MIL-DTL-24784/3B (SH)
Chapter 9 according to the accuracy and the conditions under which entries from one source are
more accurate than those from another. The limitations imposed on the subsystems when using
incomplete or unreliable data shall be discussed. Threat entries shall be described in terms of
software configuration when applicable; for example, automatic mode versus manual mode. The
accuracies of radar data, optical data, sonar data, ESM data, IFF data and tactical data system
data links shall be provided in a table similar to figure 3-43.
3.10.3.3 Tactical data subsystem tracking and correlation. This section shall address the
maximum number of tracks capable of being simultaneously processed by the tactical data system.
Operator problems shall be addressed relative to radar distribution failures and console failures
which require one operator to search sectors normally searched by two or more operators. The
maximum and minimum processing time needed to establish a firm track under the manual and
automatic modes of operation shall be described. The comparative effect of tracking accuracies
on engagements by the different weapon subsystems shall be addressed. The reduced tracking
and correlation capabilities resulting from tactical data subsystem equipment malfunctions and
software configurations shall be described. Primary topics shall include track capacity, manual
and automatic tracking and correlation rates, tracking accuracy, reduction of hardware and
software capabilities caused by equipment casualties, and effect of degraded environment on
tracking accuracy. A table similar to figure 3-44 shall specify tactical data subsystem track
capacities.
3.10.3.4 Weapon direction system entry and tracking. This section shall describe the same basic
subject matter as that specified in 3.10.3.3. Additionally, the effect of weapon direction system
casualties shall be discussed. Primary topics shall include maximum number of tracks, tracking
accuracy in clear environment and degraded environment, and capability reductions resulting from
equipment casualties.
3.10.3.5 Identification and classification. This section shall describe the merits of various
identification sources. These sources shall include IFF and SIF, intelligence reports, ESM
receivers, ordered maneuver responses, and operational orders. Typical time spans required for
identification and classification using each of the identifying means shall be tabulated. Primary
topics shall include automatic threat identification, manual threat identification, ESM threat
identification (when not a part of manual or automatic threat identification), and sonar threat
identification.
3.10.3.6 Summary of combat system threat processing capabilities and limitations.
This section shall summarize the combat system threat processing capabilities and limitations for
supporting AAW, ASW, SUW and shore missions. Each primary topic shall describe the impact
threat processing has on mission success.
3.10.3.7 Bibliography. This section shall provide a list of documents used in preparing this
chapter.
23
For Parts Inquires call Parts Hangar, Inc (727) 493-0744
© Copyright 2015 Integrated Publishing, Inc.
A Service Disabled Veteran Owned Small Business