发明名称 SYSTEM AND METHOD FOR ASYMMETRIC MISSILE DEFENSE
摘要 A method for accurately determining whether a response tool will be effective for responding to a given enemy threat object. Embodiments described herein provide a method and system for responding to a threat object, for example, negating missile threats. Embodiments may include validating effectiveness of a response to the threat object. Other embodiments may include verifying the continued effectiveness of a response to the threat object. Further embodiments may include providing feedback to re-perform the method for responding to the threat object. The system may include a mathematical method, and associated algorithms, to assess, in an automated fashion, the performance of non-kinetic techniques with respect to negating the threat object.
申请公布号 US2016253590(A1) 申请公布日期 2016.09.01
申请号 US201514600920 申请日期 2015.01.20
申请人 Raytheon Company 发明人 Hershey Paul C.;Dehnert Robert E.;Williams John J.;Wisniewski David J.
分类号 G06N5/04;G06N7/00;G06N99/00 主分类号 G06N5/04
代理机构 代理人
主权项 1. A method of responding to a threat object, the method comprising: a method for selecting a response tool comprising: detecting with a sensor a phase and an identification of a threat object based on a detected portion of the threat object and/or a second object operatively connectable with the portion of the threat object;determining a model of a lifecycle of the threat object based on the detected portion and/or the second object;searching for a first set of vulnerabilities of the modeled lifecycle;choosing a first response tool to impair the performance of the threat object and the detected portion of the threat object and/or the second object; andstoring the identification of the threat object, the model of the lifecycle, and the first response tool; a method for iteratively selecting a response tool during a first phase comprising: performing the method for selecting the response tool; andupdating the identification of the threat object, the modeled lifecycle, the first set of vulnerabilities, and the first response tool based on the modeled lifecycle, vulnerabilities, the first response tool, and the first phase; and a method for iteratively selecting a response tool during a second phase comprising: detecting with the sensor a second phase;performing the method for selecting the response tool; andupdating the identification of the threat object, the modeled lifecycle, the first set of vulnerabilities, and the first response tool based on the modeled lifecycle, vulnerabilities, the first response tool, and the second phase; and implementing the first response tool against the threat object and/or the second object.
地址 Waltham MA US