Automatic Low-Visibility Trajectory Optimization for Visually Identifying a Suspected Aircraft

Leonard Wholey, Leena Singh
2005 AIAA Guidance, Navigation, and Control Conference and Exhibit   unpublished
Public reporting burden tor this collection Ot intormation is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information
more » ... Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188), Washington. DC 20503. D~~~~• MTr, ETE 0 M Approved for Publjic Release, In Accordance With AFI 35-2O5IAFIT Sup 1 A'~ rov' fo ulcRlae Distribution Unlimited 13. ABSTRACT (Maximum 200 words) 14. SUBJECT TERMS 15. NUMBER OF PAGES 16 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. This paper describes two methods used for producing trajectories, which enable an interceptor aircraft to perform a visual identification on a suspected aircraft. A trajectory typically used by fighter pilots is referred to as a beam intercept. The main goal for the maneuver is to put the interceptor in a relative position and heading with respect to the target such that it is in the best configuration to view the target aircraft's markings. Optimal trajectories complete this maneuver in minimum time and avoid detection. The first approach is formulated as a mixed integer linear programming problem which can be solved in real time. The linear cost function and constraints are adjusted to enable the interceptor to avoid radar detection. However, there are limitations to the accuracy of a radar detection model formed with only linear equations, which might justify using a nonlinear programming formulation. With this approach the interceptor's radar cross section and range between the suspected aircraft and interceptor can be incorporated into the problem formulation.
doi:10.2514/6.2005-6096 fatcat:xdh2hzypnne2zfk4ftm4tvk5qu