Digital RF Memory (DRFM) Jammer Simulator
Navy SBIR 2010.1 - Topic N101-035 NAVAIR - Mrs. Janet McGovern - [email protected] Opens: December 10, 2009 - Closes: January 13, 2010 N101-035 TITLE: Digital RF Memory (DRFM) Jammer Simulator TECHNOLOGY AREAS: Sensors, Electronics, Weapons ACQUISITION PROGRAM: PMA-265, Super Hornet, Hornet; Air 5.4.4.2; Next Generation Jammer RESTRICTION ON PERFORMANCE BY FOREIGN CITIZENS (i.e., those holding non-U.S. Passports): This topic is "ITAR Restricted." The information and materials provided pursuant to or resulting from this topic are restricted under the International Traffic in Arms Regulations (ITAR), 22 CFR Parts 120 - 130, which control the export of defense-related material and services, including the export of sensitive technical data. Foreign Citizens may perform work under an award resulting from this topic only if they hold the "Permanent Resident Card", or are designated as "Protected Individuals" as defined by 8 U.S.C. 1324b(a)(3). If a proposal for this topic contains participation by a foreign citizen who is not in one of the above two categories, the proposal will be rejected. OBJECTIVE: Develop an open architecture generic threat Digital Radio Frequency Memory (DRFM) jammer simulation and stimulation capability that provides real-time threat emulation (with realistic threat waveforms) and accepts inputs from an intelligence database front end of specified parameters and generic mode description templates. DESCRIPTION: The ability to rapidly prototype and analyze signal waveforms for emerging and constantly changing threat systems is needed in the intelligence and test and evaluation (T&E) communities. The problem is compounded due to the nature (classification) of the data associated with emulation of the waveform. The threat DRFM jammer emulation must be able to separate the unclassified hardware/software front end (while maintaining programmability and reconfigurability) from the actual classified threat data and modes it is required to emulate (in order to remove all classification issues). In order to achieve this goal, an innovative jammer emulation approach must be developed to insure that it is reconfigurable over a large set of parameters (i.e., frequency, bandwidth, number of analog-to-digital/digital analog converter (ADC/DAC) bits, clock rate, memory depth, etc) to sufficiently model the threat jammer hardware. It must also be easily and rapidly programmable to implement a variety of coherent and non-coherent electronic countermeasure (ECM) modes including (but not limited) to coherent false targets, coordinated range gate pull-off/vertical gate pull-off (RGPO/VGPO), uncoordinated RGPO/VGPO, and noise, etc. When a different number of ADC/DAC bits are being emulated, the RF response must match the threat data that is captured in the threat database. This type of stimulator does not yet exist. The jammer simulator should also have an interface to allow for external data inputs for controlling the simulator. PHASE I: Determine the feasibility of and develop a conceptual design for an appropriate DRFM jammer emulator. PHASE II: Develop detailed designs for the Phase I DRFM jammer emulator and fabricate a prototype suitable for proof of concept testing in a laboratory environment. Conduct preliminary testing demonstrating the DRFM jammer capabilities and performance. PHASE III: Integrate Phase II prototype unit with a real-time executive using the Joint Integrated Mission Model (JIMM) thus allowing use with the existing RF stimulator resident at the test facility. Develop and fabricate a full-scale DRFM jammer emulator. This jammer will provide full-scale demonstration of all capabilities and will lead to a full-scale prototype demonstration unit. PRIVATE SECTOR COMMERCIAL POTENTIAL/DUAL-USE APPLICATIONS: Technology developed under this effort would benefit the commercial aviation community as well as the Department of Homeland Security (DHS). Potential applications for the RF generation of complex waveforms could be utilized to characterize radio frequency systems. REFERENCES: 2. Digital Techniques for Wideband Receivers, James Tsui, Artech House, 1995. 3. Electronic Warfare in the Information Age, D. Curtis Schleher, Artech House, 1999. KEYWORDS: Electronic Attack; Electronic Warfare; Radar; Digital Radio Frequency Memory (DRFM); Jammer; Test and Evaluation (T&E)
|