »iiiiiiiittaMBffliiiiii^ttta^ rvTB^^|yy,^Mly«'lffwmilu.l^ll^■yiW..Wff.»lMW^^^^^^ wmm

oooo MCMOIM

zxzz b^ «rt «M »4

(/»in (/)(/)

BBUYA!! :DBf ki^xk

M •

10 »Mi ««OK

a N «■ • •

a • •

<< a: 0:0 ooz

• ILU.'JJ

-M

OOOO

BtSr AVAILABLE COPY

62

mm i^.d..^iM^>^Mai^^ mn

Page 72: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

WW^SWS^HTP'WIW1 BJBW»w»wf>j|m^<jpiBiijiiii.i.)ii|ii;i!p||!ii mwmMMVMRMMMMHMMMMM Ml

■■I -mm mmmm

mtmiimmmmmm

BESTAVAILABLE COP ooooocooocooooooooooooooooo

o^auoaajuooaaocjüoüjuocouooo i'a'vKa'aacraaa'trcaaaaranraaaaaatra caaaaa". aaaaaaa aaao, cnaaQtaaa

v 9 X

*

If) s «Vi \m if)

a u

a »

M I Q U

I vO ft

c

t r^ O

• • o • in N. — — *r NtO • -> » • O «O1

a -JT >.o a »r" S * • • n • S »«N

n cy * r^ # •

\ © »f • ■* O • ^J N. • P- (M - N S " • a i •

0.. < U N "I U.' * O V I > u is < a ci

- H X Vi Q Z

•ing « w ♦ U.CN u: U (J>

«■^ «^ o

ou • K <

•x "a -OC i_-X

0 2 1 x < =r < < < .^ 2. — I- »- r- — 3 >- * < -a <J < i/l o ü ü J -u o

- X

y^. ta« <

u< sa SON i »I

ii + + a 9 ^ " fj ■»

xr n ou •

<■ < IP « • ^-4 "^ £

o o a, a *• w

M II M II N o o

►< Cy ^ M C\J •

XI XX- VJU uu <t « «. < II « « O « 5: a i o a a o

-•

c CJ. w

♦ o u

-a

UI

az sa X I

<'• i — a«

x i u

<

US < • vir ft.»-

"0 <

Q

(/)

1/1 + ♦ w

ii «r <r

o o Ü u

II II II It

< < O'.cr •

uu- * » —

C O ii

cv

«

CM

tn-> zc ua ua si "IS

OIU uc

t-# I/) zo a u»

o I X

a OK • K

om# 0" < vO

art • t/iocr

M •nx<j- x < T fn o u II II II

-t\jfM-<Mii iion^a — z ao oo w i-xü.a Ta aasxoxz»-OHO D3C-1CQ3^00I-UUZ u 'j a J u u u > u u < < cr ;u

o 0Ü

OOOOOOOOOOTOOOOOOOOOOOOOCSOO — Wl-t noN. •«-"»O-<0Jf^<T,1>CN-T,frO-"(VJ'«^L0'0Ni

^-<-i — — -< — •- — ».*MM'\ir,i'VjfVIWM

63

^ . - ^ d M

liiiiWiiiil^ iT.f«^.^ ■ rt.imiiMiiiiiaMteilifliiftii.ii

Page 73: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

WPIWW^PWP^ N II II „ ■—— mmmmmmmm 1

BEST AVAILABLE COPY

i:

t

0000000000000000000000000300000000000000

otttaacceraaaacriiQraaaaccsas', a:trQ:aa:Q:aaa:»Kc.'aa.'c£iYaQr. tr QOQOOOOüOOÜCOCQOOQOCCQÜCJ'jOQOOQaOODCUCiOQO

J

Q Ui < Q -J • • »< <UJQ

• lua >LI JI

K •» • ZOLK

— (fl< •

I

iuo zt -a

C a J 53

• >

z D (J N

z o X % D U

o

o -

• O w

<>o zwo

oo S 03 WNS

Zt-H o<o

(/)!/)•-« sva

\ ZZ2 ooo SIS ill ooo

< z a J

-< a • • ^%

u«-> • >in

— too {MO — ♦ — •

UJ->Z "-• J< (J • •

uo-o Si* *^ **»

2 • •

Q:a< • •>

**** * ~* ^ **,

> >>

ooo

v

Z

O

J

> ÜJ

J

5« N

> o

«»^ o • z-^ a> • o

— o ■oz

>oo

o*- «-> >

^o ÜJ — X •

KX • o

— X w • >«~

Of^

in 19

• • •—

Z- Ol-

KUJ <IL J 30 SO MO

l-UJ ZO oz

WZ JO U ••(

l-<

^s Qr »-I

O 7 >DU DliJS DttUX. XiX< •31

OtflZ »>-<J — QO > in u. o o

j <

5; a (/)>-' -u QU*

■I

ft Q; — ' i

at a as

< I* a. J

HI 2 > MKUJ

U.J Q< Da< IUUJ

ai/i

nc a U.U.

oo z Ul OWQ O»-►"

x> 14 «CM O Q

X

'/)0 2 UJt-|D

2t-0

t-UÜ.

«lOIU OUJO

aw N

XUI

«4 >U.i J

JJ ,iJO< azcD <<

< uz

<«r rr

i o M

z i or u. *

VN a- < •

U « HI • I 10-')»' NujU KX UJ u.<tn

\ 2>-t- -QU.

o iL'tnz H IN <z T-Z

C

OU.1K >• ZK< H <<a i- or 5? 'n U J O U. £ UJ jt-o<u i It1 J w >iuuo<

u. >u Ü.i -< 2 J J2H<<

M uxior ^inu-a: o «*■•.!!« Z

in u y) '^ '.i ^* O »^ • *—

z o S<«J «z > x > a <

o o

i/) eg z ^ < u

3 X < UJ tua

u

«NO t-O

J^U J u in <2

U.UJI- O 0 "••

tri/i u. s-z -J-LU 0<Q 2 * UJ «

i/)X-< w(-

A

i« Q O J<I OK

o o o CM

ry

Ü I- o <

o o

N, « ou NO a • ox -IK

z

<Ü.

IJ U O U U U U lw' u u u u u

^1

ac'i o s x < + Qe■■

-«O «IN << •C'* ij O *•■<*.(«• <•

W S (/5 7 O «* I o ü o a,-, "^ "^ o

oof-« —s >• • t -«ii ii u — ii u o

c o 'I i n h- I II < ^ H G 'I

It U U (J 17 O II i H j i»/) / /)" i i'

< uj a c j —^ ^ i- i. y 'j J J »• X W i/5 iCCi:>'v

o

m o o ^j

u

OOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOCOOTOOOO

laiiiMimiiiiiMMiw

Page 74: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

WPP^SfP^wws^i

BESOVAMBLE COPY oooooooooooooooo - - - C O -t W "0 «IT * N 00 0« O

I

ooooooooooocoooooooooooooooo — c\in«ir>c"^,5r»o — r<l'

,o<f'jniCNDCTO"«<M(^'Cir>ONoo

«oca'xa.'ra'KaacaaaQr.aa'raaaar. atraor. cEctKaitaaaaaaaaaa oucaauoooocooQooaccQuoocQOoccocaooaocQoc

j

r

J5

S x ♦

♦ in

OJ J

3 03

«• U. i U U > >

s •- u

-. u J J >

UJ o

<

j 19 M

Si

I/) J >

Vt -1 > o

a. Q a: + >

UJ >

< _l UJ !f

o > <

-K If!

u. • > i z u >

in

I "

>

<

< a.

« u _i J

• zu

+ 'IJ or * a - 4 Z I

> OttJ ♦ a—i«j << (/>o > j<ijjy -3JJ \

ai-J Z J

Ji

t-Z X« o ■x UJ t/l>

IM

OH UJ< t-U) DUI az z om u< U.UJ O J

a in UJO -IZ o< z < <

a. "> z *

— «r Of •

> « 11 J I

+ C > I 1/-J

> > « U

~ >*

a x * w to n >. > II

(I II II > S LO n % o jou wl > > >

w « «

vf kO _J

<* _l I I

u • • > — -r

E a i ~ * ■■> _i-I'-

ll 'i ii n

i. < ii a.' '-■ _l -J _l > W J! U

U or

<T *

« <s

<u_j

<«o » J<JU

• i ♦ SI'

i >iij • I o

• - ^

II r II II

i/) II < J X _|vj OU

z

J u.

D

z> < <t jo: « > IO o +

a o^ o •N> a rx oc !> i

-o U. U. S O 'AJ1/5 CD> Of D < +« <> Jt-< ^» cj a > u. co (.■; u — cr ifl O

a o > a +* jrr--> ou >o StiJ iLa>o u. + us

<'5:x i >- QDoa Qx + H zw» ac* <jc»XQ:Kt- 'XOiTl '.!. UJ U IT S < O < < _l £ I J </) * •-' O Ü n ti w * j;/) > a - uj a: z '.5 o o < 3 < o i o c N z >j rD,^> cso-^r — yco ^<iu< — + +

• #a w!).iwa; • aw»o•* O + SJJ 2 x x i z * cr g - u o * uj ■» y uj uj UJ u.'

c ■*<v+ II a n-+'faa_ij — in IJJ n ♦*<<iw» <<

> f- • i." U. > UJ • U. > ^ w «< (J || II < •> >UJ-">aQ iriww JJUJU)

II z H no II s n II J j * s - II a n z II '• II II n n II II iu a.'

.n^*ZU.«t U U 00 OQZZ 'J CJOCUyJ<l-U.Q:XZOv,5QZ^->lU<<UJZZ<iJj r>M>>a>> or. >irü>a'arir<t.s»jjjj<<jj 5 a u. , au. a H "> < < <'- « 2 « _l_l

> u. uj Z'-'Oo >- > z> *

I « L.»< » S J I I- J

a<> «<& ü) v5 —i-u. J + j«tr x>-»uo > c■«■0a a

<u « u: 1 # a z»< oj rruj»-' 0 3<»au

o (.10' + UIJ — u;«o; <»-ur*# o 1 + 12 ^ UJ I

I ft a «xi

< 3 >a tui -JO UJU

o • zw <2

<OQ H X'-i<UJ QHCJJ

a<»«

n n

>

C-.C" «or i» a

uu u uu

0000 r< ^J "I

OO^IOOOOOOOCCOOOOOOOOOOOOOOOOOOOOOOOO 3iriON""'TO-<^,^'9,f10f»«iTO'-'VJf^'«l.ny0N'r'*O->'M'^«IC'iJ*»«0(?,O <r<i,'»<r'»>T * ift ifl (fl (ft Ifl fl ^,jlir>SvOOOCOvCvO>OwN-'vK>NMWNNNK.x3

65

jMI^^M mmfmvt'

Page 75: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

swTOwrpsTOjswBwirawwfp ^^~~^"J,, - ,i .1 •i.ii.jwipiM.iwwi u^ tnmmmmmmßmmmmmmmmmmmmimm I

BEST J:V:^BLE:COPY ooooooooooo - eg n ♦ m « MO » o- SDaoaonaoooaocoöD^T'

aaKaaaaaaai WWW 10 (««/)(/)(/) (/)(/)(/) OOQQOOOQOOO

kKiUi

z or I

ü. W <vi j a ♦ < o i « -.

O! I O N

It O u.> a» • K 2<üJO>- IJ t < j 7 w y>» » T • _( I U! j • it w»- ^> i J VZZH <

(I II IT <t UJ — I" I) fc J J II Z i"

D 07 St< . w x > > B l( O 3 « caao- J •* a ä i x £ i« j j i-a L. LU

ooooooooooo — (\»'»)«t'><0^aO!TO'"

66

ati^^aaaajtaäM^äay^

Page 76: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

"'"^ -••(»»«•■.-■■.~'.W<"-^I->I)II.IMIIIIIHJUBJ.IIIIJI.I.1.1PIH u IWIII I J .1111)111 IJIWMRP«^««^ "■^^

mum ooooooocor>oooooooooooooooooooooooooooooo

aaoaaa an, aaaaaaaaüaQCQ.aa(iaaaaao. aaaaaaaaa

UJ Ui U Ul it! UJ 0, uJ u.' U.' UJ UJ Uj UJ UÜ UJ UJ UJ liJ It' U) U.' 'JU IU llllll UJ UJ UJ '-il UJ It1 IU UJ UJ UJ UJ UJ UJ ijj

%# rt «M < j a *^ 3 3 "3 J UJ > Z J y-

«■* '»»- p > • -^ vO >")u") «1% K *^ ^^ *^ f\, • n Ul ** ^ »rt o w ^* ■Ml * >-- «^ J -JO •** *■» ♦ *«»■«# -.x o >- J ^O — >> ^ xz > u- > -* N IrtJ) X Ä-) Ul - J 'J J -t-K t *» • H» • J pm > >- • i • M

» -^> •mt u co »z * Mil A •^t- m X »-'*< |H II -> o -Ifl -"* *** wK- II T • n > • j » • • • -> • «« N^ H-^ Cl M «*» «M« ^^ • "»M

> •O z rf"» *•*■*.-* ^» ** H *

(/I ä «4 m «M -»«03 «IT "« • in )■ •Ow ^ ^ w>w If) • • IT- * «-D f) u. >10> • -IT + +

«^ XO *0 » Hs3W - 11 + ->-» C K 3 J ^-» • wK to it n-» *>*• <ta^ *-* * • > ^* *-« ^. • • ttT •*# J j • ^» ^k u #* ««f ^^^ > »äJ <<

'X) no pt --J ****** Z<**-< uu !\ «^ M «« w > ^>-- 5M »U «a

^ *^ < — * >u ~in w^ Z •"!» • • J 3_l *- a)cr — i- >< • T w » ^^ < 'JC ■v ;*> w <w«« VJ«— o « J- MM

>-<J t-z i » » J •»- • m- o -.J<« • • XT ** • • _i *^ *■* 3^ » ~ P-JI ^ o II <U • CMC! »- • c -^ «-^ ->z -o>— • w •-uaw ■»■-

z- ■onu" Q • -oe-w coo a-* -)4- o i** P w ^* rj-» > zi/wn 10 |_ K -^ . O « »T wl —« >nu. n wMin » •X w »»^ OO • • 1* • Ä w J-

— ♦ /(«• »*» w >w > — -^►-> —> oooom c <-«J < J IL' lft > >-~'« t- -»(,1 _l in >* c »w ><■ • » ry uj - •< u< r ai tn ^ 'f • < •^ i J ■> •- — -«o o"» <-«^»*^»o» .«u MU «? — ^•KfVlT » — u •^ ^ w. -< W K— O tO—»- o -» -«w>- KwM

«-• j • * ««»^^ #4 >s — • _l *)•*» • »(\J OO»C»»IIO» O w J w r •«- v># _l> r^ irtu« ■>>> <- OO • • »-"»OC xo OJ< • TX • Ü.»U >3 ^^ k- k- UUlO *wSV *■ «O ».© fl ?c v-<UX IX

Ol-V ifc < u: M Kt* ►- > C\J O U.KlJ *< O w M II I) y -i • S U « S II -> s IU fV ^ < .l-U ^* <^w wU--«SOZU.wQ X»0-> <-<•-) • -) 'Z * * 0 (.". z » • * t-^Ji • •<2> ■n.i'jJ • J • -> J •

VI) ,*.«ns>a< <<roo-.— » • • II J »J - »J |IM «* J • Nar5>-u.ij.»Tr • »jt^x .^ . • ■» •

9 to r < '".-JKO -)-)• S^l <■ row W 02 o z"» ii ii ii —w-k- n a: K -.U- T ÜU % - << jja z > OZQJZU 'JJ i i 5 h-»--.wXSi <<<—^. Z <-<<-< D" 0« •««ru.u.DD^oou'JuJciLSOwaaiuruj tia U'l a a *• •* o o a o o «• or a a »^ zairaa «-at

'.J u) .J 0 :.■) o 'O'J 0 O ui ^ 0 O

o — Ifl Ifl

OOOOOOOOOOOr<OO00CD00-)0OO00OOOOOOO000000O -<rv),rt*.')/)N-"nrT-3Mfvji>^^v,i-no^-«'*OMMM^i(ivoi^irfroMM»n<tifi'OMC9>c

MMM—XM^^. — M(M^i\|(\J^jf\iMCViM!\jn*OTrOpni*NmfO(»>W*

67

IK dttUiätfiäi iiiiiiiliiiiiMiiiliiiiiiiii'iliiiiii sKiÄaiäaaiäyaii

Page 77: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

-^ri^immmmwmm^mvmm PJIPWM „ ■.!, JUIIHiippilHlipillH,,

BESIAVAIUBLE COPY OOOOOOOOOQOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO «•(\)r»^lrtt0N00(J>O-»N'n<i/<>0N<C^O-<!M'"'einON(»yo —fNI^*in<0NflD^O

I

' X z

II

< o

n w • •»< »•

I --II ii II-»

» • — +

II

O o

c

< u

x — i*» I •

X II X

-» « ♦ -J • »til

- 2

>>

» • a« >> 7ZO XI- • »M JJ

II O

» • »» — (\i

JZ»-QZ <-«Z<- utroaitto « a o a: a o

c o >

ir

> I Z

• u c •

K rco II > •

n zo ■~ x -5_1 II ■«^ .J *^ you. io

-I c

+

o -J o > ,1

*» >

-< — 11 « -)+ IP

• «MO

♦ * •♦- ->

an-) o _i + « o-^o I

jo t-inww> o-n *-XH

I « H K H n w II n T

+ >'- o Ii n T«-»(/1

w II -. n rr, K > > w - II _IO(/)W V)Ht- OOH>t-<<>

n

n

>« Cflw

I 3

Q >zir II >fr • \ o

'~>Z N. OH W || W

> ft® lflX>/)Z K >< <

PC

< i 2

>

IT I M

-# D C

> V

t- — — W^O < + + >(- •

— —K c > O + "I"" ♦ • CM • • (I fcU II

^ "O in i j (*? » t-wv««Z • 1/1 —

o < a a c\j «r i/i > '"J OC » 2 •

ii H 11 *m < n c.

Z H '-> <->>a wO »- m n II

i| ■♦•

t-a»- ii ii > m — i/i >

aza.?3

II -> ->

S >> _5 Q a a

o — »a

i M

C a a

oo oo

o o - ft)

OO ITO fvjn

o

ooooooooooooooooooooooooosoooo-^oooc -'Mfn^invosad'^o—«v"o*,niOK-«3>o-\*,9i%.'>Noo'To — ^li,n<»l',• < * •♦ * * * ♦ ♦ *!".'/) i^ inn in 'ji'/!'.'' ^ 'C 'p o ■£> J 'C vo o a o N ^ N- ^ ^ N- '

"^noooomoooooooo ' " ' ■"'ONODTNO

68

K^ iU iteM ujKu^a MM ittüdu^ HM mam. iiL.lLi.i ,._.._. " _... _

Page 78: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

'■'^ri""~ fwwmimvw'iw* ^mmwwmmmmimmwmMmimmy-Wwwm^ * ^|| iiP|ipi^ll|iij|i|lLiBfMffff||pipi|ii|

BESrAVAll OCO00o00O0."5 0OO0OC000OCOOf>0OO000CO0O00000

aa-iara1?. co.aaaaaaaaa.as.aaQ.aQ.aiaaaaQ.aaaaaaaa

t-/.o ^ t'' t-"; ti •v'l ^ in </) ui in vfl (/j w in (/) i/i en in 0") in /»io in irt ^ </) i/) tfl wi ca in (fl w w u) w </) to ^1 U U > U U ill J UJ IJ «.L; U.1 'iJ UJ'UJ UJ UJ u.' u; UJ u txJ uI U.' UJ UJ ui 11) UJ UJ UJ 111 UJ IU UJ UJ 01 UJ UJ 111 u

> D

■r -> i

Ow 0 • • J M w

5 -'« cr KiS /i

K 0 T a- «-•(\l ^ o

o o

* 10 • • o t

*

« • » M '-'/ m c »< ->~) * # J K» • ••* ^^ -*»-«» *•* t-

Z >> pN O %# DJ .~x~ 3 '.9 > M" oi "on« o J «■» #9» • M

♦ * >rn!V- «^ 3 w » w A

1 < < < < n

1 ^

<m i/) u K-#K >*• -J tVi «a-a: J J o • 1 + » • o J > o z ~~ 0 ^v *^ -* o > »- a1

w -l»l (M ^ *^ t (\j «-4 ^4 ^ da irt > • • ^ ^> ^-1-^ t* m • f£ V3 in D

-) "> **■ ^^ • • . r tn rj a a • • K H ^- ** •n "i r" -»"» h-<- —W^K- •H • HI o

^> > c- •w "n rn «^ «M« tf > > > K 11 U 'D l? *«fc «^ ^ • 33 o X voir >> • 332liJD -) a j 1' • are

— H K j) k- ♦ 4 33- -> H K •- or 'J jt • a — > > •■"» II « « » | NN «- H v% tri c J j- mzz M -)^^. 1,-1 • i«^ »^ Ff • - i —-. 1» z- z in NZS * ■^ -1 * T OC • « * -) •M «M»- ^^ I • • "*■ c » •> •

-_l w w ** —. ^> > t ■ #- w » ^ -. :vi o o *^ --* --> -> -->-i «^ l»l" i * ♦ < O^ZZZOO > -? ^^ 07 ««»•>«

♦ > < < inn w 7<«r II < < - w <-<< inn ii w 'i r z iij J o > 7 # < < «r ■<j ir h-> >-i/n- t i iftt- J o + Z <<

— l- •*■ ♦ < •< A' t-t- -> D «r a' < K t- r. ->c -) - • -iUU •«1 *- < ^ II II II - <t J j n z Kh« «er • II cm IT %^ w s a «^ «^ rr II n • t >* *^ >(J J c c *>'? .It M < riT »» — — il ^^ > > or • n II w*» • • < <X,T ►-« < ■^ o O —m;v - >>t- n o w u: oio'x1 osiroo ijj a fn ■ j a 11 !/ ^- ;/iu .^ * * • l/j «»MAW iy w- >0>- J > > 3 in > o -.--. j Ü • ll II ^-mj-MiHi-ii Q «l/JX rri rr, -9 H z *->->z i ~> II ii II II f-' n ll M ***'***<** <www2 2 J *- •- 1- »^ 3 2 11 <«• w w

V ^ to k> >>> < <£< O 0 ^- K t-X J JH II > o in > z >,' a < < < 3D2 wO^Dw«j > wZ -z >wj/ >>z

D> r ::<<<< ,j«««to»*Hh'Wu;yiuu.u.oowau.o □ U.3CZU.- ouuo 5 "- « « '- t-- ^TV a a K » «l-l-Ki-'-KO^-ü'-ilJO — U ',•> z « ^ o - a: »j

0 ■r. o o o o •» -« 9 iT fi ■o N o o r. —^ ri

n *) -r> •» Hi

:

mocoo-^coonooooooooooooooooooncDsooooooo

69

r*———- -— '

Page 79: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

mmmumm^"' "•" ^ -'"~"r' TW'wyi'.üw^tiBeyw^-Ti!.1 ■-■»■»■■■.Tu.) IIIIUIIIIII!,»,.,II.:.)...I u ,I.II.H.I»H nnnjiiw.iupjwwumpppmBpi)!; -iwr5B mmmmmm

^

BESrAVAILABLI oooooooooooooooooooooooooooooooooooooooo

aaaaQ.aaaaaaaaaaa.aaa.aaaac.ac.aaa a aaaaiac aaQ- UWUUUÜUUU(JUUWUUUUUUUUVUUUUUUUUUU*JU<JUUUUU

tu u) UJ UJ IU u UJ u UJ ai UJ UJ 'JJ UJ UJ UJ UJ UJ ^ u. UJ .u UJ ai UJ ij u.« u.) tu ui IL' iij .J u: UJ UJ u: ui til UJ

o

□ a • o-

ii — ^

>

u.

--> it • -»■-'

>

-i o •» o w • u. &** Jt- o»*- >oo II o • « u «w no u.

N -> it it ti ►- «

> *^t ^.

O— V) »- •-

««ou.Qu.au.

N

O ifi i o 3> IT)

9 n IT • O CVI m

1*1 •

II ~ ■S)

a • oc

<- o

Ü /> NJ m •

•DO »w <o

II N II »-C

a »-

K J

n

a u

+

• o - j II o -^>

o

n

O J u >

o 15

*» on --» *-«

inu. OD it o no«

tro — !l «U) •%

-» It w O w > N >oo in

a a.o

o oo O •« o o o

ip in ir IT IT

— _l •ItOO

+ • t lv'

Q 7 JH » CD HU.O.

HO tl z

It - K

U. JU.

oc

(TIP

> nio »•-

I--U. J a it«

# ->« H f J !\iO otn a

•ü n if) it i/>

•»a i* —

ua<o

in

J1

J Q V

"I +

o J Q > in

t n n •A »

<

I tl > 11

IA '»'» -!►« -^n ""

It. «.•.

«* < «• IT I/) N II OU II II m in

■» TO «^ ^ ^^

O * O K t-

omoui

'n in in m

UJ a:

c J c

«r a it

cu. »-N —

Ö « • - ->

- - -« It V w M -)*•

OU. w -1 • I LL w

O — C >

it u. ►- ** n ii » -a

»■««, It wU'i — sr a. — w || u. • U. UJ II ->

a, « * j ^ — i. Ü' £-• I»

.) 'i

ooooooooooooooooeooooooooooooooooyooooo •>'Mn«in«N(f(jvo»-r\4»<unoN<r'*o-«vi*,*,n<oN«9io»«Mnci',^Nfo^o cv) w <v N (M (\i N ftj e\)^ n « w n n n n n "^ « ^ ♦***«■*•♦♦ in ■»'I!«;n in P o o'/)'« o

70

—- -— ■-"■"■■"■■' ■"■"-"■-•" ■ —

iimiMwn«^iiiiiirnr--Ti ■ iniiiiiiMMiiii imtmMßtlttkMimw'in» li ■-■--■J»^-/.V.^.. ..■.. ■

Page 80: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

^»iiiMiiiwipwp^illWWPSipM mmmmmmmmmm* npwwip»W"Sf"WPSBP"i!f!Pi»»"P' mmmmmmmmi

JI.ÄBIE COI mf

ooooooooooooooooc-coooooooooooooooooooooo «M^tin ON. ■oi'T>r<^fvi',"^^ON-cp(3,o-*wn«,fi\0*-XO^O",M',i*ir^KODO,0 ocvO»OM)snoo«o!k-NNNNr.h.NN.N.i3Ar(Doo!c*a3ooa.'^cT>o>o><y>ö'9>0(0>9>o

a(iaaaac.aa.aaaaaaciiaaatiaaac.aaaaaaaaaaaaaaa i/i v" ■«y? (/i IT IT 1.0 to tn i/: '.o in in ui 1,1 o er in (T ui tn tn v) ^i i/nn (fl tfl u> ^ irt w Wirt w tflifl w IT ii. ijju1 tuu' u'. 'i.UJtu iguju.«LjUJu.1 iru) 'UUJu. iuuiuitu(i!inaiuiu.>UJUJUJu.' uiuuUJ tuUJUJ

I .

O »» ^ r^ «^ ««U rn » • M *-• » • '■», -^ » • rn^. w »n

n ii w > > w — >D_)> > x - 31-»- r. DJ »-♦\«" K O S S ^ ^ » * 3 -~ W •- ^ •^ ** O *< ^ • ÖJ ''^ — • ^. r. • — * *M ^ i-ri ^^ ^« »^ ijr

«-cr >z>^>C!^— >ucO*~ >- Z: • — ►- 3 t« t» I I ta. O « t f- • • *

I i- ii n |i ii n it « c C J £ -1 t •^»•^*^—«^^.^^tf^

-< i "1 ^j i"! CVi "I "v> * ;. j 3 > •«• •«

II c "o rg -< - ^ -^ II II

X a u »

a-» ITw »> "Ol-

u. u.

"5 + - c -I

J -H ^- t- i- I- I- i- it U Ül

>I

Hin

c. -> . W[ U w

• ■<< >

: II fvj>- *J • i

-> . — it ■ >

i^t- ■" tfl •

i it -t

. s >

.333 3 0 >-

>

3C

'I O

x

i —< -* tt a c< >

I X »5

><

v

> <

> 3

2 <

I • ^*

>> • <

>

<

o n

N.

II

• it.

w l| >

>

M II

< > <

Zi- <,J a. •

II Z <

X

<->

< z xo II I/)

X II i •>> <<

•%• >-> < 3

II H- •

J • >

< xc S- ll

< —

<-Q4

13

>0

II

IP N.O TCV.O • ^ •

« «r II II

I*)

liJ •

Ifl

evix • M

Ort

(JJ w • N m- M — m -♦ • XCM

«UJ CI w # • sin

UJ • w|i. NC-*0

«k «I Q Ma ujao. • •-♦ • «^

O »IT • • i- ^ « ■* • Uj*« w ix • N •■* •« • N »N*

w ». O • X »X £

\0 •"* »0 •"» ^ < < -.

Ä II 2 *» '-lOZKHHh-t- a - «Ha:<<<<< 3 «• -Z3XXZii t- > >>-i-ar£ra?r TO aj3i/)3inQ:i!j3oaoa2 ^Q'-^Kafrii.u.itu.u.ij

ifl

Ifl

3 O

o

o — - w IT

0 0 000 0-5003000000000000000000000000000000 — <\jf0^in.0^r0'*O-<'V0-*in»0^cn7>O--(\lf«.ti0\0Nt>fsO-<M'rl*'/>v0N'0^"* vCvOJOP-cco^'f^^N-^NN'>>N^'^ti-i;'30"!)ooco*>et)aT5,9i<Tio(Oi^o»9'C7io

71

-"—- »tiJ^iÄ?öfevy ;^_:.^^_.'■

Page 81: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

»|i^WTTW^W^W..i.lf^^

BEST AVAILABLE COPY oooooo •« «M •n «10 o

ooauoo zzz^zz >>>>>>

i m

in •

en z# ori 3 I UJ •

«in X w

w O« ONOO (/) »IO* >»!») •

o «a o 3 "< II »HZ r- I 2 U a a j

3 </) IL «n IU z u. >•"•> rnu

oooooo — 'V) "^ «■ |/> 'J

72

iir nuiiMBfcMnMi hm r MMIIIIIMMIT I ^MMMnäi^^il^l l^i ^^li V 1

Page 82: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

^^»..,,1,151^1^1«»^»*.^^ ^mmmtm^m^^^^^mm mmrnrn

AVäIUBIE: ' OOOOOOC0030000000000

<<<<<<<<<<<<<<<<<<<< lLU.U.u.U.U.U.U.U.U.lLU.Il.U.U.U.Ii.U.U.U.

o •

X >:

-^ u. iMtl » PO I

»^ • Z ~(Vi # aj« 1 •u <

0b ON • ^ -<x £ ** IÜ- z X C3 N- • 2. O Xw s U. — ON -r • — m 9

*» 0 w • I -»n ^ Nf\J •

— o tVi- £ xi r •LJ > • 4 ON, » 5 • * 5 I- t- >'»N < $ t f IL ft. LL

(W W O ? X «f c i i^ - •1 ww . O < • < • u. • • C / J ""V • » J » J »jvo < < V O u. j 1 J j •lurvc- w b. XNO i j f L » ,iJ 0) • < r-j ►-

j 'W Q • — ii<a:<T:<«v VU. ;<: a • s. a o ••.'. J <r j < j < - • C -I J ^- x ^j >: _i • J • J • w^O EJ'J - '.1 z -> 3 II » N • (y , C\J >_ V- Z._l Z k*2 -i —4 b— w H - k- < < II rr. M «g w JJ «s; « 1. LJ ZU ^Q ZS 2 Sj 3 2 ä f- t- ~ > < -^ < -<«Sa2t-_JZI-J 3 w « < IL J >L [V tu tUiitOO* W< < W Z U-OQÜ"--! T * IT aa-au-LLiLiuu-zu

o o

-H 'VJ -<

oooooooooooooooooooo — M T <t '0 J5 N n C O -< % "0 •» il O N. iTi f* 3

73

WlKWiltfPi'WIWWl mmmmmmmmmmMmmmmm^mm»

Page 83: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

w^mmmmmßim Mll|pijBi|WP^WJI»i|iW.:»f)HJ)'Jlll»tl,iiW» —• ■■"IW"«"«" IV

BESliVMLE COPY

oooooeooooooooooooooooooo

oouooouoauuoooooQoooaoaoo zzzzz^zzzz^7?zzzzzzzz^^z^ <<<<<<<<<<<<<<<<<<<<<<<<< U.ILU.U.U.U.U.U.tLU.U.U.U.U.U.ULU.ILU.U.U.U.U.U.11.

i

i

z o o

o o i

»- • -. •<^ z^ S JE'*) >< • • «P Z« • -«

•*«^N O OZI O XZV t << »OH U. X\CJ

ZZC. t zo «za •-•WZ "13 t-7 -> iJ\L'<< Z S (- I- «-

iLQUUt«

z z< <<rs < •< • J • JUIJ ujnu.1

J »J II »M »

*M ^ **

0,0 zo 3 uj .r u.

i Xt") <r x <a • < •►- j • J • tL'JU J (DUX 01 < JC < I J< J< pj .j

W »fj • K ""K •-

M 4 M *€? 2r W r UJ ana T

n *•«

(M" lUJ

ON ■UM 0)"" s-

o\

•-. • VN

»W t- CN IT (5 — « o a u' 6. ►-aON- »o • * J »JXS lü JU) «0« ÜUJX •<

J< J<'- • _J »<»«•>

ZüZ XX •- < «3M: a ü ir ^ o aa au.lL

IT Q • Z • o I • <t-

z*- • • Z X <z • » z< » *

< • • IZ

» •« SIC > •« • ti z>c < • • K I

(.5 ifl < o a »i H ct- »

K w w (T

• * v X O OOH 3u M Z J J II Z

ix ar U 3 J _l -J D >K J_J>I-U, « IW ? < « UJ Z u. ar u u u- o: j

o -N

OoOOOOOCOOO-SOOOOOfiOCOOOOO

74

^w — — r^iLakMtäMim.iuläiiUims^iimi^ä., i^it^,

Page 84: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

m — »I n

BESF mmn COPY OOOOOOOOCOOOOOOOOOOOOO

U.(J.U.U.U.U.Xii.XU.U.U.U.U.U.U>Xk.U.U.U.lL

K ! »

< < I*

i » I

< <

*5

1

> E r^ »t- * r »^ <-« •

U. 2 Z << r v (- S N

Z2ft 20 »S

^Ul 2 "1 K2 (_• 'iJ ■< <r 2 A t- ►-

o in

a

-> 2 < 2< i i<<

O »- •(- »^. »►- • • • J -J • J »J

(»• JÜ.'-JJJ JÜJJ'JJ

• - c < 'J- < a: < i *t

D II » 'M • fj • CVj • CNJ

ac2020202

u. S UJ * UJ 4 w a ui a!

•n ^« • ^w

• u ON — X Jj-

ON

«•> * seva

• u CN

U!Q

z

< Z

*o • «

>

2

<

nu. 5i < CO

^- ►- II 2 _l II 2 < < » y Z x a. 3 j 'x D

C O « U < 4 .j 2 LL u. i- r u H c ; j

MAJ o

oooooooooooooooooooooo — oy r »t :.n ..o K ■'• "^ o — (\i rr •» '/) vO ^ D ^ o — (M

75

IK ittttU ' ■' ',._.. ...: ..IWPWilPPPfS!», ■^.i-^M.^Mi^iiMai&titeaj^i.iiR.

Page 85: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

...——..-.■„„^,.,.,„....w-.,-^ 1 ' ü ■••» "i J.W" u in P ■■^■^^MHOTPnata*

BEST AVAlLABlt COPY

ooooooooooooooooooooo

JJJJJJJJJJJJJJJJJJJJJ

x u z •

X u. X z X < • X-« • X KZ 3« OX

u. w » mt ^ vex cz

JX

zz «a

o ou o — t

o OH t-D a is

o XO

■5

OZ cruj ax

• K H< o • xo u • z>

ooy

* ry « UJii.1

<M • • • ZK •

X

I 33 CG N

I —-"" *- «^ ^^ — X | I y I »-•-'

O < '»««•»-' o i «y x * — -»< u.

■•x i « w< x «r x z *-. — it a

a o II II II ►- - 2 M II II H. II II II ^ »- Q

Z> — U.U. UOU.U O 30) 2 (/5 o *■•'-"- B <t o o - J -• J <t o a < a c a : j

o o o o

O o

o o 9

OOOOOOOOOOOOTCJOOOOO'?'? — cM'«<tn>o^ln,To-«(\l'"*l^^c^■7;^o-

76

MW^

Page 86: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

:Smm!m^*mrf!mmmmm\w'm"m,m«tmmmmm!imt

BEST M ooooooooooooooooooooooooo

t\Jcv^c^J.•^JC^Jro^^l\r\l(^J^^\(CMcv<M(M^^J{M^J(\l^(^JpJ^<M

J-I-IJJJJJJJJJJJJJJJJJ-IJJJJ

I

*

• >- x li. •

>

X • 2X ■ ,r

X w <>■

>-u.o • »o

X — <t

H2C

o>c t "5

(NJ *^ *^ ^»

itX OPTC ~ C-O — _)V • _

<i- > ÜJ '-" < 7* *? • • — U > C K »- - x o o a O 7) ».-> • • a 2 r ii > i\j o

jj i. w X w || ||

x

Z X • o

m 2 M • I -« I

o

C 1.5

O

'■i J II I-

•-0

ü< r-, •

0 li. O O J •« •

HI* «

> > x X L. u. • • X X Z z # •

nx X s< <

~r)~ . »cc -N X X» | •«• «• • • ffl i- -< au. "> 1 'i a. >- 1 - + < -> «^w ^i

1 ->« «->< ~-<ty X»

Xi o->- i c — □ < 0 o o o w < >- a .'JlL ^> • •<> j -J z -2 O— tf ww II II1 H 0 J _J J 2 il l| II 1- II II 11 J x. _ji->-a J o < u <t D UTJ: u- < £JV< 11U zuoauJ

c c o p - M

o 0

o o

OOOCO0 0003000000000000000 — ^J',n-»ino^criCO-M'0<fin»0^T'7«O— AJf^^'n

77

I nijiaxM« -TiiiiiiiTttirir'^--'-"-"^^ Üftnuüiiiiiiiiiriti'""'• •w.

Page 87: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

«JWWjW^.'WWHWW '* ^w^t^Tm™ ™7

ilN.i.lJ.'«-

opoooooooeooooooooooooooooo

JJJJJJJJJJJJJJJJJJJJJJJJJJJ

» N > X u.

z »

<

X <

N 2 • S * x z N

X

N z

>

■NO ■<o

X-»

<

o o

o

xo 20 w t xi-

• 2N o>-

Z7 til 'A •— -u. a-

> w Z N ♦ < XO •

o NO Zf-

(WQ II K

i

OM o< M •

9 yty ij oor* JJ ooir lllltCVt**n »TTN • •")

NiO — O N-ZO»- >-> O t- U ZXw it h 11 •- -z ii 11 i| 1- x u u. Q 3 i. 0 J

o o o o

CJ>w

N M > > X X it. u. 9 •

> > z z • •

>• > < * • •

X X z z » •

X X < <

It 9> • ■~ N > >• -a- * • ■r

1 \ X K# M«^ •« * • ü W PM < JU. NN I 11 1. < 1 m +

1 *»»* ^^ ^ «-••-< hj c. u< •*t-'CUj « * '*.♦ wN 1 3COO« N € N « O ax < — J II J z

w w K it rr Z J>- J 3

II II II C J» J-t-3 u < y O at z

J< TJ M z u g a ir

O a D C ir 0 "n "Xf

000000000000000000000000000 -<Nn<r.nvO''>»500so-*ryr»«ir>eK;r(ro — (V'c^vON

78

u^^^^H^^c I^^M^Kaij« ^M^a^äiiiii,^

Page 88: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

- ' ' ~~ •P11 mm—

BEsnvAiiM corv

i

i

H es co i-i CM en X K f» > > >

CM CO r-i v"M »'i

•a- <» -e-

i-i es co fH M co X X X > > >. >.-e.<D.-3-O»QQ.»ft-»O*0ä

rH rg co i- X X X >

CM PO > > > ■e-os-^- a oaPn coS

..•

rrieMco«*irivor»ooaiOf-icMco^j-m iH r-< <H rH rH H

i ♦

* «

* * * * *

* «

« * * * « « «

* *

*

* ft ft ft ft ft ft ft ft ft ft ft ft ft ft ft ft ft ft ft ft ft ft ft ft ft

ft ft ft ft ft ft ft ft ft ft

o

o

0 o 1 I

aiu tu ot CD KM <0 (19 ft

• • • tOON

OOOo •f ♦♦♦ buiiJUiiit oooo oo*»o oooo oo-o

I

(^•«••••••••••OOft oooooeooouc) — ♦♦♦♦♦♦♦♦♦♦o o liiUlUJUJUIUJUJUJUIUJ* I oooo««*«Nineuj<uJ ONOOftNOncPOOZ'O OincOMNtfl^ONSNOO«

OOOKM0i«Nftftrr)r0O»-fn • t ««••••«• • »OiAGOO

O O S •«•••■•■••«# M (\J «« • • • • «. ftOO I

o + ♦ UJ !lJ o <0 O .4 o « ooo»*

O-x wno OOO OOO ♦ ♦ ♦ 1 1 + UJUJiJ UiUJUJ ftno RJMSW IftN- <eo<o •-Iflft am« ©«OffcOONfta

Hi

I oo

i

oo + ♦ Uilü ou oo oo

oooo

o ♦ UJ o o o

ooo

on I o UJ* truiiu ftOO «02 oo< • oa «• •

O- I « oo + I

UJ CO

IflNOW ^ir> • o • »UJ-f

•■•»oujy vOOZ «o< NO> • o

in • N

ii

m o o u ■f * 111 UJ m o a •* ft cv ftOO • • •

MO« I

• ft ft ft ft ft ft » * ♦ ft • ft ft * ft ft ft ft ft ft

oft • ft o*

ft ft ft i *

<Nft Oft

I * U« C» »ft ec« «ft • »

ftft

# ft « « * ft « ♦ *

o# • ♦ o* ♦ ft

»< o>*

«o-*

UJOONN Z I

a UJ-«(\l»^ft

a < j

oo

OONOO

OOOOOOZII o C I oooooot>a ^UJ uozry

UJ •-<'*> >tJDrn

tu

iflvCN ao^O—N^ftinO

HO ZK oar

♦ ♦ ♦ ft ft

o» • •

o« ft ft ft

ft or* u» Oft a» «ft a»

o< i

UJ) o o '0

ftOft i

79

'■itoi'^"i-i-

S2C -■■-■V-.5„T. ■.. .■-.-■— —

^^^'ffl^mMii^^^y^^^^ - - ......'.

Page 89: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

" ■ ■ m

1

ii^ppyiiiii. J|,,JlJJl|,^M^»p|J■»^l^lw■^^M'^ww^wll■l#ll^'^|^l|ppp^^^

BESLAVAILABLE COPY

mmim mmmmmm

ooeoeo ♦♦♦♦♦♦

UilUUJUiUJ

ono>«oiA

Ul

N«<**««<«MMOO oeooooooo ♦♦♦♦♦+♦♦♦ tUUJUJUJIiJUiUJUilU -»((»♦«♦N^WO« n>«ooo«<eNO »«(««-»♦cgN mtONmoioincM«

a o a

o a t ui

o

ON + o UJ* 01U5 o<ox NCOO

* *

«

«

« «

O — (M N n ♦ N •"• •< ftj 11 •"« «O fti Ifl •■• • I 1

MMNOxO oooooo ♦♦♦♦♦♦

mWfniTlTN

m?! ooooo ♦ Mil IUUIUJUJ UJ

9 ««(0^ N-

oooo I 4 I I

UJIUlJJUJ (\iO(\ivC

OCN\0

ow I o

UJ* CMIUUJ

«OZ

* •

I

p-N« ooo

I I I uj jja) (0 W CO nm«

• • •

I ♦ UJ* «♦ Ml«

oooo»» III*» www-» f f O » «ON » wm-. » i0«0<0 » * • • »

-•(Mincvi» I I I o»

I» UJ» o» »■»

m^Min» OOO»«» ♦ ♦ ♦ •» UiUilu«0» «vinin ♦ MNAi » «CON » «no » * • • »

NN(M<\J» I

i i

o onoi -oo • ♦ +

sin sin NO* *<0 • •

s

oooo ♦ ♦♦♦ UiUJUJUJ SN><C O^O^M

ON«*(\< • • • «

MtOCVI«* I (

I I I I

ftJOP--.C\J OOOOO ♦ ♦III UJ tLliJU UJ N N 0» (7> uT p« !♦)(*) IM |/) N*OOM »O<Vi<0«* • • • • •

N«Mino>

I I I I

OOOO till ujujuja;

OOSON 0>0>«M«VJ 0«U»*<0 • • • •

I I I

en i e tu* OUI^

<\(»-> •n

tp • i N

ii

ID a <

at

a it o

tlJk.< >uco

Ul J>

zr or UUi

o« I » tu» N»

N-O05» oocv« I I ♦ •« UJUJUlO» ^NO | * NNO » into« » ♦ O"0 » • • • » QOfO-N» I o»

I » UJ* w» «0*

--oo» OOOM* I I ♦ •* ujujajo* OlflM I * tnw* » •nsO— «

• • • * nN — if» I i ui»

a» a » — » a*

80

o

o

oo I I

auiu ONO» otNn am- UJ0>N

* » » »

» »

.>oo ♦ ♦♦ UJUIUJ r»i* o* rj»» oo n ^ moo

ooo ♦ ♦♦ UJUIUi in->o oo mo NNO

Of* — ooo ♦ ♦ + UJUIUI oac«o MN'fl

«<ON

oooo ♦ ♦♦ ♦ lüuJUJUj «rjaoM

»* <"«co *o

l

oo« ooo- ***o UJIJUI + NOOÜJ noon NCaNtfl *«o<no • • •«

NMNO«— OOOOOO ++++++ UiUIUJUIUIUJ x-iOCSiNO ifliraoiT no N-ftliOnM

ooo * I I UJUIUi

ooo *oa3

P<I>MO

CO oo 111 +

UUlUJU* "ICC o*

ir «cnN «*NC

Ä <\J «< iT» ■*-< I

o O^fM^NftifM (ViOOOOOO • ♦ * + ♦ ♦♦

N aJ U Ul UJ UJ UI

10 •« (M i/) ID CO <t »^i« 4f N"1

IfiOON «-W

— O M I I

ooo ♦ I I UlUJUi

omo O"0ir

-K — O I I I

— CM •<•" oooo I I I I

UJUUIIU -NOM 300—0 !/)-•■* PO

ill — — (\i ^0 CVJ — Z I I

uj-iMn^mto

< J Ul

NO — ifl i*i — o I I

I

ON I o

UJ + nui oo o» roN

— • o— in no i + I UU) <o SN — mNon NN I O • »UJ*

— ooui I I «»

WN NO • N

'Jl • -- t\) oo

I I UIU -oec NN M «o -citrii • «o

I*) —NI

UN >(J

u*

------ira

UL.

oo I I

<UUi %no oooo -NO i/)0ON

• • Ml I*

I I

oo

UiUJU) DON ziro <in« arm-

• • NN

N- oo

J^UJUJ

<N« ► «N

• • 10 — I

oo I I

*WUJ ZNfO <>oo

♦ o • • n- I I

o I

III f N iM to •

m —» o* I * UJ* o* o*

N»* ON« I •• UN* N * 0 * N * 0 * • * «N* 1 o*

I » UJ» *)» <0»

— N« om» ♦ •» uja>» N » * » « » - » • »

NN» o# I »

UJ» *» o»

-30» o<r» t •» ul- » n i » * » m » IP » * » 1 Ott

I » Ul» mm s»

NU»*

I •» ajm» « I » * » * » N »

* » oar» I UJ»

a » a» — » a»

liMli m-f ^~-*.^.--. * ,~**M**ämai uii *tum

Page 90: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

T iproaiwiHwi' »'■■"'I" -»""'""'""'' mi

I . *

lABit cory mmm^

ft

• * 1 i M

« • • • *

o nm — * e (\J-- # 1 000 « 1 000 ♦

m 1 1 1 « u III « o atu.'Ujuj • 0 1 raiojuj * « otn-N « <0 1 j«jin(Ti ♦

Komn * n ao'sif) ♦ # «♦->o « <M t roo«N * • jj->n<o » * UiiOO* *

(M • • • | in • * * • 1 (»»••irt-« « • — — n —«

0 1

» «

0* 1 *

UJ « UJ« « « Ot*

f5n#N(M(\JCWO-« —•«-<{\J--<* N • r>M#WM<NJ(V(0-«--N--« in* OOOOOOOOOOOOOOOO- «(^<S i 0000001000000000- n-no* ♦♦♦♦♦♦+♦+♦♦♦♦♦♦♦0 »OO« # ♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦o 00000» UJ HI Ul UJ liJ lü UJ U.1 Ul uj 11.1 UJ III UJ Ui U) ♦ III* i UJUJIiJUiUJtiJUJUJUJUJUIUJUilUUJUJ* ill** 9> ^ OO •« NC N « (\J O iCN 0> 4 OUI < UJUi Ul- i OiOn —— «.«(►©♦-OOfOO—OUJ<UJWUJ —• > — N#O(vorgN'10v0O(M00«o9'Xf\iN3« # o>N.iftf»j^'rn»9a}(M(Moo-#ONX4r«> « nCM-«W**0»^lf)N>NCVIM,»'OON«. * -ONM-iOff ««iflCOMflWCJinSNOU'XHD • ^♦OTO^^^NO^ftl^OOlftfl»- «nao « tA«oo>«««cocoN#N-OMAnn i«-« «

• ••••»•••••«••a tgO</)«OKN * *•••***••**•■•• •(0lA)tO(V« « N.—PJK^ (MOO "<l*>lrt «•<<>■«•"*•* t • • • i K-WN-WJOftintft*----- • • • • *

t 1 19« lOKtn* « 1 1 1 « a--M* 1 1 O * 1 o*

1 « t • UJ * UJ* s # ' ♦ •

N 0 t IM «* OCM r?) «■—< 1*) # ON n--f\j*

1 O OOOO # 1 0 00000* UJ* + -f-f • * UJ« ♦ + ♦ •« \0 W W liJ UJ U) M « OU UJUJUIUJ —# eo 00

2--fl0 # C0«OO0>(VJ «

ins # lAnzon- * Ifi (\J < •» (Vi 00 * tn- <«(M<D ♦ • •• QffVJ-O * • — rwtMo ♦

■rf • • • • « — * * * * * <NJN(VJ-«-«-« — OMCVJ — WO«*-" 1 •* (\J- -N * (Vt(M(M —— O —ONM-<\iO(ViO • - M —— (\j* cooootococOOOOC I 1 1 O * OOOOOOOOOOOOOOO | 1 1 O* ♦ ♦♦♦♦•f*+l 1 1 I + 1 | | « ♦♦♦♦♦♦++IIII+I* 1 * UJ UJ UJ 111 U,' til ID tti UJ U UJ UJ 111 It) UJ UJ • UJUJUJUJÜJUJUJUJUJUJUJUJUJÜJLJ

O» O NN 00 O C 00 — "lN P ^ <? 55 UJ*

os-oiroTcjio^noo^fj^ r* « l/>* ircwLiiroiSNooK — ftjor, »•• n # «cO'iTNoiy-- — ^n^own«— — «r« if»i/,)^N.cDc*\ccirno*»-<o(r r CM —— * N 0-♦ «0 n <o e 00 w 001ft ««M on M«MW<t* NtVJW^*«0-LOO<rN<NMniO (. 00a # Mnwr\j<on->oo«oco<o*ininio 000«« UJ + ill* * III**

eo-«-* — m — '"ocjincvj — ir"*-«*o '/»UJ «uiUJUJN i © — — oj n « n N n * —N N w—IT u « UJ UJ IU cr> ♦ 1 1 1 1 1 1 irwr-ow 1 « 1 1 1 1 1 1 ITCM TOD —n 1 *

n vO < ^ ^ — « n<o<<oooo « CM m x^ o* 'n # NnyOCM") « • w — N — # • (U MNN «

0 in • • • • « 0 «1 * • * * • 0'n'VJ*<MW|MfJ^-" — '^'"JO'-OfVI I M T« — —M # OTW * pgPiifM(V)o--N(yo(M w 1 c\i -«♦M# (V O O OO U ;-) O O O O O O O O O 1 1 O * noOuO00 300000000 MIO* • 4<f'f*'*'-*'4>-flll|^ll 1 # • + + + ♦♦♦ + +• 1 1 1*1 1 1 *

NUJUJUJUJUJUjUJUJUJUiUJUJUUJIJJ Ui « ^•UJUJUJUJUJUJUJUJUJUJUJUJUJUJUJ u* SflocaoN-<\) — (MX — oootvj 0 * nnoi^owj) —(yoooonoco w* N^CM7»(J"yino<\l'Ot«'CVJO»030M -1 # o*0'00>in>onin*-<oooaoNii 0* 00 J)lrt 1/110 3» N «100— COO« N* - n —{MOO # Nooinso-oao^sotooooiO'O (Vt —(M« « cjoo^ifvitvi^ — n^^NiifvoofH OOOO* i n—o<Mnninnn —00—««owaii 00O9* 0 1 1 1 * * • •*•* «o III**

ujiPOMao- — xin — nm^cMNinHa^iuuJLJ'* « Ljino>(vjcD —— «in-nnino»-«ka^ujujujir» z 1 11 1 1 1 1 uoz^m*1 * z 1 11 1 1 1 1 uozno>N 1 « M Hn-<<ea'K ♦ >- uj^<«n(>j # >- >u«in^* * »- >uOfyj*o #

UJ -in- « Ui «T>*n * 0 j> • • • * 0 j> * * * * ij — Mn^t no*- flTo — rvj^^in ---(r<* UJ —njn^iPONojTo —(xin^mo -w^or* ^ ------tsor 1 UJ r» in «.-—— — — artr UJ* a i-B a'j# a u-o a* < zar ai-* < ZI a* oJ uu

-o# j oa «* a 0* IJJ uu a*

81

AMtfMMMibfctfMitt ■^^m^dtoiaihi^'w^'''*ri

Page 91: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

'•I!!MI.J )l|IHiipilMIIWfl| 1«IPJIMUW»MUI>

1 ' ' wmmm^m^mimmw—i mmmmm^mm

. :

BBVWMIABU CO?1! ^1

o

o

oo I I

suttu on» ««IN so« tit«« • •

eooo ♦ ♦♦♦ UUtUJUl 9oNN 4) (M CD CO

••»»trt i • a •

I

oeo UibilU «Mft NiON MNN <0 9I» • • t

(Mm«

oooeo ♦ ♦ ♦♦♦ UJUJUJUJIU ««OK» ♦ ♦Ntft- (MMNCMN mnosMf) ♦ • • • •

i

(MM-«f) OOOO- ♦ ♦ 4- -fO lUUJlUUJ* ♦ noow #«OKON <OlA«rtlA(0

• • • »M

I <M

OO I I

<IIIUJ »-CO OOOfT MtO«

I I I

NMN<* oooo ♦ ♦♦♦ UJUiUJUJ nN«o NxCO« NOC« IOOCMCM • • • • OO-WCM

oco ♦ ♦ ♦ lUitllU

SCON • • t

«OfOftl I

oocoo ♦ III!

O^ffN M • t t • •

{M<M(\J-.<N III I

ON I O

UJ + NUi om «TO

• «

I N i

O w) *) « N (M CM (M «OOOOOOO •♦♦+♦+♦♦

(TiuuuaniiUiujiu

o o n «M •-■ so CM lftl/)~NO<0N -cvjooajcj —

ooooo ♦ till UJ lu lu UJ UJ oininaa)

"«•«NCOCO

Z I OXMM-oC

I I I

■x — — — a. < j tu

00 — ooo ♦ ♦ I UJUJUi N<\jin £ 00 f) — 0-^^J0',,) in —CM i o • • • U.I ♦

— ITMOU 1 i <on

fT« fV|N • —

in • o —>• | w ooo ♦ I I UJUUJ ^ »-I 00 *tnoti »* <o a a n ♦ • »o Nn —^-a

I uo ><J

UJ J>

aa UUJ

n- oo ♦ ♦

lUUJUJ V90 9 ?(MC0 «ceo a-IM

• • (VJfO

I

CM- CO

I I UlUUi Z-- «na ► o>«

CVi« • « ro-

OO I I

*UUJ z*ir> <-* CD (Men

«a • • <M- I I

« # * «

- * O « I *

Ui * « # <M * CO * N « • «

I O* I * tu«

N5» o*» I •• UJ-* CM I « CM • CM • Ifl * • #

-CM* I O*

I « UJ« o» — «

ON« o-* + •« U-» N # N ♦ CM » O *

« nCM« I O«

I « UJ« o« N#

OO» om» ♦ •« UJO» - I « a ♦ - » CM « • #

i o» i «

UJ« 90« -»

o«« om* ♦ •# UJ«« « « (M « CO ♦ 9 » • « -a« I UJ« i« a* -« 0.«

o

o

o I

OCO

am UJN

« « «

« « * « « « « « «

ooo ♦ ♦♦ •iJÜJUl inmN CM CO«

(MO«Oi • t • o>--

I

MAIN OOO ♦ ♦♦ UJIUUJ »O« CM-O «NO noo • • •

N(M«

CM-- ooo

mujui COOtO 93 —K «<oeo »Nr» t • •

«"n-n i

•< —.j ooo ♦ ♦♦ UJUJUI nN«

««CM o-- • • •

00 V«

CMCMCM--- oooooo ♦♦♦♦♦♦ a; UJ UJ UJ UJ Ul ««cvrnno 9 cnioncoo1

aoflon«Na «öN-tm««

— O «4 «M «4 «« O o o o o c ♦ * I I I I

UiUIUIUJUJ (0<D »OOO*

N —O ff "1 CM O ^ O » (T N iO «o r m o «

ÜI

CO-CM —-N

onn«cMCM(M mooouoo •♦+*♦♦♦

9* U.1 UJ UJ UJ UJ 111 «0(M««(M N 30 — (^C0 iO ro o — co «0 n (MCMOONn

CM —«CM CM CM. Ill I

— — n ooo

UJUIUJ -NO «CMO -Nin o«co t • t

mcMO i

a I

U)

m « N *

O- I OO ♦ I Ulli! «CO OCC- rOff O ON i • »UJ

— ">0 I o

<r

o o

eooo OOwO ons

CM '> — — M fM o o o o o o ♦ ♦ I I I I UJ dJ Ud UJ UJ UJ Nin —o JO "0 c n c •*»"« O CM« «O OCCM — PI m c — fo

UJN—CM 00»* CM T I

C 9 CM — « (71' I I I

UJ — cMn«^^^)^^ — M^

< J i

IT -- I oo I I

4JUJ sen 9« 11 OSO inorr • »o «-»-

'J UJ >

J. ♦ •no

CM 1 o o ♦ * UJUJUI CC'JN ozco ««CD

• • <M CM I

m CM o o 4 I UJ*<JU MZO OB«^ «>N - o

fVJ

M O I

CZO w«0 US« UJ -

8 I a sr lu

oo I I

UJUJ 0>(M CM- M«

• • -CM-»

I o« I «

111« — » ««

-mm« OOCM« I I •«

UJUJ CM« no I « «- » n» « «» « • • « -ncM« i I o«

I « UJ» -« o«

-OS« ooo« • ♦ •« UJUJ-« — N I » <0— « — oo » no « • • « nn —♦ I I o»

I « lu« «« — »

CMC«« O'J-» I ♦ •»

UJUJ —• CCM ♦ ncM » nn » N'j « • • « r^-fv»

i o» i » u» n» T»

— — c» o«jn» i i •» ujurn« «o^ » w"— » CM« » <*« » • • « -«or« I I UJ«

a« a« — ♦ o *

62

mm V********^**.^ - /<aiitiaa««-^(ajii|.f ■ •«■■MLJ

Page 92: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

■>—.^.j .^■.■.I.....I..H...WIII. mmmi" .»HM ■ .•mmiKr-^^^m^^^^^m^^^™ mmmm

BESFAVAIUBIE l

ooooooooooooo ♦ ♦♦♦•«•♦♦♦■•• + + ** ui 01 ui iu UJ tu 01 tj a; UJ UJ tu .1)

o o

MM« ooeni UJUJIU*

9tOON ONWCO

— N -• I i

o o c- o o o o o o o o c + + + ♦+ I ■► I I I I I tUUJILUJIiJUJLLIimjUJIiJUJ

i i i i i

ON I O lil* inuj NN -IT

oo • — O I (VJ oo I ♦

UJ1U ON Nlf,-« -.ff O W «ON I O • •UJ +

«O-OUJ I

o

-OOOOOOOOOOOC.O • ♦♦♦♦♦♦♦♦ I I I I I - UJ UJ 'ii it) UJUi UJ u !/JIJJ u u ai -NNlTNNOniflir) — OCN

oomn^NS — NITRON

NO • pa

to • mf4 N OO I I uw IT* on ii XIN "loan

a ü.' -«Mi to n <

— flf-a I I us

u >u

UJ J>

-<-----> or or »-o za. or Uli)

«

« «

mtmtmt # OOO ♦ Mt •

QfWUJÜJ * ONOO • aN-# « KtONV) « UJ«aM0 •

• • • ♦

o# I * ID«

o« --NO« O JOO« III»«

<UJUUJ —« S«<}^> « O^NN « •-cvj<oin ♦ (A«e09 «■

• • • « — — (ON«

o« I « UJ« o« n«

n-oo« OOO«« • ♦♦ •«

UJ UJ u UJ in « ■ J O « N | « ZtufC « <N-ir « c-o^ «

• « • * N^ON«

I I O« I «

UI « CO« X«

NN~<C« o c o o « III*«

^uiuuj'n« ZNO« I « <*oo- « >ooo «

"•.ION « • • • « "n*a 'VJ«

o« I «

UJ» N» n«

— — — n« OO ON« III««

^UJUJUJ-« ZN -O1 I « <-N« « CON«^ «

»n« « • • • « Nnina«

I UJ« ft« a« — « a«

: « « ♦ * « « « «

«rn^-Nw ooooo ♦ ♦ ♦ ♦♦ lU UJ UJ UJ UJ »«NCOO '»»^♦«in ♦ ONOOK omeo«« • • • • • -N-Or»

l

NN- ooo ♦ ♦ ♦ U1UJUJ «o« ooo» o<oeo ^NvO • • • IA99

I

--NON OOOOO ♦ ♦♦♦♦ UJUJUJUJUJ ONiO«9> inN^mto -N-ON

• * • t • «»MIAM

--« ooo + + + UJUiUJ -OO «NlA \0OO

• • • ♦ "1- t I

« « «

NNN OOO ■f ♦♦ UIUJUJ tnco- NX>0C — CON NGO CO • • •

eoNn

OO ♦ ♦ UJUI

• •

i

o o n W « N N N O O O O O •++♦♦♦

— UJ UJ U UJ U.' — •»-«OiT»'»

NN.»N<0 flONio —n ««OOiNOO

O-N OOO ♦ ♦ I UJUJUJ oinm Kmn ow in ofm • • •

N —« I

«■VN — OOO ♦ ♦•♦> UUUJ — Ifl "1

N»- 00tf>-

NN-NO OOOOO till*

UJUJUJUJUJ nNfJON NNWN« — »«^N — 9>0<0NN • • • • t

I I I I

--N-N OOOOO I I I I I

UJUJUJUJUJ O-NiO- x»o tootn N JO'C^O «<0«ON«

ajoo - — SON Z I I

N«N-iO I I

OO I oo + ♦ UJUJ ♦ m n«D- CONO ion i • »UJ N-O i

n N •

in --v OO I I UJUI «oo ON 11 «in o-a • »o -WH I o

UJ >

OOO I I I

a UJUJUJ 099- anom KNIA- UJ«ON

• • • — — « w#

» o« I »

UJ« in« o«

— —NNn« o eooto* ♦ lit*« liKUJUJUJO« OZ0>N<0 « NOinK« « NMKSO • K(/)inN9 • • • • • «

CD -9NN« o* I «

# «

n« N n-o«« o ooom« • ♦♦♦ •« UJUIUilUUI«« moo1«« 1 * «ßZ-NN « N<Ninin « ca: —o— « • • • • ♦

N N «tn N «

t

I o« I «

N n«

n NNO«« o ooon« ♦ ii**« UJ VUJUIUJ«« -ZON«I« ^«or-o « a>>.Nn- «

ti

Q UJ —N n«in>0N t> w a

j UJ

(?<o-«Mn«ino

!

»N- « • • • «

n»0NN« I o«

I « u« o« n«

— —ON« OOOO« II**«

(T ttUJIUUJ —* ozNont• ►'< — ««■ • UO —«^o « UJ —nN * > • • • •

n——a;« a UJ« So.«

a« a. -# u a«

83

(The reverse of this page is blank)

^SZ ittimfr^"»^*" 1

Page 93: UNCLASSIFIED AD NUMBER LIMITATION CHANGES · airframe and pilot, (2) target simulation, (3) sight systems, and (4) implementation of tasks 1, 2, and 3 into GAMES. Attacker Simulation

- ■"■ Y-- ——— 11 "

INITIAL DISTRIBUTION

AFATL/DLYD 12 ASD/YFA (F-15 SPO) HQ CSAF/RDQRM HQ USAF/SAGF Nav Air Test Cntr, SA-53A USAF TFWC/TEM AMSAA/DRXSY-J AFATL/DLDG DDC AUL (AUL-LSE-70-239) ASD/ENFEA TAWC/TRADOCLO AFATL/DLODL AFATL/DL HQ USAF/SAMI Ogden ALC/MMWM AFIS/INTA ASD/ENESS HQ TAC/DRA HQ USAFE/DOQ HQ PACAF/DOO AFATL/DLODR TAG/INA ASD/XRP US Army TRADOC Sys Analy Act/

ATAA-SL (Tech Lib) COMIPAC/I-232 NWC/Code 40704

'

85 (The reverse of this page Is blank)

tdUUfiOMMII^i ^^Lk IrM^MtMUtt