Unmanned Air Vehicles
By understanding aggressor nations, military threats and terrorist groups desire to attack the U. S. homeland and U. S. interests overseas, our measure of response must articulate multiple and varied capability systems. The Unmanned Air Vehicle (UAV) is a central component to America’s military framework in the evaluation and response to groups and countries and their overall capabilities according to their hostility toward the United States. Methodology
The analysis researched directly supports the generation of representative scenarios. In this idealized methodology, the models developed continue to be available for support of further exploration and evaluation of detailed design alternatives. The final results of the mission scenarios will provide the data for specification and system analysis. The research methodology of sampling via data population, i. e. UAV communities and participants techniques suggests that the methods enable readers to structure their own judgment.
However, the results run counter to the operational information in some areas (such as usability evaluation), which suggest the superiority of certain competitive unmanned air vehicle systems. It’s important to point out how ethnography presents the results of a holistic research methodology founded on the idea that a system’s properties cannot necessarily be accurately understood independently of each other. Recognizing ethnographic research as a direct, first hand observation of daily behavior, it uniquely allows the researcher to participate in the actual process as a participant observer.
It is a research method based entirely on fieldwork. The key to the general applicability and flexibility of the Usability Engineering Lifecycle lies in the choice of which techniques to apply to each task, not in the choice of which tasks to carry out. All the tasks identified in the UAV lifecycle should be carried out for every development project involving an interactive product in order to achieve optimal usability. However, the approach to any given project can be adapted by a careful selection of techniques based on project constraints.
The suggested methodology of sampled population implies successfully the approach that needs the support of an explicit recruitment of participants. This approach ensures that the evaluation is structured and thorough. It is important to take into account some clear differences in research and development in technology, both in academia and industry, away from a traditionally led focus of sampling user-led participant approach. Mission Scenario North Korea
“North Korea’s history of regional military provocations, proliferation of military-related items and long-range missile development are of major concern to the international community. ” (CIA, 2008) The inability to comprehend the motivation behind the North Korea’s behavior leads to complexity and a shroud of suspicions. North Korea has constructed a new missile with nuclear capabilities able to reach India, Japan and Taiwan. Additionally, the countries representatives have walked out ongoing nuclear arms talks and refused to indicate their return. Tacit military action has been planned.
A unit of UCAV’s must infiltrate deep into North Korea to remove the under construction nuclear platform and destroy any and all nuclear capabilities including chemical, and biological weapons programs and massive conventional armed forces. North Korean nuclear facilities involve key targets for successful military strikes. Central targets would include locating all facilities that could be used in a nuclear weapons program including nuclear reactors, fuel fabrication facilities, and reprocessing facilities. It’s important to plan to destroy fissile material stocks targets, i. e.
nuclear infrastructure for producing and reprocessing plutonium for possible use in nuclear weapons. The prevention of North Korea from retaliating with artillery fire, missile strikes, chemical or biological weapons use, escalation to a full-scale conventional war, or nuclear weapons constitute the mission critical military components of North Korean clandestine nuclear reactors, and facilities that reprocess spent fuel into plutonium. “…and the United States have been frustrated by the seemingly unpredictable and “untrustworthy” patterns of behavior shown by North Korea” (Rienner, 2002, p133) Task Analysis
Mission Scenario Phases and Subtasks North Korea Phase I: Locating all facilities and fissile material stocks that could be used in a nuclear weapons program; Distributed and collaborative planning environment attack entity state correlation between real-time and existing planned information. Phase II: After possessing the capability to destroy these targets; Assignment of strike aircraft or packages to newly introduced targets and/or threats. Phase III: Prevent North Korea from retaliating with artillery fire, missile strikes, chemical or biological weapons use, escalation to a full-scale conventional war, or nuclear weapons.
Sub phase I: Deployment of The Z-26 Zura specializes in Intelligence, Surveillance, and Reconnaissance missions. “Equipped with state-of-the-art sensor systems and a stealthy signature, the Zura can sneak in behind North Korean lines and obtain the imagery and data needed to support strikes in the region. ” (UAV Manual, p. 26) Sub phase II: Z-15 Firebird (significantly faster than the Zura) equipped with long range and short range standoff weapons systems will strike deep into North Korean territory. Equipped with gravity weapons (require the aircraft to fly near/over their target) afford low altitude strikes.Sample Essay of AssignmentExpert.com