Existing User

If you already have an AGI Web account, enter it here.




New User
Creating a new account requires entering complete and accurate information about yourself and your organization.

Create an AGI Account

close

ANALYTICAL GRAPHICS, INC.

SOFTWARE LICENSE AGREEMENT

By installing STK, you agree to be bound by the attached Software License Agreement Terms and Conditions, which are applicable to the STK free download.

NOTICE TO USER: PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ("AGREEMENT") CAREFULLY. THIS IS A LEGALLY BINDING AGREEMENT BETWEEN YOU AND ANALYTICAL GRAPHICS, INC. ("AGI"), A PENNSYLVANIA CORPORATION, LOCATED AT 220 VALLEY CREEK BOULEVARD, EXTON, PA 19341. BY USING ALL OR ANY PORTION OF THE SOFTWARE, YOU ACCEPT ALL THE TERMS AND CONDITIONS OF THIS AGREEMENT. FURTHERMORE, YOU AGREE THAT THE TERMS AND CONDITIONS SET FORTH HEREIN SHALL APPLY TO ALL SUBSEQUENT PURCHASE ORDERS OR CONTRACTS THAT YOU ENTER INTO WITH AGI. IF YOU DO NOT AGREE TO ANY OF THESE TERMS, DO NOT USE THIS SOFTWARE. IF YOU ACQUIRED THE SOFTWARE WITHOUT AN OPPORTUNITY TO REVIEW THIS AGREEMENT AND YOU DO NOT ACCEPT THIS AGREEMENT, YOU MAY OBTAIN A REFUND OF THE AMOUNT YOU ORIGINALLY PAID FOR THE SOFTWARE PROVIDED YOU: (A) DO NOT USE THE SOFTWARE, (B) YOU DO NOT MAKE OR KEEP ANY COPIES OF THE SOFTWARE, AND (C) YOU RETURN IT WITHIN THIRTY (30) DAYS OF THE ORIGINAL PURCHASE DATE ALONG WITH EVIDENCE OF THE DATE OF PURCHASE AND ORIGINAL PURCHASE PRICE. AGI PROVIDES THE SOFTWARE AND DOCUMENTATION, AND LICENSES ITS USE TO YOU. YOU ACCEPT ALL RESPONSIBILITY AND LIABILITY RESULTING FROM THE SELECTION OF THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR INSTALLATION, USE AND RESULTS OBTAINED FROM THE SOFTWARE, AND FOR RELIANCE ON THE RESULTS OBTAINED.

1. DEFINITIONS

"Documentation" means the licensed specifications, user manuals, installation instructions and other supporting materials, including additional, updated or revised materials, if any, that are provided by AGI in connection with the Software in any Product Configuration.

"Ordering Documents" means a sales quotation, purchase order or other contractual document that identifies the Software and Product Configuration ordered.

"Product Configuration" means the totality of the Software being licensed in the specific configuration desired.

"Software" means the AGI software, software modules, extensions for the software and all of the contents of the files, disks(s), CD-ROM(s) or other media with which this Agreement is provided, including but not limited to (i) AGI or third party computer information or software; and (ii) digital images, stock photographs, video, clip art, sound(s) or other work.

"Supplemental Terms" means additional terms and conditions applicable to the specific Software being licensed.

"Third Party Content" means software (whether embedded or not) and other materials owned and licensed by third parties that is supplied by AGI with the Software.

"Use or Using" means to access/open, install, download, copy, or otherwise benefit from the Software or the Documentation.

2. GRANT OF LICENSE

2.1 AGI grants to You a personal, non-exclusive, non-transferable license solely to use the Software as set forth in the applicable Ordering Documents, (i) for which the applicable license fees have been paid and, (ii) in accordance with the terms and conditions set forth in this Agreement and the Supplemental Terms assigned to the Product Configuration of the Software you have ordered or as authorized by AGI.

Supplemental Terms applicable to specific Product Configurations are contained in the following Terms of Use Addendums, which may be viewed at www.agi.com/sla:

Addendum 1 – Desktop Software Products
• Systems Tool Kit (STK)
• STK Analysis Workbench
• STK Pro
• STK SatPro
• STK Aviator
• STK Analyzer
• STK Astrogator
• STK Conjunction Analysis Tool
• STK Communications
• STK Coverage
• STK EOIR
• STK Integration
• STK Missile Modeling Tools
• STK Radar
• STK Scheduler
• STK Space Environment & Effects Tool
• STK SOLIS
• STK Terrain, Imagery, & Maps
• STK Parallel Computing Extension
• Distributed Simulation Extension for STK
• Radar Advanced Environment Extension for STK Radar
• Real Time Tracking Technology Extension for STK
• Optimizer Extension for STK Analyzer
• TIREM Extension for STK Communications and STK Radar
• Urban Propagation Extension for STK Communications
• Navigation Tool Kit
• Orbit Determination Tool Kit
• QualNet Interface for STK Communications
• SATSOFT
Addendum 2 - Custom Applications Development Desktop Products in Addendum 1
STK Engine
STK Server
Addendum 3 - Server Products STK Server
STK Data Federate
STK Parallel Computing Extension
Addendum 4 - Workgroup License Desktop Products in Addendum 1
STK Data Federate
STK SimMetrics
Addendum 5 - STK Viewer Desktop Products in Addendum 1
STK Viewer
Addendum 6 - SimMetrics STK SimMetrics
Addendum 7 - Virtual Machines Desktop Products in Addendum 1
STK Engine
STK Parallel Computing Extension
Addendum 8 - Annual Support and Upgrades Agreement Annual Software Support and Upgrades

2.2 Permitted Uses

For each license purchased, you may:

  1. Install and use the Software on computing device;
  2. Make one (1) copy of the Software in any machine readable form for archival and backup purposes only;
  3. Move the Software in the licensed Product Configuration to a replacement computer; or
  4. Use the Software in conjunction with an internet enabled conferencing environment solely to show displays of products to support real time collaborative engineering activities with your customers, partners, or subcontractors.

2.3 Uses Not Permitted

You shall not:

  1. Sell, rent, lease, sublicense, distribute, lend, assign or time-share the Software, or a component thereof, to a third party. You shall not act as a service bureau or commercial service provider that allows third party access to the Software;
  2. Use the Software to transfer or exchange any material where such transfer or exchange is prohibited by intellectual property law or any other applicable law;
  3. Remove, delete or obscure any AGI or its third party contributors’ patent, copyright, trademark, confidentiality or other proprietary rights notices contained in or affixed to the Software;
  4. Separate, unbundle or remove any component(s) of the Software for independent use; or.
  5. Use, copy, modify or transfer the Software or Documentation or any copy, modification or merged portion thereof, in whole or in part, except as expressly provided in the Agreement. Furthermore, you may not reverse engineer, disassemble, decompile or otherwise attempt to reconstruct or discover any source code, data, digital certificates, passwords, underlying ideas, algorithms, file formats or programming interfaces of the Software, or allow others to attempt any of the foregoing.

3. DISCLAIMER OF WARRANTY

THE SOFTWARE AND PRODUCT CONFIGURATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. YOU ASSUME THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE SOFTWARE. AGI DOES NOT WARRANT THAT THE FUNCTIONS CONTAINED IN THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR FREE.

4. LIMITATION OF LIABILITY

4.1 IN NO EVENT WILL AGI OR ITS THIRD PARTY CONTRIBUTORS, DISTRIBUTORS, OR DEALERS BE LIABLE TO YOU FOR ANY DIRECT, INDIRECT OR OTHER DAMAGES, INCLUDING ANY LOST PROFITS, LOST SAVINGS OR OTHER INCIDENTAL, SPECIAL, CONSEQUENTIAL OR EXEMPLARY DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE, OR A LOSS OF DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIENCE OR OTHER TORTIOUS ACTION, EVEN IF AGI OR ANY AUTHORIZED AGI BUSINESS PARTNER HAD BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, NOR SHALL AGI BE LIABLE FOR ANY SIMILAR CLAIM AGAINST YOU BY ANY OTHER PARTY.

4.2 AGI'S OBLIGATIONS UNDER THIS AGREEMENT, UNDER ANY THEORY OF LIABILITY OR CONTRIBUTION, SHALL NOT EXCEED THE AMOUNT OF THE APPLICABLE LICENSE FEE PAID BY YOU FOR THE SOFTWARE.

4.3 AGI IS NOT LIABLE FOR COSTS OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES.

5. INFRINGEMENT INDEMNIFICATION

5.1 AGI shall defend, indemnify, and hold You harmless from and against any loss, liability, cost or expense, including reasonable attorney's fees, that You incur as a result of any claims, actions, or demands by a third party alleging that Your licensed use of the Software infringes on a U.S. patent, copyright, or trademark, provided that:

  1. AGI is notified in writing within fifteen (15) business days of such claim;
  2. You provide AGI with documents describing the allegations of infringement;
  3. AGI has the sole control of defense of any action and negotiation related to the defense or settlement of any claim; and
  4. You reasonably cooperate in the defense of the claim at AGI’s request and expense.

5.2 If the Software, or any part thereof, is found to infringe a U.S. patent, copyright, or trademark of another, AGI shall, at its sole option and at its own expense, either: (i) obtain for You the right to continue using such Software or part thereof, or (ii) modify the allegedly infringing elements of such Software while maintaining substantially similar functionality. If neither alternative is commercially reasonable, the license shall terminate, and You shall uninstall and return the infringing Software to AGI. AGI's entire liability shall then be to indemnify You pursuant to Section 5.1 and refund to You the amounts actually paid by You to AGI for the affected Software less depreciation for beneficial use determined on a straight-line basis over a five year useful life.

5.3 AGI will have no obligation to defend You or to pay any resultant costs, damages, or attorneys' fees for any claims or demands alleging direct or contributory infringement to the extent arising out of (i) the operation, combination or integration of the Software with other software, a product, hardware, system or process not supplied by AGI or specified by AGI in its Documentation; (ii) alteration of the Software by someone other than AGI; or (iii) use of the Software after modifications have been provided by AGI for avoiding infringement; or use after a return is ordered by AGI under Section 5.2.

5.4 AGI'S OBLIGATIONS UNDER THIS SECTION 5 ARE SOLELY FOR INFRINGEMENT DAMAGES AND COSTS AWARDED AGAINST YOU. IN NO EVENT SHALL ANY OTHER LIABILITY OF AGI TO YOU EXCEED THE AGGREGATE AMOUNT OF THE APPLICABLE LICENSE FEE RECEIVED BY AGI FOR THE ALLEGEDLY INFRINGING SOFTWARE, OR ANY PART THEREOF. YOU AGREE THAT THE FOREGOING STATES YOUR EXCLUSIVE REMEDY WITH RESPECT TO ANY ALLEGED PATENT OR COPYRIGHT INFRINGEMENT OR TRADE SECRET MISAPPROPRIATION.

6. EXPORT CONTROL REGULATIONS

You hereby acknowledge and agree that the Software and Product Configuration(s) provided under this Agreement are subject to U.S. Export Control Regulations and Laws, including but not limited to the Export Administration Regulations (EAR) and as may be applicable, the International Traffic in Arms Regulations (ITAR), and may be subject to the import or export regulations of other countries. You agree to strictly comply with all such laws and regulations and acknowledge your responsibility to obtain licenses for export, re-export or import of the Software, as may be required. You acknowledge and agree to comply with U.S. anti-boycott laws and regulations, including but not limited to those regarding foreign boycott of Israel, as administered by the U.S. Internal Revenue Service (IRS) and the U.S. Department of Commerce, Office of Anti-boycott Compliance (OAC). In the event that transfer of bank funds to AGI results from this Agreement, all transactions shall be exclusively and directly between your bank and AGI's bank, and shall not be used for transactions in violation of U.S. law, including but not limited to laws administered by the U.S. Department of Treasury, Office of Foreign Asset Control (OFAC). This export control provision shall survive the expiration or termination of this Agreement.

7. TERMINATION

The license granted under this Agreement is effective until terminated. You may terminate this license at any time by destroying all copies of the Software in your possession, and providing written notice of such termination and destruction to AGI. The license granted under this Agreement will terminate if you violate any of the terms and conditions of this Agreement, including without limitation, to pay the license fees and any other sums due AGI pursuant to this Agreement. You agree, upon such termination, to promptly destroy all copies of the Software in your possession and to certify in writing to AGI that such action has been taken.

8. GOVERNING LAW

8.1 Customers in the United States and its Territories: This Agreement shall be governed and construed in accordance with the laws of the Commonwealth of Pennsylvania without reference to conflict of laws principles, except that U.S. Federal law shall govern in matters of intellectual property.

8.2 All Other Customers: Any dispute arising out of or relating to this Agreement or the breach thereof that cannot be settled through negotiation shall be finally settled under the Rules of Arbitration of the International Chamber of Commerce by one (1) arbitrator appointed in accordance with said rules. The language of arbitration will be English. The place of the arbitration shall be at an agreed upon location. This Agreement shall not be governed by the United Nations Convention of Contracts for the International Sale of Goods, the application of which is expressly excluded. Either party shall, at the request of the other, make available documents or witnesses relevant to the major aspects of the dispute.

9. ASSIGNMENT

None of your rights, duties or obligations under this Agreement may be sold, sublicensed, assigned, rented, licensed, loaned or otherwise transferred without the prior written consent of AGI, and any attempt to so sell, sublicense, assign, rent, lease, loan or transfer without AGI’s prior written consent is void.

Notwithstanding the foregoing provision, AGI shall permit transfers of this Agreement from prime contractors to government end users, provided the original software purchase transaction was completed pursuant to a valid contract, and you have obtained AGI's prior written consent, which shall not be unreasonably withheld.

10. NOTICES

Any notices regarding this Agreement shall be sent to:

Analytical Graphics, Inc.
Attn: Contracts Department
220 Valley Creek Blvd.
Exton, PA 19341
contracts@agi.com

11. INTELLECTUAL PROPERTY AND OWNERSHIP

11.1 AGI and its third party contributors respectively retain ownership of all rights, title and interest in and to all intellectual property rights associated with the Software and Documentation. This Agreement shall not be construed in any manner as transferring any rights of ownership or license to the Software, and/or to the features or information therein except as may be explicitly stated in writing in this Agreement. All rights not expressly granted by AGI are reserved. The Software and Documentation are protected by copyright and other intellectual property laws and treaties.

11.2 You must reproduce and include the copyright and other proprietary notices of AGI on any copy of all or any portion of the Software and Documentation, and all such copies shall be subject to all the terms and conditions of this Agreement.

12. U.S. GOVERNMENT END USER RIGHTS

12.1 The Software, Product Configuration, and Documentation are "Commercial Items," as defined in FAR 2.101, consisting of Commercial Computer Software and Commercial Computer Software Documentation. Government software and technical data rights in the Software and its Documentation include only those rights customarily provided to the public as defined in this License.

12.2 The use, duplication of or disclosure of the Software, Product Configuration and its Documentation by the U.S. Government is subject to the restrictions set forth in FAR 12.211 (Technical Data) and FAR 12.212 (Computer Software) and, for Department of Defense purchases, DFARS 252.227-7015 (Technical Data – Commercial Items) and 227.7202-3 (Rights in Commercial Computer Software or Commercial Computer Software Documentation), as applicable. Accordingly, all U.S. Government End Users acquire the Software and its Documentation with only those rights set forth herein. The developer and manufacturer is Analytical Graphics, Inc., located at 220 Valley Creek Boulevard, Exton, PA 19341.

13. THIRD PARTY CONTENT

The Software utilizes Third Party Content which is subject to the terms and conditions of such respective third parties. Third party terms, conditions and copyright attributions are included with the Software in the "About" section under the Help Menu, and may also be viewed at www.agi.com/sla.

14. ACKNOWLEDGEMENTS

14.1 YOU HAVE READ THIS ENTIRE AGREEMENT AND AGREE TO BE BOUND BY ITS TERMS AND CONDITIONS.

14.2 THIS AGREEMENT IS THE COMPLETE AND EXCLUSIVE STATEMENT OF THE UNDERSTANDING AND CONTRACT BETWEEN US AND SUPERSEDES ANY AND ALL PRIOR ORAL OR WRITTEN COMMUNICATIONS RELATING TO THE SUBJECT MATTER HEREOF.

14.3 THIS AGREEMENT MAY NOT BE MODIFIED, AMENDED OR IN ANY WAY ALTERED EXCEPT BY A WRITTEN AGREEMENT SIGNED BY BOTH YOU AND AGI.

14.4 ANY PROVISION FOUND BY A COURT OF LAW TO BE ILLEGAL, INVALID, OR UNENFORCEABLE SHALL AUTOMATICALLY BE DEEMED CONFORMED TO THE MINIMUM REQUIREMENTS OF LAW AND IT, WITH ALL OTHER PROVISIONS, SHALL BE GIVEN FULL FORCE AND EFFECT. WAIVER OF A PROVISION IN ONE INSTANCE SHALL NOT PRECLUDE ITS ENFORCEMENT ON FUTURE OCCASIONS. SUCH FINDINGS OF ILLEGALITY, INVALIDITY, AND/OR UNENFORCEABILITY OF ONE OR MORE OF THE PROVISIONS HEREIN SHALL NOT AFFECT THE REMAINING PROVISIONS.

14.5 YOU HEREBY AGREE THAT AGI WOULD BE IRREPARABLY DAMAGED IF THE TERMS AND CONDITIONS OF THIS AGREEMENT WERE NOT SPECIFICALLY ENFORCED, AND THEREFORE YOU AGREE THAT AGI SHALL BE ENTITLED TO APPROPRIATE EQUITABLE REMEDIES WITH RESPECT TO BREACHES OF THIS AGREEMENT, IN ADDITION TO SUCH OTHER REMEDIES AS AGI MAY OTHERWISE HAVE AVAILABLE TO IT UNDER APPLICABLE LAWS.

14.6 IN THE EVENT THAT EITHER PARTY IS REQUIRED TO BRING AN ACTION, SUIT, OR OTHER PROCEEDING FOR THE ENFORCEMENT OF ANY PROVISION OF OR UNDER THIS AGREEMENT, EACH PARTY WILL BE RESPONSIBLE FOR THEIR OWN COSTS AND EXPENSES, INCLUDING ATTORNEY AND PROFESSIONAL OR EXPERT FEES.

Analytical Graphics, Inc.

Addendum 1 - Desktop Software Products

This Desktop Software Products Addendum ("Addendum") sets forth the Supplemental Terms that apply to Your use of Desktop Software Products, and includes the AGI Software License Agreement, which is incorporated herein by reference in its entirety. This Addendum will take precedence over any conflicting terms of the Agreement, and AGI reserves the right to update the terms from time to time, such changes taking effect upon delivery and/or use of any subsequent version upgrade. This Addendum contains those definitions and additional provisions that apply to Desktop Software Products.

1. DEFINITIONS

In addition to the definitions provided in the Agreement, the following definitions apply to this Addendum:

"Designated Computer" means a single electronic device for displaying, storing, and processing data.

"Host Identification" or "Host ID" means the unique, physical address for the computer hardware.

"Designated License Server" refers to a centralized computer software system which provides access tokens, or keys, to client computers in order to enable the Software to run on them.

"Local Area Network (LAN)" means any combination of two or more computers that are connected to each other and capable of sharing files, applications or information and that can be accessed from a single office location.

"Named User" refers to the single unique user who is identified as the named user within the Ordering Documents.

"Named User License" means a license tied to a single Named User regardless of physical workstation or network.

"Network User-ID" is used in conjunction with a password to gain access to a Local Area Network or Wide Area Network.

"Nodelocked License" means a license tied to a specific computer based on that computer's Host ID.

"Network License" means a floating license that can be used by any computer that has access to a particular network server. A Network License is issued as a set of two (2) license files, including: a server license file that resides on the network server, and a client license file that is installed on each computer in order to access that server.

"Wide Area Network (WAN)" means any combination of two or more computers that are connected to each other and capable of sharing files, applications or information and that can be accessed from more than one office location. A terminal server is a WAN if the computers capable of accessing applications and information on such server are located within more than one office location.

2. GRANT OF LICENSE

The following supplements Section 2, Grant of License, of the Agreement:

2.1 If you purchased a Nodelocked License, you may or you agree to:

  1. For each Nodelocked License purchased, use the Software only on a Designated Computer at any one time;
  2. Make one (1) copy of the Software in any machine readable form for backup purposes only in support of your own use of the Software on a single computer; and.
  3. As a condition to the installation and use of the Software, provide AGI the Host ID of the Designated Computer. You further acknowledge and agree that in order to operate the Software on a different, newly Designated Computer, you will promptly obtain AGI’s written consent to do so, and uninstall the Nodelocked License from the then current Designated Computer. You will also provide AGI with the Host ID of the newly Designated Computer.

2.2 If you purchased a Named User License, you may or you agree to:

  1. For each Named User License purchased, use the software on up to three (3) different workstations, but no more than one (1) at any given time, unless otherwise approved by AGI.
  2. Provide the Network User-ID associated with the Named User License in order for a corresponding license to be generated.
  3. Associate the Network User-ID with only the identified Named User. You further acknowledge and agree that the Network User-ID shall not be representative of a group of users, whether static or dynamic.

2.3 If you purchased a Network License, you may or you agree to:

  1. Use the Software on any Designated Computer capable of connecting over a LAN or WAN to a Designated License Server. The maximum concurrent number of Designated Licensed Servers in use at any time is limited to the number of Network Licenses purchased.
  2. As a condition to the installation and use of the Software, provide AGI the Host ID of the Designated License Server. You further acknowledge and agree that in order to serve licenses from a different Designated License Server, you will promptly obtain AGI's written consent to do so, and uninstall the Network License and any licensing tools from the Designated License Server. You will also provide AGI with the Host ID of the new Designated License Server.

2.4 You shall not:

  1. build an external interface for the purpose of serving the functionality or output of a component of the Software to third parties; or
  2. except as otherwise provided herein, use the Software on a server or computer that is accessible to third parties over a network for the purpose of remotely providing the functionality or output of a component of the Software to a third party for any purpose.

2.5 All rights not specifically granted herein or not specifically granted in the Agreement are prohibited.

Analytical Graphics, Inc.

Addendum 2 - Custom Applications Development

This Custom Applications Development Addendum ("Addendum") sets forth the Supplemental Terms that apply to Your use of Development Products should you intend to develop and distribute Custom Applications built using those Development Products, and includes the AGI Software License Agreement, which is incorporated herein by reference in its entirety. This Addendum will take precedence over any conflicting terms of the Agreement, and AGI reserves the right to update the terms of this Addendum and/ or the Software License Agreement from time to time, such changes taking effect upon delivery and/or use of any subsequent version upgrade. This Addendum contains those definitions and additional provisions that apply to Your use of Development Products for the purpose of developing and distributing Custom Applications.

1. DEFINITIONS

"Custom Application" means an application created by You that incorporates any functionality derived from Development Products.

"Development Products" means any part or portion of the Software, including but not limited to Desktop Products, STK Engine or STK Server, or any functionality derived therefrom, that is used to design, create, or is incorporated into a Custom Application.

"End-Users" means a licensed user of your Custom Application(s).

"Runtime License" means a license purchased from AGI that is required for authorized access to a Custom Application.

2. GRANT OF LICENSE

As a supplement to Section 2, Grant of License, of the Agreement, and subject to the terms and conditions set forth in this Addendum, AGI hereby grants to You a non transferable, non exclusive license to use Development Products that you have licensed to develop Custom Applications and to reproduce, distribute and sublicense them to End-Users (without the right to further sublicense) in the form of Custom Applications throughout the world (subject to Your obligations under Section 6, Export Control Regulations, in the Agreement) subject to the following:

2.1 You shall make payments of all fees required under this Addendum in accordance with the terms of the invoice provided by AGI, and You have purchased the appropriate Runtime License for each of copy of the Custom Application that You deploy or sell to a third party.

2.2 You must give proper acknowledgement of the copyright(s) and other proprietary notices of AGI.

2.3 You shall not use Development Products to create Custom Applications that directly compete with the Software. Your license under this Addendum is solely for the creation of Custom Applications for third parties, and not for the creation of products to be sold in competition with AGI’s software. If you deploy Custom Applications to customize, automate, or embed Software for the purpose of selling the Custom Applications, then the associated Runtime License must be purchased for each copy sold or offered for sale on the market.

2.4 Unless otherwise agreed to by the parties in writing, You shall permit the use of Custom Applications by End-Users subject to a written sublicense that, at a minimum:

  1. Prohibits the End-User from reverse engineering, reverse assembling, reverse compiling or translating the Software or any component thereof;
  2. Prohibits the End-User from copying the Software or any component thereof, except as necessary to use the licensed copy of a the Custom Application, provided that an End-User may make a copy for back-up purposes so long as the copy is not distributed to a third party;
  3. Prohibits the End-User from distributing, transferring, leasing or renting the Software or any component thereof to a third party except as a component of a Custom Application;
  4. Limits the use of the Custom Application according to the associated Runtime License that has been purchased;
  5. Requires a Runtime License from AGI for the Custom Application;
  6. Includes the statement that the End-User accepts all risks and liability arising from the installation, use and results obtained from use of the Software or any component thereof; for any purpose and for reliance on the results obtained from the use of the Software or any component thereof for any purpose;
  7. Includes a disclaimer of warranty that by its terms is applicable to AGI and its third party contributors and that is at least as limiting as Section 3, Disclaimer of Warranty, of the Software License Agreement; and
  8. Includes a disclaimer of liability that by its terms is applicable to AGI and its third party contributors and that is at least as limiting as Section 4, Limitation of Liability, of the AGI Software License Agreement.

2.5 The limitations of Section 2.3 of the Agreement with respect to distribution and transfer of the Software shall not apply to the extent Software is transferred and/or distributed as a component of a Custom Application.

2.6 All rights not specifically granted herein or not specifically granted in the Agreement are prohibited.

3. PROTECTION AND USE

3.1 You shall use commercially reasonable efforts to protect the proprietary rights of AGI with respect to third parties, reporting promptly any infringements of which You become aware and cooperating with AGI in its efforts to protect its proprietary rights. Except as expressly provided in this Addendum, the Agreement or a separate agreement with AGI, AGI does not grant You or your End-Users any rights or licenses under AGI’s patents, copyrights, trademarks or other intellectual property rights.

3.2 You shall not remove any copyright notice of AGI or it third party contributors, disclaimers, or other forms of attribution contained in the Development Products.

4. PRODUCTS DEVELOPED BY AGI

Nothing contained in this Addendum shall be construed to limit AGI’s right to modify its Software or to develop other products which are similar to or offer the same or similar functionality and/or improvements as any Custom Application developed by You.

5. INDEMNIFICATION

You agree to indemnify, defend and hold harmless, AGI, its third party contributors, officers, directors, employees, consultants and agents from any and all claims, liability, damage and/or costs (including, but not limited to reasonable attorney's fees) arising out of the operation of the Software with other software and/or technology developed or selected by You, the copying, licensing and distribution of a Custom Application, the use of a Custom Application by any person, and the infringement of any intellectual property or other right of any entity or person by a Custom Application. This obligation shall survive the termination of this Addendum and/or the Agreement.

6. RELATIONSHIP OF THE PARTIES

This Addendum does not create a partnership, joint venture or any relationship between AGI and You. You do not have any right, power or authority to act as a legal representative of AGI.

Analytical Graphics, Inc.

Addendum 3 – Server Products

This Server Products Addendum ("Addendum") sets forth the Supplemental Terms that apply to Your use of Server Products and includes the AGI Software License Agreement, which is incorporated by reference in its entirety. This Addendum will take precedence over any conflicting terms of the Software License Agreement, and AGI reserves the right to update the terms from time to time, such changes taking effect upon delivery and/or use of any subsequent version upgrade. This Addendum contains those definitions and additional provisions that apply to Your use of Server Products.

DEFINITIONS

In addition to the definitions provided in the AGI Software License Agreement, the following definitions apply to this Addendum:

"Designated Server" means a single logical network entity that provides storage processing capability to Clients.

"Client(s)" means a Designated Computer that connects to and makes requests of a Designated Server.

"Cluster" means a group of physical or virtual terminals or workstations attached to a common control unit.

"Licensed Number of Processing Cores" means the number of processing cores that STK Server will utilize per license. If not otherwise specified in the Ordering Documents, the Licensed Number of Processing Cores for this Addendum is four (4).

"Server Cluster" means a group of linked servers, working together closely and deployed to improve performance and/or availability over that provided by a single server.

"Server Products" means STK Server, STK Data Federate, and STK Terrain Server.

"STK Data Federate" means the STK software product which provides a data management system that manages, stores and shares STK data across teams and organizations over a network.

"STK Server" means the STK server application software, including the application programming interfaces (APIs) that can be hosted on a designated server, cluster or server cluster and can serve functionality remotely executed over a network.

2. GRANT OF LICENSE

The following supplements Section 2, Grant of License, of the AGI Software License Agreement:

2.1 You may or you agree to:

  1. For each single license purchased, use Server Products only on a Designated Server at any one time;
  2. Make one (1) copy of Server Products in any machine readable form for backup purposes only in support of your own use of Server Products on a single server;
  3. Except as provided below, as a condition to the installation and use of Server Products, provide AGI the Host ID of the Designated Server. You further acknowledge and agree that in order to operate Server Products on a different, newly Designated Server, you will obtain AGI’s written consent to do so, and uninstall the Server Products from the then current Designated Server. You will also provide AGI with the Host ID of the newly Designated Server;
  4. Use Server Products in a cluster or server cluster environment;
  5. Use Server Products such that they are accessible to Clients over a network for the purpose of remotely providing STK capability; and
  6. Use Server Products utilizing up to the Licensed Number of Processing Cores on a Designated Server with unknown Clients.
  7. All rights not specifically granted herein or not specifically granted in the Agreement are prohibited.

Analytical Graphics, Inc.

Addendum 4 – Workgroup License

This Workgroup License Addendum sets forth the Supplemental Terms that apply to Your use of the Software under a Workgroup License Product Configuration, and includes the AGI Software License Agreement, which is incorporated herein by reference in its entirety. This Addendum will take precedence over any conflicting terms of the Software License Agreement, and AGI reserves the right to update the terms from time to time, such changes taking effect upon delivery and/or use of any subsequent version upgrade. This Addendum contains those definitions and additional provisions that apply to the Workgroup License Product Configuration.

1. DEFINITIONS

In addition to the definitions provided in the Software License Agreement, the following definitions apply to this Addendum:

"End Users" means employees within the same licensed Use Area.

"Local Area Network (LAN)" means any combination of two or more computers that are connected to each other and capable of sharing files, applications or information and that can be accessed from a single office location.

"Use Area" means a single, physical, licensed office location designated by You. If not otherwise specified in the Ordering Documents, the licensed office location is the physical office location receiving the Software.

"Wide Area Network (WAN)" means any combination of two or more computers that are connected to each other and capable of sharing files, applications or information and that can be accessed from more than one office location. A terminal server is a WAN if the computers capable of accessing applications and information on such server are located within more than one office location.

"Workgroup License" means a term license with annual subscription access based on the number of concurrent users.

"Workgroup License Key Server" means the computer hardware located within the licensed User Area to house the Software keys assigned to the End Users.

2. GRANT OF LICENSE

The following supplements Section 2, Grant of License, of the Agreement:

2.1 For each Workgroup License purchased:

  1. You may use this Product Configuration on multiple Designated Computers provided that such computers are located within the same licensed Use Area. The Product Configuration may be used by End Users only when they are in the designated Use Area and may not be accessed from any Branch Offices without obtaining additional workgroup licenses. Any End User whose primary work location is in the designated Use Area, and whose primary residence is outside of the designated Use Area, may access the Software from his primary residence through a secure network that requires a secure ID card or other more protective security safeguards;
  2. You acknowledge that in order to operate the Workgroup License Key Server outside of the designated Use Area, You will promptly obtain AGI’s written consent to do so. If a Workgroup License Key Server becomes inoperative due to malfunction, repair, or maintenance, You may request AGI’s permission to set up and temporarily use a single back-up Workgroup License Key Server on another computer in the same Use Area until the original Workgroup License Key Server returns to service; and
  3. You shall not allow use of the Workgroup Licenses over multiple subnets, multiple local area networks (LANs), the internet or other wide area networks (WANs).

2.2 All rights not specifically granted herein or not specifically granted in the Agreement are prohibited.

Analytical Graphics, Inc.

Addendum 5 – STK Viewer

This STK Viewer Addendum ("Addendum") sets forth the Supplemental Terms that apply to Your use of STK Viewer and includes the AGI Software License Agreement, which is incorporated herein by reference in its entirety. This Addendum will take precedence over any conflicting terms of the Agreement, and AGI reserves the right to update the terms from time to time, such changes taking effect upon delivery and/or use of any subsequent version upgrade. This Addendum contains those definitions and additional provisions that apply to STK Viewer.

1. DEFINITIONS

"STK Authoring Application" means a software product developed by or for AGI and released by AGI comprising file generation tools for saving source documents created using an AGI simulation product.

2. GRANT OF LICENSE

The following supplements Section 2, Grant of License, of the AGI Software License Agreement:

2.1 As long as you comply with the terms and conditions of this Agreement and subject to the conditions of use set forth below, AGI grants to you a non-exclusive, non-transferable license to use the STK Viewer solely for the purpose of viewing files created using an STK Authoring Application. You accept all responsibility and liability resulting from the selection of the STK Viewer to achieve your intended results, and for installation, use and results obtained from the STK Viewer, and for reliance on the results obtained.

2.2 You may make and distribute unlimited copies of the STK Viewer to third parties, provided all such copies include this Agreement and that use of the STK Viewer is conditioned on the assent of the recipient to the terms hereof. You must reproduce and include the copyright and other proprietary notices of AGI on all copies of all or any portion of the STK Viewer and the Documentation made by you.

2.3 All rights not specifically granted herein or not specifically granted in the Agreement are prohibited.

Analytical Graphics, Inc.

Addendum 6 - SimMetrics

This SimMetrics Addendum ("Addendum") sets forth the Supplemental Terms that apply to Your use of SimMetrics and includes the AGI Software License Agreement, which is incorporated herein by reference in its entirety. This Addendum will take precedence over any conflicting terms of the Software License Agreement, and AGI reserves the right to update the terms from time to time, such changes taking effect upon delivery and/or use of any subsequent version upgrade. This Addendum contains those definitions and additional provisions that apply to SimMetrics.

1. DEFINITIONS

"Client Application" means a software application that is installed and runs on a Designated Computer.

"Designated Computer" means a single electronic device for displaying, storing, and processing data.

"Designated License Server" refers to a centralized computer software system which provides access tokens, or keys, to client computers in order to enable the Software to run on them.

"Host Identification or Host ID" means the unique, physical address for the computer hardware.

"Nodelocked License" means a license tied to a specific computer based on that computer's Host ID.

"Server Application" means a software application that is installed and runs on a Designated Computer and makes resulting data available to an unknown number of workstations on a network.

"SimMetrics" or "Software" means all or any portion of the software technology, computer software code, code libraries, underlying organization, object model, and programs delivered on any media with which this Addendum is provided, including but not limited to (i) AGI or third party computer information or software; and (ii) digital images, stock photographs, video, clip art, sound(s) or other work.

"SimMetrics Bundle" means a set of license keys purchased from AGI and required for authorized access to the environment in which SimMetrics will be run, and includes the following:

(a) Visualization Client Run-Time License, which authorizes deployment of SimMetrics as a Client Application on a Designated Computer.

(b) Analysis Server Run-Time License, which authorizes deployment of SimMetrics as a Server Application on a Designated Computer.

2. GRANT OF LICENSE

The following supplements Section 2, Grant of License, of the Agreement:

2.1 You may or you agree to:

  1. For each SimMetrics Bundle purchased, use this Software only on a Designated Computer at any one time;
  2. Make one (1) copy of the Software in any machine readable form for backup purposes only in support of your own use of the Software on a Designated Computer;
  3. Except as provided below, as a condition to installation and use of the Software, provide AGI the Host ID of the Designated Computer or Designated License Server. You further acknowledge and agree that in order to operate the Software on a different, newly Designated Computer or serve licenses from a different Designated License Server, you will promptly obtain AGI’s written consent to do so, and uninstall the Nodelocked License from the then current Designated Computer or uninstall the Network License and any licensing tools from the Designated License Server. You will also provide AGI with the Host ID of the newly Designated Computer or the new Designated License Server;
  4. For each Visualization Client Run-Time License purchased, deploy SimMetrics as a Client Application on a Designated Computer; and
  5. For each Analysis Server Run-Time License purchased, deploy SimMetrics as a Server Application on a Designated Computer that is networked to Client Applications.

2.2 You shall not:

  1. Circumvent the operation of any Run-Time License by any means.

2.3 All rights not specifically granted herein or not specifically granted in the Agreement are prohibited.

Analytical Graphics, Inc.

Addendum 7 – Virtual Machines

This Virtual Machines Addendum ("Addendum") sets forth the Supplemental Terms that apply to Your use of the Software on Virtual Machines, and includes the AGI Software License Agreement, which is incorporated herein by reference in its entirety. This Addendum will take precedence over any conflicting terms of the Agreement, and AGI reserves the right to update the terms from time to time, such changes taking effect upon delivery and/or use of any subsequent version upgrade. This Addendum contains those definitions and additional provisions that apply to the use of Virtual Machines.

1. DEFINITIONS

In addition to the definitions provided in the Software License Agreement, the following definitions apply to this Addendum:

"Named User" refers to the single unique user who is identified as the named user within the Ordering Documents.

"Named User License" means a license tied to a single Named User regardless of physical workstation or network.

"Virtual Machine" (VM) is a software implementation of a machine (i.e. a computer) that executes programs like a physical machine.

2. GRANT OF LICENSE

The following supplements Section 2, Grant of License, of the AGI Software License Agreement. In so much as you may intend to deploy the Software in a virtual environment for the express purposes of maximizing hardware utilization, minimizing maintenance, or providing for disaster recovery:

2.1 You agree to the following:

  1. The use of the Software on a VM is only permitted when used in conjunction with a Named User license or a purchased set of networked licenses served from a remote server;
  2. Each instance of a VM in which the Software is executed will consume a single and unique set of purchased licenses; and
  3. The number of licenses in operation will never exceed the actual number of purchased licenses unless otherwise specifically permitted by written agreement with AGI. AGI may, from time to time, request a certification of the foregoing.

2.2 You shall not:

  1. Utilize a virtual environment in order to serve the Software out to multiple clients in excess of the number of purchased licenses.

2.3 All rights not specifically granted herein or not specifically granted in the Agreement are prohibited.

Analytical Graphics, Inc.

Addendum 8 – Annual Support and Upgrades Agreement

This Addendum ("Addendum") sets forth the Supplemental Terms that apply to Your purchase of Annual Support and Upgrades associated with the Software (as defined in the applicable AGI Software License Agreement) and includes the AGI Software License Agreement, which is incorporated herein by reference in its entirety. This Addendum will take precedence over any conflicting terms of the Software License Agreement, and AGI reserves the right to update the terms from time to time, such changes taking effect upon delivery and/or use of any subsequent version upgrade.

1. BENEFITS

The following benefits are available to You under this Addendum:

1.1 Technical Support

Technical Support is available in a variety of areas in support of Software usage including: licensing, installation and configuration support; application of best practices; integration with other software; special event assistance; and other technical problem analysis.

Technical Support is typically provided remotely by AGI's centralized technical support staff but may be supplemented with onsite support, as needed, at AGI's discretion.

Hours: 7am to 7pm (EST), Monday through Friday*
Phone: 1-800-924-7244 Toll-free in U.S. and Canada*
1-610-981-8888 Outside U.S. and Canada
Email: support@agi.com Web: www.agi.com/support (for common product support resources)

*For Technical Support outside of these hours or outside the U.S. & Canada, contact Your AGI point of contact or AGI reseller representative.

Technical Support outside of the above parameters may be available upon request.

1.2 Software Upgrades

Software Upgrades consist of new product releases which are issued periodically and may include new functionality, enhancements, and bug fixes. Software Upgrades are provided only for standard hardware platforms and operating systems supported by AGI as described in the Documentation. Software Upgrades will apply only to unmodified Software and commercially released updated versions of the Software. You are responsible for making or arranging for updates to interfaces for nonstandard devices or custom applications.

Software Upgrades are provided subject to the terms and conditions of the then current and applicable AGI Software License Agreement, available on AGI’s website at //www.agi.com/sla or with the deliverable Software or upon request.

All major product releases and maintenance releases may be downloaded directly from the AGI Customer Licensing System (CLS) (available at www.agi.com/CLS) or shipped directly to you, upon request. Interim maintenance releases are available at https://www.agi.com/product-explorer or on CD-ROM, upon request.

You may upgrade to the latest product version at any time during the term of the Annual Support and Upgrades Agreement. If you opt not to renew the Annual Support and Upgrade Agreement, You have 60 days from the end of the Annual Support and Upgrades Agreement term to upgrade to the latest product version available prior to the end of the Annual Support and Upgrades Agreement term. If You request an upgrade beyond this 60-day period, You will be required to renew the Annual Support and Upgrades Agreement in order to upgrade to the latest product version.

1.3 Software Transfers

If the Annual Support and Upgrades Agreement is active, Software may be transferred free of charge from one computer/user to another up to three times within any Annual Support and Upgrades Agreement period (see Section 2). If the Annual Support and Upgrades Agreement is inactive, Software transfers are subject to a transfer fee dependent upon the number and type of licenses subject to transfer.

1.4 Technical Support Life Cycle

If the Annual Support and Upgrades Agreement is active, AGI shall provide Technical Support for a previous version of the Software, up to a maximum of 5 years from the release of that version of the Software. This shall apply to all versions of the software other than maintenance releases. Upon request, at AGI's discretion, Technical Support for versions beyond 5 years from the release may be available.

2. AGREEMENT TERM, RENEWAL AND REINSTATEMENT

The term of the Annual Support and Upgrade Agreement shall be annual, unless otherwise stated in the applicable Ordering Documents, and must be renewed annually for ongoing access to the benefits stated above. If the Annual Support and Upgrades Agreement is not renewed by the end of the Annual Support and Upgrades Agreement term, all the rights and privileges associated with the Annual Support and Upgrades Agreement shall terminate. Thereafter, the Annual Support and Upgrades Agreement may be renewed; however, payment for the entire inactive term (i.e. the number of days the Annual Support and Upgrades Agreement is inactive) will be required in order to renew the Annual Support and Upgrades Agreement. In addition, a 2.5% reinstatement fee shall be applied for any inactive term of more than 30 days but less than 90 days. A 5% reinstatement fee shall be applied for any inactive term of 90 days or longer.

3. LIMITATION OF LIABILITY AND REMEDIES

During the term of the Annual Support and Upgrades Agreement, AGI will use commercially reasonable efforts to provide You with Technical Support to address any issue or problem determined to be in the Software. While it is AGI's goal to provide answers or solutions which address such issues or problems, AGI is unable to guarantee that every issue or problem can or will be resolved. EXCEPT FOR THE ABOVE EXPRESS LIMITED WARRANTY, AGI DISCLAIMS ALL OTHER WARRANTIES OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED, TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.

IN NO EVENT WILL AGI BE LIABLE TO YOU FOR ANY DIRECT, INDIRECT OR OTHER DAMAGES, INCLUDING ANY LOST PROFITS, LOST SAVINGS OR OTHER INCIDENTAL, SPECIAL, CONSEQUENTIAL OR EXEMPLARY DAMAGES ARISING OUT OF TECHNICAL SUPPORT, OR A LOSS OF DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIENCE OR OTHER TORTIOUS ACTION, EVEN IF AGI OR ANY AUTHORIZED AGI BUSINESS PARTNER HAD BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, NOR SHALL AGI BE LIABLE FOR ANY SIMILAR CLAIM AGAINST YOU BY ANY OTHER PARTY.

AGI'S OBLIGATIONS UNDER THE ANNUAL SUPPORT AND UPGRADES AGREEMENT, UNDER ANY THEORY OF LIABILITY OR CONTRIBUTION, SHALL NOT EXCEED THE AMOUNT PAID BY YOU FOR THE APPLICABLE ANNUAL SUPPORT AND UPGRADE AGREEMENT.

4. APPLICABLE LAWS

The Annual Support and Upgrades Agreement shall be governed and construed in accordance with the laws of the Commonwealth of Pennsylvania without reference to conflict of laws principles, except that U.S. Federal law shall govern in matters of intellectual property.

5. ENTIRE AGREEMENT

The Annual Support and Upgrades Agreement is the complete and exclusive statement of the understanding and contract between us and supersedes any and all prior oral or written communications relating to the subject matter hereof. This Agreement may not be modified, amended or in any way altered except by a written agreement signed by both you and AGI.

2009 Users' Conference Resources

2009 Users' Conference Resources

To request these resources on CD or to request supporting files, please contact the AGI Events Team at 610.981.8025 or events@agi.com.

  • Ignite Sessions

  • User Presentations

  • Communications


    • ArrayLab and STK: Dynamic Mission-Specific Communication Performance
      Kathy Minear, Harris Corporation

      Harris Corporation's dynamic system simulation tool ArrayLab analyzes communication performance of antenna arrays on dynamically maneuvering spacecraft or celestial bodies. The arrays feature arbitrarily placed and oriented elements in a wide variety of configurations and are controlled using adaptive and model-based algorithms. ArrayLab, written entirely in Mathwork's MATLAB, directly and interactively interfaces with STK for pertinent space-time data needed to analyze multiple simultaneous links. Together, the software programs provide step-by-step communication analysis and visualization throughout the mission scenario. This presentation will concentrate on how the merger of the two tools simplifies communication systems design trades and allows performance to be accessed for the specific orientations and positions of the proposed array as it communicates with the targets of interest.

    • Improved Communications Hardware Testing Using STK
      Steve Williams, RT Logic

      More comprehensive testing of RF communications hardware is achieved with lower cost and risk by using AGI's STK application to realistically simulate the channel conditions that will be experienced in nature.

      RT logic describes how STK is used to control laboratory RF test and measurement equipment to precisely create the received powers, antenna geometry, Doppler shifts, range delay, attenuation, noise, interference and other RF channel characteristics and behaviors experienced in the field. This allows many more test scenarios to be readily evaluated including those that would be impossible, dangerous and/or too expensive to conduct outside the lab. Recent applications to missile test range planning and the design of a satellite crosslink are discussed to demonstrate how higher levels of mission readiness confidence were achieved through this pre-mission, hardware-in-the-loop, full-path testing approach. GIS

    GIS


    • An Introduction and Update to the CJMTK Geospatial Appliance
      Brett Cameron, Northrop Grumman

      The CJMTK Geospatial Appliance (CGA) offers the AGI user community a turnkey solution to the NGA geospatial data needs. The CGA is a bundle of hardware, software and geospatial data that provides out-of-the-box functionality throughout the hosting of application-ready data. This data is hosted via WMS, KML, Rest, Geodatabase or file-sharing access methods. Data includes the entire holdings of the NGA unclassified VPF, DTED and RPF data sets.

    • A Mission Planning Tool for Maritime Operations
      Mike Gingell, General Dynamics Canada

      General Dynamics Canada and Defence R&D Canada (DRDC) are developing a Mission Planning Tool (MPT) for Canadian Forces maritime operations. The MPT will be used for detailed mission planning and options analysis ahead of deployment; for guiding mission execution in theatre; and for de-briefing post deployment. The MPT will also support training and tactics development. The MPT is based on a service-oriented architecture (SOA) that provides common data-sharing capability for command and control (C2) and allows the system to take advantage of network resources such as environmental or geographic data when available, or to operate independently when connectivity is poor or disrupted. To meet the operational requirement, the MPT also has to have several other demanding capabilities. These include high-performance Geographical Information System (GIS) functionality, the ability to execute external custom models and the ability to simulate and track multiple platforms in the scenario.

    • Visual Analysis of Vehicle Simulations, INS/GPS Solutions and Real-World Data
      Robert Addiss, senior software engineer, CAST Navigation, LLC

      CAST Navigation, LLC, used STK Engine to create a 2-D and 3-D modeling and simulation application that tested aircraft missions and included the plane's ability to access GPS satellites. This presentation will describe the challenges presented to CAST by its potential customer and how STK Engine software was critical to creating a solution that exceeded expectations within an aggressive time schedule.

    ISR Mission Planning


    • Assessing ISR and Comm Planning
      Lt. Col. Brian Zacherl, operations analyst, United States Marine Corps

      The United States Marine Corps, with the help of AGI, has built and deployed two ruggedized computers in Afghanistan that use STK to assess the success of intelligence, surveillance and reconnaissance (ISR) and communications planning. Operations currently require a trained analyst, but the Marines are working toward a deployable application for untrained users.

    • Configuring STK to Drive Operational and Concept Analysis
      Arthur Brooks, senior systems engineer, L-3 Integrated Systems

      L-3 Integrated Systems, Mission Integration Division, Modeling Simulation and Operations Analysis (MSOA) Group supports analysis, operational, system and design concepts through a robust constructive modeling and simulation environment. Using STK Professional Edition, STK/Coverage, STK/Aviator and STK/Communications, the MSOA has added credibility to proposal submissions and shaped early phase program development. This presentation will demonstrate how the MSOA group configures STK to predicted performance, dependency, sensitivity, utility and inefficiency to support existing and future programs.

    Missiles


    • Custom Logic for Airborne Early Warning
      Timothy Booher, US Air Force, Pentagon

      How much is a pound of ISR worth? What impact does sensor capability have on a military campaign? How does ISR reduce risk in the integrated air and missile defense mission? The answers to these questions, while difficult, are of active interest to Pentagon senior leadership. This presentation will address the complexities of modeling ISR and how Headquarters USAF A9 integrated STK with MATLAB, Ruby and Google Picasa to illuminate the risk inherent in various future ISR acquisition programs. The flexibility, support and visual feedback available in STK enabled a year-long study to be completed in a month—in time to influence the acquisition of a major ISR program.

    • Missile Flight Test Planning and Analysis with STK
      Franklin Grose, senior space systems analyst, SAIC

      The System Test and Evaluation Planning Analysis Lab (STEPAL) exists to provide the Missile Defense Agency (MDA) Ballistic Missile Defense System with an analytical resource to develop and assess flight test events that demonstrate the system's inherent performance capability. Since its inception in 2002, STEPAL has relied upon STK and other AGI products to examine threat capability, the system's operational characteristics, range safety compliance and engagement parameters to assess how flight tests fit into the operational space. This presentation will discuss key technical capabilities of AGI's software that make it an invaluable tool for STEPAL analysts and how STK contributes directly to the successful execution of the STEPAL mission.

    • Optimal Weapon Allocation Solution Built With AGI Software
      Dr. Shaonn Shon, Signature Analytics

      Signature Analytics LLC conducted an 'Automated Weapon-Target Allocation Optimization' study under an MDA SBIR Solicitation topic on Battle Management and Planning Aids. The Solicitation called for "a feasibility study of innovative, advanced and robust weapon target allocation algorithms applicable to missile defense, to extend, enhance, optimize and automate the BMDS battle management and planning capabilities." This presentation discusses how the breadth, flexibility and extensibility of AGI software were leveraged to eliminate much of the time and cost of demonstrating the solution. Custom code was integrated with STK, STK/Analyzer, STK/Scheduler and STK/Missile Modeling Tools into a weapon allocation solution. This allowed Signature Analytics to focus on its expertise, demonstrate a solution in just six months and capture a follow-on contract award.

    Space


    • Development, Deployment, Training and Education Using STK
      Joyce Stivers, principal analyst, Northrop Grumman

      Operators supporting Air Force Space Command are facing rapidly changing mission objectives. These changes generate new requirements that need to be addressed quickly with limited budgets. Further, operators are frequently expected to perform tasks concerning spacecraft operations for which they are minimally prepared. This challenging environment requires:

      • a solution that provides efficient operations with systematic and repeatable processes
      • a diverse set of validated algorithms coupled with the use of Air Force Standards software
      • a training and educational program designed to prepare the operators for the rigors of spacecraft operations.

      This presentation will describe the OPS Tool Set, built on AGI's STK Engine and implemented in an operational environment. It will cover why STK Engine is a key solution for this type of environment and describe a series of training tutorials that have been created to support the operational application.

    • IBEX Mission Planning and Operations
      Michel Loucks, owner and principal astrodynamics scientist, Space Exploration Engineering Co.

      NASA's Interstellar Boundary Explorer (IBEX) mission was successfully launched on October 19, 2008, and is now exploring the interaction between solar wind and the interstellar medium. Mike served as the trajectory lead for the Flight Dynamics Team that used STK/Astrogator as the sole mission-planning tool and Orbit Determination Tool Kit for orbit determination. The flexibility and power of these tools allowed operators to completely re-plan the mission several times after launch in order to accommodate additional requirements from the science team.

      Mike will describe and demonstrate:

      • Techniques used in operations to plan the trajectory ascent, accounting for launch and maneuver dispersions.
      • Results of maneuver planning and calibration.
      • Reconstruction of the launch and solid rocket motor firing.
      • Models and algorithms used to plan multiple-maneuver phasing loop ascent.
      • How the final mission orbit was achieved.
      • How Monte Carlo analysis during operations ensure that the science objectives will be met over the two-year mission lifetime.

    • Kepler Dust Cover Ejection Event Design and Optimization
      David Acton, Ball Aerospace & Technologies Corp.

      STK Professional, Astrogator, and Analyzer were used to design and analyze a dust-cover release attitude for the Kepler spacecraft, with the goal of ensuring safe relative trajectories after the release event. Kepler is a deep space NASA mission intended to find Earth-like planets around other stars. This presentation will cover how the software was employed for mission planning and in real-time operations.

    • Satellite Maneuver and Catalog Mistag Detection via TLE Analysis
      Dr. Jacob Griesbach, Chief Scientist, Agilex Technologies

      Using a MATLAB script through the STK/Integration Object Model interface, Dr. Griesbach identifies satellite maneuvers and mistags in the satellite catalog database. He will describe how, by using STK to propagate forward a given satellite’s TLE data to the time of the next TLE update, the prior (predicted) and updated positions may be simply differenced. The resulting difference measurements give observations regarding estimating the expected TLE positional error uncertainty. A byproduct of this analysis is that satellite maneuvers exceeding the error uncertainty result in TLE difference spikes. These spikes may be simply thresholded to detect maneuvers, or with a much larger threshold, catalog mistag errors.

    • STK in Launch Range Support Analysis
      Jay Pittman, Range and Mission Management Office chief, Wallops Research Range

      The Wallops Research Range is NASA's only launch range. It provides launch support for operational as well as first-of-kind launch vehicles, payloads and technologies. In 2004, the range initiated the STK-based Mission Planning Laboratory (MPL) to assist its operations teams with planning and optimization tasks associated with flight operations support. The effort has been an overwhelming success and has grown beyond its original intent. This presentation will describe how the MPL is used pre-and post-flight to visualize, analyze and optimize mission specifications and how it has aided in the growth of the Wallops range.

  • "Under the Hood" Technical Seminars

    • Aviator Software Architecture
      Tom Neely, AGI

      The Aviator expert system comprises a large COM API with more than 200 objects implementing 500 interfaces along with 100 ActiveX controls. This talk will examine how this system is integrated with STK and how it can be integrated with other applications.

    • Attitude Modeling in STK
      Dr. Sergei Tanygin, AGI

      Attitude modeling is an important part of many computations performed in STK including sensor targeting and intervisibility analysis, force modeling, antenna link budget, sensor swath, coverage and visualization. The models range from simple inertially fixed alignment to numerically integrated attitude. The models can be customized using various configuration parameters and new models can be created using custom plugins and components from Vector Geometry Tool. Attitude information is available in various reports, graphs and 3D displays. It can also be exported into a file for further processing outside of STK. Conversely, external attitude data can be imported into STK via file or Connect interface. STK 9 includes several new types of attitude models available via the Vector Geometry Tool.

    • Covariance Realism
      David A. Vallado, Center for Space Standards & Innovation

      Covariance information from orbit determination is becoming a popular means to assess the validity of many space operations. There have been scattered claims and discussion of realistic covariance, but few, if any, detailed studies to demonstrate the actual performance against independent references. This paper shows the performance of predicted ephemeris errors against reference and precision orbits, to what the covariance propagation provides. Several satellite orbital classes are studied.

    • Intimate Communication Network Simulation with STK and QualNet
      Dr. David Finkleman, CSSI

      This presentation is an introduction to new collaboration between STK and communication network simulations. The new paradigm is to replace QualNet physical layer calls with the rich STK physical layer, as opposed to the previous approach where communication transactions controlled through applications were invoked only when all STK constraints were satisfied. Our experience with this important collaboration led to a more intimate exchange beyond STK Connect commands. The fundamental exchange objects are QualNet network interfaces. These interfaces acquire properties of transmitters and receivers in STK with the attributes that the communication objects inherit from sensors and platforms. Interfaces on host objects can be linked wirelessly or assigned to wireless subnets. The STK and QualNet object browsers are available in the same graphical user interface. The user can coordinate and execute both simulations simultaneously. Using practical airborne relay and satellite scenarios, we will show that physical access is necessary but not sufficient. We will demonstrate how higher layer network interactions and background traffic can inhibit links that enjoy complete physical access.

    • Maximizing STK 9's Automation and SOA Capabilities
      Dr. T.S. Kelso, Center for Space Standards & Innovation

      Many users operate in an environment where analysts must perform structured tasks with standard data. Oftentimes, these analysts need to use the power of STK but may have rudimentary skills in implementing their workflows in a standardized fashion that ensures effective use of their time. The good news is that STK 9 incorporates several new features that make it easy to deploy standardized workflows that use approved data sources. We will examine how standardized workflows can be deployed from a corporate Intranet or the Internet to provide STK-based tools for analysis. Examples from Rev 2 of SOCRATES-GEO will be used to illustrate how this supports conjunction monitoring.

    • Methods of Orbit Propagation
      Dr. Vince Coppola, AGI

      AGI products model orbit trajectories in many ways. In this presentation, a variety of methods including closed-form analytical solutions, general perturbations, semi-analytic solutions and special perturbations will be described. We will discuss advantages and disadvantages of the various methods, and their applications with AGI products.

    • Modeling Antenna Attitude and Positional Offsets
      Dr. Haroon Rashid, AGI

      This presentation focuses on the enhancements made to the STK/Communications module for more accurately modeling antenna attitude and positional offsets relative to the parent object. This becomes critical when computing access intervals and modeling link degradation due to obscuration of the parent body. This presentation will also touch on the new STK 9 antenna object and best practices for using it in modeling communications systems.

    • Modeling Dynamic Urban Propagation Loss
      Dr. Haroon Rashid, AGI

      Computing RF urban propagation loss is a challenging task due to high barriers imposed by the urban construction. The line of sight (LOS) obstructions due to buildings, reflections from the building faces, multipath echoes and propagation through walls present tricky situations. The problem can be further compounded by the dynamics of the objects. One or both terminals of a communications link may be mobile at the same time and may be moving in or out of the urban environment. We review several possible configurations in this session. We start with the communications terminals in space and move toward an urban area, covering situations where one terminal is in an urban environment, including the case where both terminals may be outside the urban area but the communications may be passing through or grazing the urban landscape. A couple of examples are presented and a possible future development direction is discussed.

    • Moving Heaven and Earth: Implementing the International Celestial Reference Frame
      John Seago, AGI

      The IAU 2000A precession-nutation theory relates the International Celestial Reference Frame (ICRF) to the International Terrestrial Reference Frame (ITRF). This new theory became the official IAU standard in 2003. Unfortunately, we now have several documented or implemented standards that relate the ICRF and ITRF but differ to within several micro-arcseconds. These differences are mainly caused by changes of variables and very slight changes in modeling, and are fairly close to the original level of precision of the IAU 2000A nutation model (one micro-arcsecond). For example, the IAU replaced the IAU 2000A precession component with a new precession model that officially went into effect January 2009. AGI has now implemented many of these methods, but added a bonus method: one that maintains the original level of precision but runs almost 400 times faster.

    • New Computational Tools for STK 9
      Dr. Sergei Tanygin, AGI

      Timeline and Calculation tools are developed to unify, standardize and customize use of time and other calculations within STK. The tools are designed using the same methodology as Vector Geometry Tool. This includes having various types of components for different calculations, placing these components within a common browser, accessing them by name via GUI, Connect and eventually Object Model, providing a number of pre-configured components, creating new custom components using existing components and using template components for all instances of the same STK object type.

    • Powered Missile Flight Simulation Using STK/Missile Modeling Tools
      Chris Weekley, Science Applications International Corporation (SAIC)

      For designers and analysts of ballistic missiles, kinetic interceptors, sensor systems and integrated missile defense architectures, STK/Missile Modeling Tools (STK/MMT) simulates threat trajectories, intercept engagements and defense system performance. STK/MMT delivers system-level fidelity without complexity. This allows users to incorporate realistic missile simulation into analysis without specialized training or knowledge. This presentation describes the background and modeling detail employed in STK/MMT to simulate boost, midcourse and terminal phases of ballistic missile trajectories. Topics include software heritage to the Strategic and Theater Attack Modeling Process (STAMP) application funded by the National Air & Space Intelligence Center (NASIC) and modeling approaches for gravity, atmospheric drag, propulsion, guidance, post-boost vehicle maneuvers, free flight and reentry.

    • SensorCAD Under the Hood: Radiometrics and the Electro-Optical Sensor Model
      Bob Anderson, Space Dynamics Lab - Utah State University

      This presentation will introduce the measurement of optical radiation as it relates to the SensorCAD Electro-Optical sensor model. Topics covered include:

      • Optical radiation and its generation by sources being imaged and its transport to the sensor
      • Transformation of the optical radiation into a digital readout
      • Noise and Signal to Noise Ratio

      Related terms and their meanings, e.g. dynamic range, quantum efficiency, relative spectral response

    • Space Environment and Effects Toolkit (SEET) Technical Primer
      Dr. Richard A. Quinn and Paul P. Whelan, Atmospheric and Environmental Research, Inc. (AER)

      AER's Space Environment and Effects Toolkit (SEET) provides extensive modeling of the near-Earth space environment, with the capability to predict various effects on space vehicles. SEET's functionality is provided by six components consisting of scientific models of the space environment, including: Radiation Environment, South Atlantic Anomaly (SAA) Transit, Particle Impacts, Near-Earth Heavy Ion Environment, Vehicle Temperature and Magnetic Fields. These components are seamlessly integrated into the overall STK user interface and fully accessible through STK Engine as well. This talk will focus on giving a technical underpinning for the SEET, SAA-Transit Component in the context of a typical use case. The SAA is a near-Earth region of highly energetic charged particles which can easily penetrate spacecraft and create negative impacts on internal electronics. Impacts include single-event upsets (SEUs) and internal deep-dielectric charging/discharging. The current SAA model was developed at the Air Force Research Laboratory by binning six years of data from the Compact Environment Anomaly Sensor on-board the TSX-5 satellite. A general description of the physics of the SAA will be given, as well as a technical review of the model itself, followed by a description of a typical use case, computing entrance and exit times for a LEO orbit and ways that end-users (e.g. satellite operators) could expand the utility of the model using their own anomaly databases.

    • Trajectory Optimization in STK 9
      Patrick Williams, Penn State University

      As of the release of STK 8.1, users were given the ability to insert their own targeting profiles in STK/Astrogator via a search plugin. These plugins can be used to implement user-defined optimization algorithms (either coded in-house or from an external source) within STK/Astrogator, allowing for optimization of mission parameters and mission segments. In the fall 2009 release of STK 9.1, users will also be able to add and integrate their own variables to STK's internal state vector. This process allows for trajectory optimization through an indirect optimal control method. Both a basic optimization search plugin and optimal control setup will be described, as well as how to use them in coordination to solve the cumbersome optimal control problem.

    • Using Root-Finding and Optimization Search Algorithms in Maneuver Planning
      Paul Black, AGI

      Root-finding and optimization search algorithms play an important role in trajectory design and maneuver planning problems. The algorithms find the times, directions and magnitudes of maneuvers needed to meet mission requirements. In this presentation, several such algorithms are discussed, including the bisection search, Newton-Raphson, differential correction and gradient optimization methods. Examples of using these methods with STK/Astrogator to solve maneuver planning problems are provided.

    • Wireless InSite Real-Time® Urban Propagation: Reasonable Fidelity in Real Time
      Gregory Skidmore, Remcom

      AGI's STK/Communications software is being enhanced to provide EM urban propagation calculations using Remcom's Wireless InSite Real-Time. This talk provides an overview of Wireless InSite Real-Time, which combines optimized ray-tracing techniques developed at Remcom and Wireless InSite's powerful geometry processing capabilities with novel techniques to quickly estimate field levels in an urban environment. The result is a capability to predict the path loss between a given transmitter and receiver pair with calculation time on the order of a millisecond. The discussion covers the suite of real-time models that are included in the calculation engine and describes the general algorithms used in each model. It concludes with a comparison of results between higher-fidelity physics models and the real-time models, along with the computational savings (orders of magnitude) that the real-time models provide over full physics models.

  • Developer/Integrator Sessions

  • AGI Components


    • AGI Components Communications Library
      Trevor Stief, AGI

      This talk will present best practices for using the AGI Components Communications Library. Learn how to develop software which models the signal links between platforms using the antenna models and propagation effects provided by this library. A comparison with the STK/Communications Specialized Analysis Module will also be provided.

    • Building Vehicle Routes with AGI Components' Routing Library
      Richard Page, AGI

      Discover the functionality, usability and sample code planned for AGI's "Routing Library." This library creates dynamic ground, sea and air vehicle routes for mission planning.

    • Developing with Insight3D
      Patrick Cozzi, AGI
      Michael Bartholomew, AGI

      Learn the major features of this new 3D visualization component, including terrain, imagery, primitives, overlays and camera control. A wide array of code examples, screen shots, demos and performance best practices are also included.

    • Leveraging Multi-Core/64-Bit Processors with AGI Components
      Frank Stoner, AGI

      AGI Components are built to take advantage of the latest processor technologies, such as multi-core processors, which allow multiple computational threads to work toward a problem solution in parallel,and 64-bit processors, which use significantly larger process memory spaces. Learn how the AGI Components team leveraged a Dual Quad Core, 64-bit Windows XP Workstation with 32 GB memory to quickly solve the complex problem of identifying possible collisions between nearly 12,000 Earth-orbiting satellites and debris.

    STK/STK Engine


    • Developing with the Astrogator 9.0 OM and Scripting Tool
      Paul Black, AGI

      Uncover the basics of the STK/Astrogator Object Model, including points like stopping conditions and single segment mode. A simple scenario including targeting will be created. Discover the new scripting tool via examples such as having one control map to more than one place, using ST as an initial guess tool and using the ST to augment MCS logic.

    • Platform Independence: Developing STK Engine Applications with Java
      Matt Ward, AGI

      Learn how to utilize the STK Engine from AGI's Java API in various Java application configurations. Specifically, key points/best practices/code samples will be discussed for embedding the Map/Globe/Object Model in AWT/Swing and SWT RCP applications on Windows/Linux/UNIX platforms.

    • Real-Time Tracking Technology (RT3) Integration
      Matt Amato, AGI

      Get your RT3 development feet wet with an overview of RT3 architecture, plug-in points and integration options.

    • STK 9 OM Usability Improvements
      Matt Ford, AGI

      The STK 9 Object Model features usability improvements including code snippets, new automation events and many coarse-grained convenience functions for rapid development. Several code examples demonstrating the new interfaces will be presented.

    • STK 9 UI Plugins
      Ed Mackey, AGI

      Integrators can now create custom workflows for the STK 9 desktop via User Interface (UI) Plugins. Examples will show how you can design toolbars, GUI panels and context menu options that integrate third-party or in-house capabilities inside of STK.

    Orbit Determination Tool Kit (ODTK)


    • Integrating ODTK & STK with Scripting
      Tom Johnson, AGI

      Learn from a master Orbit Determination Tool Kit scripter advanced techniques and tricks for manipulating ODTK scenarios and interfacing with STK & STK/Astrogator maneuvers. ODTK 6 scripting improvements will be highlighted. Examples in several scripting languages will be provided.

  • Conjunction Analysis Workshop

    • A Description of Filters for Minimizing the Time Required for Orbital Conjunction Computations
      Dr. Jim Woodburn, technical director/chief orbital scientist, AGI

      Identifying potentially dangerous conjunctions is most commonly done by determining periods of time when two objects have an unacceptable risk of collision. Solving this problem for the entire catalog of objects vs. all other catalogued objects quickly illustrates the need for computational acceleration techniques.

      Hoots et al.1 designed a series of three filters through which candidate objects have to pass before a final determination of the close approach distance is made. Two of the filters are purely geometrical and one uses the known properties of the orbital motion of the two objects. These filters serve to "weed out" the majority of the objects in the catalogue and greatly reduce the number of computations needed. After the application of the filters, the trajectories of the remaining candidate objects are sampled to determine the actual close approach periods. The three filters will be referred to as the apogee/perigee filter, the orbit path filter and the time filter. These filters are easy to understand, but in practice they have been shown to be inadequate when implemented as originally described. Additionally, the filters were originally designed for use with a space catalog comprised solely of two line element (TLE) sets. Now that a special perturbations version of the space catalog is being generated, any dependence on TLEs must be eliminated.

      For each of the filters put forth in Hoots et al., we will examine the premise of the filter, demonstrate failure cases and provide details of an improved implementation. The assumptions and potential failure cases for the improved implementations will be identified. Requirements for the use of computational pads will be examined along with the associated impact on computation time. The computational efficiency provided by each filter will be tabulated both independently and in conjunction with other filters. Finally, the reliability of the filtering process will be evaluated using an "all on all" example where results will be generated with and without the use of conjunction filters.

    • A New Measure of Nonlinearity for Relative Motion during Close Approach
      Dr. Sergei Tanygin, senior astrodynamics specialist, AGI

      A new measure of nonlinearity for relative motion during close approach is introduced. It is based on the second order expansion of the two-body differential equation. The measure compares contributions from the first and second order terms and quantifies nonlinearity of the relative motion by the relative significance of the second order term. Given this measure and some nonlinearity threshold, a volume of space around a primary satellite can be defined within which the relative motion of any secondary satellite or a piece of debris can be considered linear.

    • Assessing Satellite Conjunctions for the Entire Space Catalog using COTS Multi-core Processor Hardware
      Dr. Vince Coppola, senior astrodynamics specialist, AGI

      This presentation discusses results for the all-on-all conjunction assessment of ~12,000 objects over both a one-day and five-day analysis period. Two methods for obtaining the state information for the space objects are considered. The first method utilizes analytical propagation of the orbit state from known elements at a given epoch (i.e., using SGP4 with TLEs). Analytical propagation reduces the computer memory footprint of each object at the expense of reduced accuracy of the ephemerides themselves. The second method models the ephemeris of each space object using a table of ephemeris coupled with an interpolation method. The accuracy of the ephemeris can be made quite high using this scheme; however, the memory footprint per object is greatly increased.

      Two different software implementations will be used. The first software implementation is a general purpose COTS 32-bit application which has, as part of its feature set, the ability to perform conjunction analysis between space objects. The second software implementation is a custom application designed specifically to perform conjunction analysis between space objects, but built using a set of COTS software components.

      Performance and accuracy of the determination will be presented using three hardware configurations: a single 32-bit 4Gb RAM dual-core COTS personal computer (~$2.5K); five 32-bit 2Gb RAM dual-core COTS personal computers (each ~$2.5K); and a single 64-bit 32Gb RAM 4-core dual processor COTS personal computer (~$5K). Each will be running on a commonly available Windows operating system.

    • Anti-Satellite Engagement Vulnerability
      Dr. Sal Alfano, senior research astrodynamicist, CSSI

      This presentation discusses several simplifying assumptions that can be made to initially assess the threat from an ASAT interceptor to produce a conservative engagement volume. An initial determination of vulnerability can be made by assuming the interceptor is given all its energy at launch and follows a ballistic trajectory to the target. The resulting trajectory begins at the launcher altitude and follows a simple two-body dynamical path until reaching the target satellite. The mathematical equations for such free-flight representation are explained by Bate in describing ballistic missile trajectories for a spherical, rotating earth. This work modifies their approach because the target is in orbit and the launcher can be located above the earth's surface. The effect of earth rotation is addressed by transforming from the ECEF frame to an Earth-Centered Inertial (ECI) frame.

      An engagement volume relative to the interceptor's launch platform is determined by creating a sufficient family of forward trajectories based on different initial launch azimuths and elevations; this volume is sometimes referred to as a "kill basket." Entry and exit times through this volume define the bounds of satellite vulnerability for a specific launcher and specific type of ASAT missile on an ascending or descending intercept profile. Alternately, a vulnerability region can be represented as a geographical footprint relative to satellite position that encompasses all possible launcher locations for a specific interceptor. This is accomplished by creating a sufficient family of backward trajectories from the target satellite using maximum range equations for ascending or descending intercepts based on the ASAT missile's burnout energy.

      These volumes and footprints are created by simply knowing the interceptor's final ECEF energy and are only approximations due to the aforementioned assumptions. The intercept trajectory time of flight from launch to burnout will be underestimated because the actual powered flight segment takes longer than its ballistic representation. The intercept range from launch to burnout will be overestimated because the actual powered flight covers less ground than its ballistic representation. This causes the preliminary analysis to be conservative, creating an oversized volume or footprint. Because of this, the results are adequate for understanding and visualizing the threat, as well as determining if more detailed analysis is required. The actual missile fly-out profile for a specific engagement would be required to more accurately assess the threat.

    • Analysis of the Iridium 33-Cosmos 2251 Collision
      Dr. T.S. Kelso, senior research astrodynamicist, CSSI

      On 2009 February 10, Iridium 33 - an operational US communications satellite in low-Earth orbit - was struck and destroyed by Cosmos 2251 - a long-defunct Russian communications satellite. To better understand the circumstances of this event and the ramifications for avoiding similar events in the future, this presentation provides a detailed analysis of the predictions leading up to the collision, using various data sources, and looks in detail at the collision, the evolution of the debris clouds, and the long-term implications for satellite operations. The only publicly available system available to satellite operators for screening for close approaches, SOCRATES, did predict this close approach, but it certainly wasn't the closest approach predicted for the week of February 10. In fact, at the time of the collision, SOCRATES ranked this close approach 152 of the 11,428 within 5 km of any payload.

      A detailed breakdown is provided to help understand the limitations of screening for close approaches using the two-line orbital element sets. Information is also provided specifically for the Iridium constellation to provide an understanding of how these limitations affect decision making for satellite operators. Post-event analysis using high-accuracy orbital data sources will be presented to show how that information might have been used to prevent this collision, had it been available and used. Analysis of the collision event, along with the distribution of the debris relative to the original orbits, will be presented to help develop an understanding of the geometry of the collision and the near-term evolution of the resulting debris clouds. Additional analysis will be presented to show the long-term evolution of the debris clouds, including orbital lifetimes, and estimate the increased risk for operations conducted by Iridium and other satellite operators in the low-Earth orbit environment. The final portion of the presentation will look at how collaborative efforts, such as the current Data Center operations supporting SOCRATES-GEO, might be used to reduce the overall risk of similar events in the future.

    • Discriminating Threatening Conjunctions with Data Fusion Principles
      Dr. David Finkleman, senior scientist, CSSI

      The objective of the presentation is to apply information theory and data fusion principles to discriminating the most important satellite conjunctions from thousands of close approaches that occur every day. The significance of predicted conjunctions is now determined from single conjunction assessments based on the most current orbit data. Generally, attention focuses on the few most probable conjunctions at each reporting interval. The hierarchy of probability changes with each assessment. Highest probabilities on previous assessment may be supplanted by currently more likely events. However, the probabilities that caused concern previously generally have not changed, and conjunctions that demanded attention previously and which are yet to come still deserve attention. We will demonstrate conjunction significance assessment techniques that fuse past conjunction reports, information about the conjunction partners, and estimates of the consequences should collision occur. We will show that these techniques would have discerned the Iridium 33 - Cosmos 2251 collision days before it happened. We will also show how these techniques illuminated several important events since the Iridium/Cosmos collision.

      Once a conjunction rises to immediate high probability, we determine how many other conjunctions the most significant collision partner might be exposed to within the assessment period. We then compound the probabilities of all of these estimated events in chronological order. The important measure is how likely the most valuable asset is to collide with anything during the assessment period, not just how likely the single highest probability is. We demonstrate this with a very recent cluster of conjunctions experienced by Cosmos 1818. We assess consequences with trusted fragmentation models and note the distribution of fragment masses and trajectories. We also consider the characteristics of the satellite missions and payloads.

  • User Group Meetings

  • Users' Conference Photo Galleries

  • Users' Conference Videos