代写范文

留学资讯

写作技巧

论文代写专题

服务承诺

资金托管
原创保证
实力保障
24小时客服
使命必达

51Due提供Essay,Paper,Report,Assignment等学科作业的代写与辅导,同时涵盖Personal Statement,转学申请等留学文书代写。

51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标

私人订制你的未来职场 世界名企,高端行业岗位等 在新的起点上实现更高水平的发展

积累工作经验
多元化文化交流
专业实操技能
建立人际资源圈

Uninhabited_Aerial_Vehicles

2013-11-13 来源: 类别: 更多范文

Uninhabited Aerial Vehicles (UAV – The Eyes of the Sky) Abstract The aim of this paper is to explore the possibilities of the implementation of UAV for a military operation in the future. With the introduction of the UAVs, it shows great promises, but the full range of capabilities is largely unknown. . However, will it enables the military forces to use air power more efficiently, in terms of lower cost and with less risk to the humans who pilot the aircraft' Introduction The UAV is a remotely piloted vehicle that is capable of both remote reconnaissance and combat roles. UAVs are able to perform mission classified as the dull, the dirty, and the dangerous, without threat to the pilot’s life. (Hall, 2003) UAVs began the used as early as 1964. Refer to Annex A for a brief history of UAV. UAVs have evolved since then to become a tool for intelligence operations. In the aftermath of 911, UAVs were loaded with assault weapons and obtained a hunter-killer capability. The technology and cost of developing UAVs and their payloads have been increasing steadily. For example, the cost of a Global Hawk with its payload has been estimated to be about US50 million. (Peck, 2003) The proliferation of UAVs in combat has resulted in the development of threat directly towards UAVs, primarily to disable reconnaissance efforts. In order to prevent the loss of increasing expensive UAVs, methods to mitigate these threats have been developed, thereby improving the survivability in combat. Specifically, the measures stem from threat suppression, detection avoidance, engagement avoidance, threat or hit avoidance, and finally threat or hit tolerance. (Hall, 2003) An exemplary operation environment for UAV missions is air superiority, one where the enemy air defences have been suppressed or destroyed to inoperable. If this is not possible, UAVs low observable characteristics, incorporating stealth and acoustic technology as well as good flying tactics will be needed in hostile environments. (Anon, 1995) If ultimately fired upon, the UAV should incorporate measures to evade the threat, and if hit, should be able to tolerate to a certain degree of damage prior returning to base. Characteristics of UAV a. Low Observability (1) Reduce Radar Signature A lot of research has been done by arms manufactures such as Lockheed Martin and Boeing into low observable (stealth) technology for aircraft such as the SR-71 Blackbird, B-2 Spirit, F-117 Nighthawk, and F-22 Raptor and apply them to UAVs. To reduce the radar signature, radar waves are generally either scattered in a linear fashion or absorbed (Haisty, 2000). Alignment of all hard edges such that the maximum radar return from all of the point in the same few directions results in relatively large but few signature spikes which are difficult to detect and track. (Haisty, 2000) The surfaces are smoothly blended to allow electrical currents flow without interruption, as a break will cause energy to be reflected to the radar. In addition, all control surfaces must be aligned with the wing edges. (Haisty, 2000) (2) Material UAV’s conductive surfaces are coated with metallic paint, so that the radar will not penetrate and reflect off the internal equipment such as payload. These measures will create a controlled, known outer surface for the LO designer to work on. (Haisty, 2000) Selective use of Radar Absorbing Material (RAM) and Radar Absorbing Structure (RAS) also minimise weight gain while optimising the signature. (Haisty, 2000) (3) Radar Technology UAV uses a bandpass resonant radome with a low radar significantly reduces signature. (Haisty, 2000) With the advancement in technology, Active Electronically Scanned Arrays (AESAs) which is very difficult to detect over background noise are now smaller in size and lighter, thus suitable for implementation into UAVs. (Richardson, 2007) AESAs can also be used as a Radar Warning Receiver (RWR), and Jammer, expanding the functions of a single component. RWR allows detection of missile lock, improving the situational awareness of the UAV pilot and allowing for avoidance measures to be taken. Reduce Engine Signature The engine is the main contributor to radar signature; follow by the variable geometry control surfaces. In order to reduce the signature, line-of-sight blockage is achieved through hiding the engine behind a long inlet duct and by aligning with the wing leading edge. (Haisty, 2000) To reduce the overall IR signature produced by the engine exhaust, the exhaust should be hidden from the ground by releasing it over the wing. Coolants such as fuel can be used to cool the exhaust and therefore, reducing the heat signature. (Day, n.d.) Alternatively, to reduce the IR and acoustic signature of the UAV is to practice engine shut down during critical phases of surveillance. (Franchi, 2007) This will allow onboard acoustic sensors to function more efficiently as well. (Robinson, 2009) b. Reduce Engine and Propeller Acoustics Acoustics of the engine and propellers can be reduced through the use of advance technology. By means of using conventional straight blade propellers comprising more than 2 blades designs, will reduce noise while maintaining high efficiency. (Miller, 2001) c. Flying Tactics UAVs must be able to fly above SAM coverage, thus allowing it to remain safe while loitering over hostile areas. However, tactical UAVs need to fly at lower altitudes to engage the enemy. (Colon, 2005) Rapid ingress and egress are advocated to minimise exposure to threat. (Defence Science Board, 2004) A high-speed UAV demonstrator developed by EADS called CARAPAS (CApacité drone RAPide AntileurreS) in respond to these requirements. (Anon, 2001) In additional, use of computer intelligence to make UAV performance unpredictable, like manned system, so it will be able to evade threats and present itself as a more difficult target against the enemy. (Colon, 2005) d. Threat Evasion To avoid enemy detection is not always possible; therefore, some measures should be taken to allow UAV the possibility to avoid engagement and prevention of losses at the expense of the much needed battlefield intelligence. (4) Improve Rigidity and Strength of the Airframe In order to improve the manoeuvrability of UAVs, the rigidity of the airframe must be improved. (Colon, 2005) Acoustic sensors can be incorporate to detect and locate ground-based gunfire, allowing it a chance to change its course to avoid the threat. (Franchi, 2007) However, these improvements come at the cost of increase weight. (5) Calling for Support and UAV Intelligence With advancement in technology, UAVs can become more intelligence and unpredictable, (Colon, 2007) through changing of flight profiles which will make UAVs harder to hit. (Tice, 1991) UAVs can fulfil its reconnaissance role, while leaving the SEAD missions to other air assets. In additional, semi-autonomous control and dynamic mission allow UAVs to adapt to threats as they develop, and reduce the response time. (6) Enhance Platform and Sensor Capabilities for All-weather, All-day operations The use of multi-spectral sensor payloads will accord the UAV all-weather, day-night capability. (Tice, 2001) This allows the UAVs to take advantage of the poor weather and light to evade enemy sensors. (7) Self-Protection Equipment Jammers, countermeasures for IR and RF threats are heavy and expensive, but it can be incorporate into larger UAVs such as Global Hawk and Predator. (Franchi, 2004) Lightweight UAV-based jammer weighing only 20 kg has been developed. (Anon, 2007) As technology improves, the self-protection equipment will become smaller and lighter. (8) Protection from Electronic Warfare Encrypting datalinks will deny the enemy the ability to locate the UAV ground stations through electronic surveillance. (Franchi, 2007) As enemy become more sophisticated, they may develop systems to hack even encrypted data feeds. Hence, it is vital to use strong encryption techniques to prevent enemy hacking. e. Withstanding Being Hit While catastrophic hit would result in the destruction of almost any aircraft, a UAV that has less severe damage may be able to return to base and be recovered. Redundant systems add more weight to the UAV, and are costly to implement. However, improvements such as twin engines and critical system redundancy are recommended. (Colon, 2005) UAV’s Demand in Asia-Pacific With the above characteristics being taken care of by manufactures, and the growth in the region over the past decade had exploded. Hence, potentially, the Asia-Pacific region has become one of the largest unmanned aerial vehicle (UAV) markets in the world. (Defence review Aisa, 2009) With defence modernisation in the Asia-Pacific area, the demand in UAV acquisitions and development increases. Many armed forces in the region underwent massive upgrades and technological enhancements for UAV. After the successful employment of the Battlefield UAVs at Yom Kippur War in 1973 by the Israeli, sparked the boom in using of UAVs for military purposes. For example, the operational advantages of using UAVs for the national defence and security – including surveillance, maritime operations and reconnaissance missions.  The Republic of Singapore Air Forces (RSAF) was amongst the first to operate UAVs for military purposes in the region with the procurement of the Tadiran Mastiff system in the 1980s; the early reconnaissance UAV, the IAI Scout, and then the IAI Searcher.  With the introducing of the 3rd Generation SAF, saw the inauguration of the UC; the first in the region to set up such a dedicated UAV command within its armed forces. The role of the UC includes capability and expertise development, as well as vocational development for its personnel and operators of the UAV systems for the SAF. (Defence review Aisa, 2009)  With the dedicated UC set up, Singapore might become an UAV production centre in the region taking advantage of the blossoming UAV market. Many countries in the region, including China and South Korea are working towards similar goals of developing UAVs due to the relatively low levels of technologies required to begin developing UAVs. India is expected to be the largest operator of UAVs in the Asia-Pacific region along with China within the next decade. The market in Asia and Asia-Pacific for military UAV systems is expected to grow steadily over the next ten years (2005-2014). This market will aggregate US $7.5 Billion over that time. The region will become the world’s second largest market for UAVs after the US based on this procurement trend. (Frost, 2004) Future Asia and Asia-Pacific Procurement Trends (Published in Unmanned Vehicles, Nov-Dec, 2004) Primary demand for military UAVs in the region will be defence modernisation and the chance to position national defence and aerospace companies for future growth in a technology. Secondary, the UAV systems are particularly relevant to the region attributable to the physical operational environment. (Frost, 2004) With the low barriers and national ambitions to entry for some classes of UAVs, countries such as Singapore, South Korea, China and Japan, view UAV market as an opportunity to establish their defence industries as leading centres of UAV technology. (Frost, 2004) The Israeli companies have dominated the UAV market in Asia-Pacific not only by selling systems in the region but also by managing through co-operative projects to establish a sound market position. (Frost, 2004) The most established UAV technology in the region. (Frost, 2004) Conclusion From the first introduction of UAV since 1964 started with the loss of US U-2 spy plane in Vietnam War. UAV had transformed to perform multi-roles since then. For Civil and Commercial UAV, the US Customs and Border Protection Agency uses it to survey the US border with Mexico for illegal immigrants. The surveillance aided in the arrest of nearly 2,000 illegal immigrants and the seizure of four tons of marijuana. (Wikipedia, 2010) UAV also plays an important role in Search and Rescue. The military uses it for reconnaissance and combat to deliver battlefield intelligence and attack capability for high-risk mission respectively. UAVs can also be specifically designed for cargo and logistics operation. It can be simulated as a target and decoy to provide ground and aerial gunnery. UAV is capable of penetrating areas without threat to pilot’s life. Thus further research and development of UAV technologies are to be integrated for field deployment of UAV. UAV is views as a significant force multiplier, especially in Singapore and Australia. Hence, assist the compensation for limited manpower. Singapore, lacking the strategic depth, utilises the strong affiliation with Israeli defence industry in UAV systems development. In conclusion, with UAV reliable intelligence and surveillance, longer endurance (engaging more targets), larger variety of payloads (wider range of missions), operational altitudes of 30,000 feet and quiet propulsion for stealth operations, sparked the buy points for Asia-Pacific countries to enhance their defense forces. Words count: 2046 (excluding Annex A and References) RQ-4 Global Hawk Mariner UAV Global Observer MALAT Heron UAV Some of different models of UAV images (Defence Industry Daily, 2006) Annex A : History of the UAV The US started developing and using UAVs in 1964 during the Vietnam War, in response to the loss of a U-2 spy plane during the Cuban Missile Crisis. (Massinon, 1993) The next operational use of UAVs was by Israeli Air Force in response to heavy air losses during the 1973 Yom Kippur War. (Massinon, 2003) Israel’s success with Battlefield UAVs drew US interest and led to US developing its own UAVs through collaboration with Israeli Aircraft Industries. (Goebel, 2009) During the Gulf War, system limitations restricted the use of UAVs to be primarily decoys to draw out enemy anti-air assets. When the Iraqi Air Defence systems were switched on to counter what they thought were incoming strike packages, the USAF and USN launched anti-radiation missiles to destroy them. (Bowie, et al., 2003) In the aftermath of 911, UAVs obtained a hunter-killer capability. The CIA deployed Predator UAVs armed with larger designators and Hellfire missiles to locate Taleban leaders and attacked them in tandem with manned flight platforms during Operation Enduring Freedom. (Bowie, et al., 2003) Today, the UAV is used routinely by the US in its peacekeeping operations in Iraq and Afghanistan. Many air forces in the world also have UAVs in their inventory. Reference Anon. (1995). LO HAE UAV Program. Federation of American Scientists. Retrieved January 26, 2010, from http://www.fas.org/irp/agency/daro/uav95/lohae.html Anon. (2001). Successful First Flight Of High-Speed UAV Demonstrator CARAPAS. EADS. Retrieved January 26, 2010, from http://www.eads.net/1024/en/pressdb/archiv/2005/en_20051107_carapas.imp.2.html Anon. (2007). Jamming Systems: UAV Jammer. Retrieved January 26, 2010, from http://www.stratign.com/uav_jammer.htm Bowie, C.J., Haffa Jr, R.P. (2003). Future War: What the Trends in America’s Post Cold-War Military Conflicts Tell Us About 21st Century Warfare. Northrop Grumman: Analysis Centre Papers. Retrieved January 26, 2010, from http://www.northropgrumman.com/analysis-center/paper/assets/future_war.pdf Colon, R. (2005). A Brief Look at the United States UAV-RPA Vision. Century of Flight. Retrieved January 26, 2010, from http://www.century-of-flight.net/Aviation%20history/evolution%20of%20technology/uav.htm Day, D.A. (n.d.). Stealth Technology. US Centennial of Flight Commission. Retrieved January 26, 2010, from http://www.centennialofflight.gov/essay/Evolution_of_Technology/Stealth_tech/Tech18.htm Defence Daily Industry. (2006). Different Models of UAV Image. Retrieved January 26, 2010, from http://www.defenseindustrydaily.com/australia-to-participate-in-bams-uav-project-02502/ Defence Review Asia Magazine (2009). Asia UAV Acquistions. Retrieved January 26, 2010, from http://www.defencereviewasia.com/issues/nov09.php Defence Science Board. (2004). Study on Unmanned Aerial Vehicles and Uninhabited Combat Aerial Vehicles. Federation of American Scientists. Retrieved January 26, 2010, from http://www.fas.org/irp/agency/dod/dsb/uav.pdf Franchi, P.L., (2004). US study recommends self-protection for UAVs. Flight International. Retrieved January 26, 2010, from http://www.flightglobal.com/articles/2004/09/07/187087/us-study-recommends-self-protection-for-uavs.html Franchi, P.L., (2007). Counter UAV Operations Pose New Challengers for Military Planners. Flight International. Retrieved January 26, 2010, from http://www.flightglobal.com/articles/2007/07/02/215327/counter-uav-operations-pose-new-challenges-for-military.html Frost & Sullivan. (2004). Future Asia and Asia-Pacific Procurement Trend. Retrieved January 26, 2010, from http://www.frost.com/prod/servlet/market-insight-top.pag'docid=35854398&ctxixpLink=FcmCtx1&ctxixpLabel=FcmCtx1 Goebel, G. (2009). International Battlefield UAVs. Retrieved January 26, 2010, from http://www.vectorsite.net/twuav_10.html Haisty, B.S. (2000). Lockheed Martin’s Affordable Stealth. Retrieved January 26, 2010, from http://www.f22fighter.com/AffordableStealth.pdf Hall, D. (2009). UAV Conference in San Diego: Survivability and UAVs. Retrieved January 26, 2010, from http://www.survice.com/SIPapers/SurvivabilityAndUAVs.pdf Massion, A.E. (1993). Collection Tasking of the Corps Unmanned Aerial Vehicle-Short Range (UAV-SR). School Advance Military Studies. Retrieved January 26, 2010, from http://cgsc.contentdm.oclc.org/cgi-bin/showfile.exe'CISOROOT=/p4013coll3&CISOPTR=1351&filename=1352.pdf Peck, M. (2003). Global Hawk Crashes: Who’s to blame' National Defense Magazine. Retrieved January 26, 2010, from http://www.nationaldefensemagazine.org/archive/2003/May/Pages/Global_Hawk3871.aspx Richardson, D. (2007). Fighters face the Aesa Revolution: Active Electronically Scanned Arrays Radar. Retrieved January 26, 2010, from http://www.thefreelibrary.com/Fighters+face+the+Aesa+revolution%3a+since+2000%2c+a+small+number+of...-a0166350155 Robinson, R. (2009). The Silent Treatment: Aero Acoustics Research on UAVs Could lead to Stealthier Surveillance. Retrieved January 26, 2010, from http://www.gtresearchnews.gatech.edu/newsrelease/uav-acoustics.htm Tice, B.P. (1991). Unmanned Aerial Vehicles: The Force Multiplier of the 1990s. Retrieved January 26, 2010, from http://www.airpower.maxwell.af.mil/airchronicles/apj/apj91/spr91/4spr91.htm Wikipedia (2010). History of Unmanned Aerial Vehicle: Civil and Commercial usage of UAV. Retrieved January 26, 2010 from http://en.wikipedia.org/wiki/History_of_unmanned_aerial_vehicles
上一篇:Unit_5-Principles_of_Safeguard 下一篇:To_the_Moon