Demonstrators and technologies to defeat threats posed by Unexploded Explosives Ordnances (UXO) and Improvised Explosive Devices (IED)
EDF Research Actions
Basic Information
- Identifier
- EDF-2023-RA-PROTMOB-DEXPLO
- Programme
- Call for EDF research actions implemented via actual cost grants
- Programme Period
- 2021 - 2027
- Status
- Closed (31094503)
- Opening Date
- June 21, 2023
- Deadline
- November 21, 2023
- Deadline Model
- single-stage
- Budget
- €157,000,000
- Min Grant Amount
- –
- Max Grant Amount
- –
- Expected Number of Grants
- –
- Keywords
- EDF-2023-RA-PROTMOB-DEXPLOEDF-2023-RA
Description
Thanks to the studies validated through demonstrators and field experiments, the following impacts should be delivered:
- significantly improve counter-mine IED and UXO technologies to deal with new and evolving threats;
- facilitate the development of new technologies that each Member State, EDF associated country or industry partners cannot achieve easily on its own;
- reduce the development time of counter explosive threat solutions;
- contribute to increasing the industrial cooperation and integration between European defence companies and SMEs;
- contribute to the strategic autonomy of the EU.
In the context of a changing geopolitical landscape, Member States and EDF associated countries (Norway) armed forces are facing new and evolving threats encountered in asymmetrical and potentially in symmetrical operational situations. This is the case of IED (subsurface, surface, directional/side attack; suicide person- and vehicle-borne) and UXO (bombs, shells, grenades, land mines and cluster munitions), which entail a significant hazard for military personnel, critical infrastructures and equipment in both urban and out-of-area operations. Obtaining effective countermeasures (detection and mitigation) against these threats is therefore essential to improve force mobility and freedom to act, by increasing the security in operation areas.
An important challenge of counter-IED, and UXO capabilities lies in the fact that the threat evolves constantly (e.g. IED systems carried by UAVs, or IEDs using frequencies that are not yet addressed by our electronic counter measure (ECM) equipment/systems, etc.). As a consequence, our systems need to be adapted accordingly to remain up-to-date with these evolutions, while keeping up compatibility with the operational use (not requiring a high level of expertise) and the rhythm of the manoeuvre.
This research topic aims at developing technologies to defeat the threats posed by explosive ordnance (UXO and/or IED), in complex and diverse environments within the military domain.
Specific objective
The main objective of this topic is to prepare a next generation of explosive hazards countermeasures (equipment, materials, etc.) using innovative technologies in order to perform the following functional tasks:
- threat detection (including identification, classification and data fusion) - Rapid and improved (e.g. remote or stand-off) detection of buried or hidden UXO/IED, including threat identification and classification, including area monitoring for the presence of explosive threats. Sensor fusion to achieve a more reliable output is considered under this topic, as well as the use of UAV/UGV for remote detection;
- threat investigation - Following the UXO/IED first alert, obtained either by means of device/explosive detection or from a suspicious behaviour/event, the confirmation of it being a real or false alarm may be necessary. Technologies for threat investigation operations are considered in this topic (e.g. land digging by specialised UGV);
- neutralisation and disposal;
- decoying;
- electronic counter measures;
- breaching.
This topic will contribute to studies aiming at maturing innovative technologies in order to overcome current and new threats (UXOs and/or IEDs).
Scope:The proposals must focus on the research of new technologies and adaptations of existing technologies addressing the above-mentioned counter-IED/UXO functional tasks, including (but not limited to) the following technologies:
- threat detection: visible/infrared (IR) imagery, laser, integration of electro-optical (EO)/IR passive (including hyper/multispectral) and active (LIDAR) sensors, integration of non-linear junction detection, wire detection, change detection, radar (GPR, SAR), terahertz imager, artificial intelligence (AI) techniques, IMS, DMS, LIF, gamma detection, fluorescent nanoparticles, etc.;
- threats investigation: camera, laser, tools;
- neutralisation and disposal: high-energy weapons (laser beams), high-power electromagnetic (HPEM) beams, chemical desensitisation of explosive materials, among others;
- decoying: mass, mechanical, magnetic, heat (IR);
- ECM: evolutions for ECM systems (innovative antennas, e.g. planar, ability to characterise signal in order to avoid interference to friendly Electronic systems including friendly ECM systems...);
- breaching: evolutions for tools, energetic materials and machinery (hand, mechanical or explosive or combination of those) to create safe passage through obstacle (landmines, minefields).
The compromises cost/performances and lifetime/recyclability must be highlighted. The technologies used should be without end-user restrictions by non-associated third countries.
The proposals must substantiate synergies and complementarity with foreseen, ongoing or completed activities in the field of the technological challenge on hidden threats detection Unmanned ground and aerial systems for hidden threats detection (EDF-2022-DIGIT-R-HTP-P and O), as well as to the development topic Mine counter-measures capabilities (EDF-2023-DA-UWW-MCMC), or in the context of the EDA activities conducted.
Types of activities
The following table lists the types of activities which are eligible for this topic, and whether they are mandatory or optional (see Article 10(3) EDF Regulation):
| Types of activities (art 10(3) EDF Regulation) | Eligible? | |
| (a) | Activities that aim to create, underpin and improve knowledge, products and technologies, including disruptive technologies, which can achieve significant effects in the area of defence (generating knowledge) | Yes(mandatory) |
| (b) | Activities that aim to increase interoperability and resilience, including secured production and exchange of data, to master critical defence technologies, to strengthen the security of supply or to enable the effective exploitation of results for defence products and technologies (integrating knowledge) | Yes(mandatory) |
| (c) | Studies, such as feasibility studies to explore the feasibility of new or upgraded products, technologies, processes, services and solutions | Yes(mandatory) |
| (d) | Design of a defence product, tangible or intangible component or technology as well as the definition of the technical specifications on which such a design has been developed, including any partial test for risk reduction in an industrial or representative environment | Yes(optional) |
| (e) | System prototyping of a defence product, tangible or intangible component or technology | No |
| (f) | Testing of a defence product, tangible or intangible component or technology | No |
| (g) | Qualification of a defence product, tangible or intangible component or technology | No |
| (h) | Certification of a defence product, tangible or intangible component or technology | No |
| (i) | Development of technologies or assets increasing efficiency across the life cycle of defence products and technologies | No |
The proposals must cover at least the following tasks as part of the mandatory activities:
- Generating knowledge:
- RCIED: research innovative jamming techniques for remote-controlled IED;
- (S)PBIED and (S)VBIED: research sensor technology for standoff detection and neutralisation of person- and vehicle-borne IED including suicide PBIED and suicide VBIED;
- countermine: research sensor technology for standoff detection, methods and techniques for decoying and effectors for neutralisation of surface, subsurface and directional landmines;
- Integrating knowledge:
- research and compare several multisensor data fusion (algorithms) concepts for RCIED, (S)PBIED and (S)VBIED with synthetic and real sensor data;
- provide the requirement needed to integrate the equipment on a military platform (size, weight, power...);
- evaluate the impact of the C-IED equipment on the other system that could already be integrated (radio, sensors...) on a military platform;
- Studies:
- define a realistic military scenario with the generated and integrated knowledge, taking into account both IED and UXO threats; RCIED, (S)PIED and (S)VBIED have to be included;
- feasibility studies on choosing specific sensors and effector sets for the three threat scenarios IED, landmines and UXO;
- feasibility studies on operational time criticality of IED and landmine scenarios and expected capability gain;
In addition, the proposals should cover the following tasks:
- Design:
- design of a threat (IEDs, landmines, UXOs) detection, classification and signalling system, preferably using unmanned systems;
- design of a system to neutralise, deactivate or disrupt threats (IEDs, landmines, UXOs), preferably using unmanned systems;
- design of low cost, small size and easily replaceable UGV systems for threat manipulation (IEDs, landmines, UXOs).
In accordance with the maturity of the technology under study, the proposals should also include:
- state-of-the-art technologies offering opportunities to respond to the different counter explosive threats functions listed above in the scope section;
- research of innovative technologies offering opportunities to respond to the different counter explosive threats listed above in the scope section;
- demonstrations of the feasibility to use the technologies developed for counter explosives threat purposes, in different scenarios;
- evaluation of the performances of demonstrators in relevant environments.
Functional requirements
The proposed technologies should meet the following functional requirements:
- ability to detect and map threats (IEDs, UXOs and landmines) in a given area, with maximum accuracy;
- ability to classify threats, with maximum accuracy;
- ability to investigate and identify threats, including with the support of AI;
- ability to neutralise and dispose of threats;
- ability to decoy threats;
- ability to jam threats;
- ability to breach an obstacle with the help of hand, mechanical or explosive means or a combination of such means;
- ability to be used in an operational environment with IEDs, UXOs or landmines.
The performances associated with these technologies should be measurable through evaluation campaigns conducted in the framework of the present project, using shared protocols and metrics.
Demonstrators should be able to record the data acquired through their sensors, in order to enable reproduction of experiments and comparison of technologies in a simulated environment.
Eligibility & Conditions
Conditions
1. Admissibility conditions: described in section 5 of the call document
Proposal page limits and layout: described in Part B of the Application Form available in the Submission System
2. Eligible countries: described in section 6 of the call document
3. Other eligibility conditions: described in section 6 of the call document
4. Financial and operational capacity and exclusion: described in section 7 of the call document
Submission and evaluation processes: described section 8 of the call document and the Online Manual
Award criteria, scoring and thresholds: described in section 9 of the call document
Indicative timeline for evaluation and grant agreement: described in section 4 of the call document
6. Legal and financial set-up of the grants: described in section 10 of the call document
Call documents:
Templates for proposals should be downloaded from the Submission System (available at the opening of the call), the links below are examples only:
- EDF Standard application form
- Detailed budget table EDF RA
- Participant information (including previous projects, if any)
- List of infrastructure, facilities, assets and resources
- Actual indirect cost methodology declarations (if actual indirect costs used)
- Ownership control declarations
- PRS declaration (if the project requires access to Galileo PRS information)
Additional documents:
Generic Programme Security Instruction (PSI) concerning European Defence Fund
Rules for Legal Entity Validation, LEAR Appointment and Financial Capacity Assessment
EU Grants AGA — Annotated Model Grant Agreement
Funding & Tenders Portal Online Manual
Support & Resources
For help related to this call, please contact: [email protected] Please be aware that we may not be anymore able to answer questions sent to the functional mailbox before the deadline for submission of the proposals.
Funding & Tenders Portal FAQ – Submission of proposals.
IT Helpdesk – Contact the IT helpdesk for questions such as forgotten passwords, access rights and roles, technical aspects of submission of proposals, etc.
Online Manual – Step-by-step online guide through the Portal processes from proposal preparation and submission to reporting on your on-going project. Valid for all 2021-2027 programmes.
Latest Updates
This call closed at 17.00 on 22 November 2023. 23 proposals were submitted for evaluation.
Please be aware that we may not be anymore able to answer questions sent to the functional mailbox before the deadline for submission of the proposals. We encourage you to consult the latest FAQs published.
The presentations from the EDF 2023 infodays are available at the EDF page.
Opening of the calls has been postponed to 22 June 2023.
You will be able to start the submission process from that date.
European Defence Fund (EDF) Info Days 2023 will take place on 28-29 June 2023