Show simple item record

dc.contributor.advisorLeena Singh and Brent Appleby.en_US
dc.contributor.authorWholey, Leonard N. (Leonard Nathaniel)en_US
dc.contributor.otherMassachusetts Institute of Technology. Dept. of Aeronautics and Astronautics.en_US
dc.date.accessioned2006-03-29T18:46:21Z
dc.date.available2006-03-29T18:46:21Z
dc.date.copyright2005en_US
dc.date.issued2005en_US
dc.identifier.urihttp://hdl.handle.net/1721.1/32458
dc.descriptionThesis (S.M.)--Massachusetts Institute of Technology, Dept. of Aeronautics and Astronautics, 2005.en_US
dc.descriptionIncludes bibliographical references (p. 115-118).en_US
dc.description.abstractUnmanned aerial vehicles (UAVs) play an essential role for the US Armed Forces by performing missions deemed as "dull, dirty and dangerous" for a pilot. As the capability of UAVs expand. they will perform a broader range of missions such as air-to-air combat. The focus of this thesis is forming trajectories for the closing phase of an air-to-air combat scenario. A UAV should close with the suspected aircraft in a manner that allows a ground operator to visually identify the suspected aircraft while avoiding visual/electronic detection from the other pilot. This thesis applies and compares three methods for producing trajectories which enable a visual identification. The first approach is formulated as a mixed integer linear programming problem which can be solved in real time. However, there are limitations to the accuracy of a radar detection model formed with only linear equations, which might justify using a nonlinear programming formulation. With this approach the interceptor's radar cross section and range between the suspected aircraft and interceptor can be incorporated into the problem formulation. The main limitation of this method is that the optimization software might not be able to reach online an optimal or even feasible solution. The third applied method is trajectory interpolation. In this approach, trajectories with specified boundary values and dynamics are formed offline; online, the method interpolates between the given trajectories to obtain similar maneuvers with different initial conditions and end- states. With this method, because the number of calculations required to produce a feasible trajectory is known, the amount of time to calculate a trajectory can be estimated.en_US
dc.description.statementofresponsibilityby Leonard N. Wholey.en_US
dc.format.extent118 p.en_US
dc.format.extent4885086 bytes
dc.format.extent4892164 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/pdf
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsM.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582
dc.subjectAeronautics and Astronautics.en_US
dc.titleTrajectory optimization with detection avoidance for visually identifying an aircraften_US
dc.typeThesisen_US
dc.description.degreeS.M.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Aeronautics and Astronautics
dc.identifier.oclc61751445en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record