首页 > 最新文献

Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS最新文献

英文 中文
Modeling and simulation in mission assurance 任务保证中的建模和仿真
IF 0.8 Q3 Engineering Pub Date : 2022-09-12 DOI: 10.1177/15485129221105084
Colonel Eric D Trias
Modeling and simulation (M&S) continue to play a significant role in military training and operations. With the growth of cyberspace in support of military operations, it is only appropriate for M&S to follow a similar trajectory. In cybersecurity in particular, M&S can provide invaluable training for the cyber workforce, both for defensive and offensive operations, testing of network defenses and to support operational resiliency. Threats to military operations increase in complexity as adversaries develop their multi-domain capabilities to exploit information networks and mission systems. Adversaries are looking to physically attack defense critical infrastructure through cyber means along with exploiting vulnerability of information systems to gain physical access. Organizations must contend with threats from both physical and cyber means. A promising approach to assure operations resiliency in the face of this multi-domain threat lies in the concept of convergence of three security disciplines—physical, cyber, and continuity of operations (COOPs). Units can no longer depend on cybersecurity, nor can they rely entirely on guards, guns, and gates to protect critical missions, people, and infrastructure. Comprehensive risk-managed operational practices complemented by diverse, converged security protection programs are needed to meet these challenges. M&S has a significant role to play and must incorporate a more complex, holistic operational environment to address the resiliency of modern infrastructure. Network operators and cybersecurity providers must focus on assuring operational resilience and not merely on compliance with policies. Although policies provide a baseline to address common vulnerabilities, they are not sufficient in securing against complex threats, undiscovered vulnerabilities, or advanced adversaries. These adversaries continue to circumvent defenses whether from the inside, e.g., phishing and ransomware, or the outside through supply chain, vulnerable interfaces, or protocols. One way the Department of Defense (DoD) is addressing complex risks to its most strategic assets is to conduct a comprehensive vulnerability assessment utilizing a multidisciplinary approach called mission assurance (MA). MA, governed by DoD Instruction 3020.45, is the process to identify, protect, or ensure the continued function and resilience of capabilities and assets, including personnel, equipment, facilities, networks, information and information systems, infrastructure, and supply chains, critical to the execution of DoD mission-essential functions in any operating environment or condition. A major component of the MA concept is the on-site vulnerability assessment designed to discover gaps and weaknesses from multiple disciplines, i.e., physical security, general engineering, emergency management, and cyber operations. The framework provides a comprehensive risk assessment of critical assets that could prevent accomplishment of a unit, insta
建模和仿真(M&S)继续在军事训练和作战中发挥重要作用。随着网络空间支持军事行动的发展,玛莎百货走上类似的道路是再合适不过的了。特别是在网络安全方面,M&S可以为网络工作人员提供宝贵的培训,包括防御和进攻操作、网络防御测试和支持操作弹性。随着对手发展其利用信息网络和任务系统的多领域能力,军事行动面临的威胁变得越来越复杂。攻击者正在寻求通过网络手段对防御关键基础设施进行物理攻击,同时利用信息系统的漏洞获得物理访问。组织必须应对来自物理和网络的威胁。面对这种多领域威胁,确保操作弹性的一种有希望的方法在于三个安全学科(物理、网络和操作连续性)的融合概念。单位不能再依赖网络安全,也不能完全依赖警卫、枪支和大门来保护关键任务、人员和基础设施。要应对这些挑战,需要全面的风险管理操作实践,并辅以多样化、融合的安全保护计划。玛莎百货将发挥重要作用,必须整合更复杂、更全面的运营环境,以解决现代基础设施的弹性问题。网络运营商和网络安全提供商必须专注于确保运营弹性,而不仅仅是遵守政策。尽管策略提供了处理常见漏洞的基线,但它们不足以防范复杂的威胁、未发现的漏洞或高级攻击者。这些攻击者继续规避防御,无论是从内部,例如网络钓鱼和勒索软件,还是通过供应链,易受攻击的接口或协议从外部绕过防御。美国国防部(DoD)解决其最具战略性资产的复杂风险的一种方法是利用一种称为任务保证(MA)的多学科方法进行全面的脆弱性评估。MA由国防部指令3020.45管理,是识别、保护或确保能力和资产的持续功能和弹性的过程,包括人员、设备、设施、网络、信息和信息系统、基础设施和供应链,对在任何操作环境或条件下执行国防部任务基本功能至关重要。MA概念的一个主要组成部分是现场脆弱性评估,旨在发现来自多个学科的差距和弱点,即物理安全、一般工程、应急管理和网络操作。该框架提供了对关键资产的全面风险评估,这些资产可能会阻碍一个单位、装置或更高的权威任务的完成。无论对组织征收什么计划来确保操作弹性,都需要态势感知、监控和调整来补偿、反应和预测操作环境和对手行动的变化。敌人不仅得到了投票,而且我们必须假设我们的系统是脆弱的,在许多情况下,已经可以访问和利用。假设最好的情况,例如,气隙网络是不可渗透的,降低了运营商的警惕和安全尽职,这已经产生了严重的后果。M&S可以协助对关键任务进行建模,并绘制与任务相关的地形,以包括支持基础设施。这些模型可用于比较和模拟突发事件,以支持培训、演习、合作方案和操作发展概念。未来,M&S可以在运营弹性评估中发挥重要作用,帮助为开发替代方案、冗余、技术解决方案、政策和培训铺平道路。合并
{"title":"Modeling and simulation in mission assurance","authors":"Colonel Eric D Trias","doi":"10.1177/15485129221105084","DOIUrl":"https://doi.org/10.1177/15485129221105084","url":null,"abstract":"Modeling and simulation (M&S) continue to play a significant role in military training and operations. With the growth of cyberspace in support of military operations, it is only appropriate for M&S to follow a similar trajectory. In cybersecurity in particular, M&S can provide invaluable training for the cyber workforce, both for defensive and offensive operations, testing of network defenses and to support operational resiliency. Threats to military operations increase in complexity as adversaries develop their multi-domain capabilities to exploit information networks and mission systems. Adversaries are looking to physically attack defense critical infrastructure through cyber means along with exploiting vulnerability of information systems to gain physical access. Organizations must contend with threats from both physical and cyber means. A promising approach to assure operations resiliency in the face of this multi-domain threat lies in the concept of convergence of three security disciplines—physical, cyber, and continuity of operations (COOPs). Units can no longer depend on cybersecurity, nor can they rely entirely on guards, guns, and gates to protect critical missions, people, and infrastructure. Comprehensive risk-managed operational practices complemented by diverse, converged security protection programs are needed to meet these challenges. M&S has a significant role to play and must incorporate a more complex, holistic operational environment to address the resiliency of modern infrastructure. Network operators and cybersecurity providers must focus on assuring operational resilience and not merely on compliance with policies. Although policies provide a baseline to address common vulnerabilities, they are not sufficient in securing against complex threats, undiscovered vulnerabilities, or advanced adversaries. These adversaries continue to circumvent defenses whether from the inside, e.g., phishing and ransomware, or the outside through supply chain, vulnerable interfaces, or protocols. One way the Department of Defense (DoD) is addressing complex risks to its most strategic assets is to conduct a comprehensive vulnerability assessment utilizing a multidisciplinary approach called mission assurance (MA). MA, governed by DoD Instruction 3020.45, is the process to identify, protect, or ensure the continued function and resilience of capabilities and assets, including personnel, equipment, facilities, networks, information and information systems, infrastructure, and supply chains, critical to the execution of DoD mission-essential functions in any operating environment or condition. A major component of the MA concept is the on-site vulnerability assessment designed to discover gaps and weaknesses from multiple disciplines, i.e., physical security, general engineering, emergency management, and cyber operations. The framework provides a comprehensive risk assessment of critical assets that could prevent accomplishment of a unit, insta","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78037080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The need for cooperation between wargaming and modeling & simulation for examining Cyber, Space, Electronic Warfare, and other topics 为了研究网络、太空、电子战和其他主题,需要在兵棋推演和建模与仿真之间进行合作
IF 0.8 Q3 Engineering Pub Date : 2022-08-26 DOI: 10.1177/15485129221118100
Phillip Pournelle
{"title":"The need for cooperation between wargaming and modeling & simulation for examining Cyber, Space, Electronic Warfare, and other topics","authors":"Phillip Pournelle","doi":"10.1177/15485129221118100","DOIUrl":"https://doi.org/10.1177/15485129221118100","url":null,"abstract":"","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89390298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network characterization and simulation via mixed properties of the Barabási–Albert and Erdös–Rényi degree distribution 通过Barabási-Albert和Erdös-Rényi度分布的混合性质进行网络表征和仿真
IF 0.8 Q3 Engineering Pub Date : 2022-08-05 DOI: 10.1177/15485129221110893
Fairul Mohd-Zaid, Christine M. Schubert Kabban, R. Deckro, Wright Shamp
Social network analysis (SNA) is a tool for the operations researcher to understand, monitor, and exploit social and military structures which are key in the intelligence community. However, in order to study and influence a network of interest, the network must first be characterized; preferably to a known network model that captures a mixture of graphical properties exhibited by the social network of interest. In this work, we present a novel statistical method for both characterizing networks via a Binomial-Pareto maximum-likelihood approach and simulating the characterized network using a graph of mixed Barabási–Albert (BA, scale-free) and Erdös–Rényi (ER, randomness) properties. Characterization is performed through a combination of hypothesis tests and method of moments parameter estimation on Pareto and Doubly Truncated Binomial distributions. Application on real-world networks suggests that such networks may be characterized with a mixture of scale-free and random properties as modeled through BA and ER graphs. We demonstrate that our simulation methods are able to capture the degree distribution and density of the networks examined. These results demonstrate that this work establishes a statistical framework upon which network characterization and simulation may be accomplished, thus enabling the adaptation of such methods when generating, manipulating, and observing networks of interest.
社会网络分析(SNA)是作战研究人员理解、监控和利用社会和军事结构的一种工具,这是情报界的关键。然而,为了研究和影响一个利益网络,必须首先对该网络进行表征;最好是捕获感兴趣的社会网络所展示的图形属性的混合的已知网络模型。在这项工作中,我们提出了一种新的统计方法,用于通过二项式-帕累托最大似然方法来表征网络,并使用混合Barabási-Albert (BA,无标度)和Erdös-Rényi (ER,随机性)属性的图来模拟表征网络。通过对Pareto和双截断二项分布的假设检验和矩参数估计方法的组合进行表征。在现实网络上的应用表明,这种网络可能具有通过BA和ER图建模的无标度和随机性质的混合特征。我们证明了我们的模拟方法能够捕获所检查的网络的程度分布和密度。这些结果表明,这项工作建立了一个统计框架,在此基础上可以完成网络表征和模拟,从而在生成、操纵和观察感兴趣的网络时能够适应这些方法。
{"title":"Network characterization and simulation via mixed properties of the Barabási–Albert and Erdös–Rényi degree distribution","authors":"Fairul Mohd-Zaid, Christine M. Schubert Kabban, R. Deckro, Wright Shamp","doi":"10.1177/15485129221110893","DOIUrl":"https://doi.org/10.1177/15485129221110893","url":null,"abstract":"Social network analysis (SNA) is a tool for the operations researcher to understand, monitor, and exploit social and military structures which are key in the intelligence community. However, in order to study and influence a network of interest, the network must first be characterized; preferably to a known network model that captures a mixture of graphical properties exhibited by the social network of interest. In this work, we present a novel statistical method for both characterizing networks via a Binomial-Pareto maximum-likelihood approach and simulating the characterized network using a graph of mixed Barabási–Albert (BA, scale-free) and Erdös–Rényi (ER, randomness) properties. Characterization is performed through a combination of hypothesis tests and method of moments parameter estimation on Pareto and Doubly Truncated Binomial distributions. Application on real-world networks suggests that such networks may be characterized with a mixture of scale-free and random properties as modeled through BA and ER graphs. We demonstrate that our simulation methods are able to capture the degree distribution and density of the networks examined. These results demonstrate that this work establishes a statistical framework upon which network characterization and simulation may be accomplished, thus enabling the adaptation of such methods when generating, manipulating, and observing networks of interest.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78452870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fog, friction, and control in organized conflict: punctuated transitions to instability 有组织冲突中的迷雾、摩擦和控制:间断过渡到不稳定
IF 0.8 Q3 Engineering Pub Date : 2022-08-05 DOI: 10.1177/15485129221115740
R. Wallace
We explore the effects of Clausewitzian fog and friction using a data rate theorem–based model of the phase transition from control to failure for inherently unstable systems that include, but are not limited to, the many possible modalities of organized conflict. Fog-and-friction challenge any and all cognitive structures facing dynamic patterns of threat or opportunity, whether control is manifested through an institution, a machine entity, or some composite. The fundamental nature of challenge appears independent of the degree of sophistication of those institutions, entities, or composites, and of the technical modalities employed. The dialog/Zweikampf of organized conflict is—and will remain—an intimate and most human enterprise. Implications for other existential threats of inherently unstable circumstance, like pandemic disease or climate change, are evident.
我们使用基于数据速率定理的从控制到失效的固有不稳定系统的相变模型来探索克劳塞维茨雾和摩擦的影响,这些系统包括但不限于有组织冲突的许多可能形式。雾和摩擦挑战任何和所有面临威胁或机会动态模式的认知结构,无论控制是通过机构、机器实体还是某些组合物来表现的。挑战的基本性质似乎与这些机构、实体或组合物的复杂程度以及所采用的技术模式无关。有组织冲突的对话/茨维坎夫现在是——而且将继续是——一项亲密的、最具人性的事业。固有不稳定环境对其他生存威胁的影响是显而易见的,如流行病或气候变化。
{"title":"Fog, friction, and control in organized conflict: punctuated transitions to instability","authors":"R. Wallace","doi":"10.1177/15485129221115740","DOIUrl":"https://doi.org/10.1177/15485129221115740","url":null,"abstract":"We explore the effects of Clausewitzian fog and friction using a data rate theorem–based model of the phase transition from control to failure for inherently unstable systems that include, but are not limited to, the many possible modalities of organized conflict. Fog-and-friction challenge any and all cognitive structures facing dynamic patterns of threat or opportunity, whether control is manifested through an institution, a machine entity, or some composite. The fundamental nature of challenge appears independent of the degree of sophistication of those institutions, entities, or composites, and of the technical modalities employed. The dialog/Zweikampf of organized conflict is—and will remain—an intimate and most human enterprise. Implications for other existential threats of inherently unstable circumstance, like pandemic disease or climate change, are evident.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80127573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How a machine can understand the command intent 机器如何理解命令的意图
IF 0.8 Q3 Engineering Pub Date : 2022-08-05 DOI: 10.1177/15485129221115736
Maarten P. D. Schadd, Anne Merel Sternheim, R. Blankendaal, Martin van der Kaaij, Olaf H. Visker
With recent technological advances, commanders request the support of artificial intelligence (AI)-enabled systems during mission planning. Future AI systems may test a wide range of courses of action (COAs) and use a simulator to test each COA’s effectiveness in a war game. The COA’s effectiveness is however dependent on the commanders’ intent. The question arises to what degree a machine can understand the commanders’ intent? Currently, the intent has to be programmed manually, costing valuable time. Therefore, we tested whether a tool can understand a freely written intent so that a commander can work with an AI system with minimal effort. The work consisted of letting a tool understand the language and grammar of the commander to find relevant information in the intent; creating a (visual) representation of the intent to the commander (back brief); and creating an intent-based computable measure of effectiveness. We proposed a novel quantitative evaluation metric for understanding the commanders’ intent and tested the results qualitatively with platoon commanders of the 11th Airmobile Brigade. They were positively surprised with the level of understanding and appreciated the validation feedback. The computable measure of effectiveness is the first step toward bridging the gap between the command intent and machine learning for military mission planning.
随着最近的技术进步,指挥官在任务规划期间要求支持人工智能(AI)系统。未来的人工智能系统可能会测试大范围的行动方案(COA),并使用模拟器在战争游戏中测试每个COA的有效性。然而,COA的有效性取决于指挥官的意图。问题来了,机器能在多大程度上理解指挥官的意图?目前,意图必须手动编程,耗费宝贵的时间。因此,我们测试了工具是否能够理解自由编写的意图,以便指挥官能够以最小的努力与AI系统合作。这项工作包括让一个工具理解指挥官的语言和语法,从而在意图中找到相关信息;为指挥官创建意图的(视觉)表示(简要说明);并创建一个基于意图的可计算的有效性度量。我们提出了一种新的定量评价指标来理解指挥官的意图,并对第11航空机动旅的排长进行了定性测试。他们对理解的程度感到非常惊讶,并对验证反馈表示赞赏。可计算的有效性度量是弥合指挥意图和军事任务规划机器学习之间差距的第一步。
{"title":"How a machine can understand the command intent","authors":"Maarten P. D. Schadd, Anne Merel Sternheim, R. Blankendaal, Martin van der Kaaij, Olaf H. Visker","doi":"10.1177/15485129221115736","DOIUrl":"https://doi.org/10.1177/15485129221115736","url":null,"abstract":"With recent technological advances, commanders request the support of artificial intelligence (AI)-enabled systems during mission planning. Future AI systems may test a wide range of courses of action (COAs) and use a simulator to test each COA’s effectiveness in a war game. The COA’s effectiveness is however dependent on the commanders’ intent. The question arises to what degree a machine can understand the commanders’ intent? Currently, the intent has to be programmed manually, costing valuable time. Therefore, we tested whether a tool can understand a freely written intent so that a commander can work with an AI system with minimal effort. The work consisted of letting a tool understand the language and grammar of the commander to find relevant information in the intent; creating a (visual) representation of the intent to the commander (back brief); and creating an intent-based computable measure of effectiveness. We proposed a novel quantitative evaluation metric for understanding the commanders’ intent and tested the results qualitatively with platoon commanders of the 11th Airmobile Brigade. They were positively surprised with the level of understanding and appreciated the validation feedback. The computable measure of effectiveness is the first step toward bridging the gap between the command intent and machine learning for military mission planning.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72657265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interoperability analysis via agent-based simulation 通过基于代理的模拟进行互操作性分析
IF 0.8 Q3 Engineering Pub Date : 2022-08-05 DOI: 10.1177/15485129221111171
Melissa Pescatore, Paul T. Beery
This paper demonstrates an approach for the use of agent-based simulation, supported by model-based systems engineering products, to analyze interoperability. To demonstrate the approach, a representative maritime search-and-rescue (SAR) operation is simulated in the agent-based simulation program Map-Aware Non-Uniform Automata (MANA). The MANA SAR model is used to assess interoperability decisions at organizational, operational, and technical levels and to highlight dependencies between decisions at each level of interoperability. Analysis indicates that, within the MANA SAR model, organizational interoperability decisions have the largest impact on operational performance but that organizational challenges may be overcome with substantial investment at both the operational and technical levels of interoperability.
本文演示了一种使用基于代理的仿真的方法,由基于模型的系统工程产品支持,来分析互操作性。为了演示该方法,在基于代理的仿真程序Map-Aware Non-Uniform Automata (MANA)中模拟了一个具有代表性的海上搜救(SAR)操作。MANA SAR模型用于评估组织、操作和技术级别的互操作性决策,并突出显示每个互操作性级别决策之间的依赖关系。分析表明,在MANA SAR模型中,组织的互操作性决策对操作性能有最大的影响,但是组织的挑战可以通过互操作性和技术层面的大量投资来克服。
{"title":"Interoperability analysis via agent-based simulation","authors":"Melissa Pescatore, Paul T. Beery","doi":"10.1177/15485129221111171","DOIUrl":"https://doi.org/10.1177/15485129221111171","url":null,"abstract":"This paper demonstrates an approach for the use of agent-based simulation, supported by model-based systems engineering products, to analyze interoperability. To demonstrate the approach, a representative maritime search-and-rescue (SAR) operation is simulated in the agent-based simulation program Map-Aware Non-Uniform Automata (MANA). The MANA SAR model is used to assess interoperability decisions at organizational, operational, and technical levels and to highlight dependencies between decisions at each level of interoperability. Analysis indicates that, within the MANA SAR model, organizational interoperability decisions have the largest impact on operational performance but that organizational challenges may be overcome with substantial investment at both the operational and technical levels of interoperability.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84405022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Experiment in Tactical Wargaming with Platforms Enabled by Artificial Intelligence 基于人工智能平台的战术战棋实验
IF 0.8 Q3 Engineering Pub Date : 2022-05-05 DOI: 10.7249/rra423-1
D. Tarraf, J. Gilmore, D. Barnett, Scott S. Boston, David Frelinger, Daniel C. Gonzales, Alexander C. Hou, Peter Whitehead
In this report, researchers experimented with how postulated artificial intelligence/machine learning (AI/ML) capabilities could be incorporated into a wargame. We modified and augmented the rules and engagement statistics used in a commercial tabletop wargame to enable (1) remotely operated and fully autonomous combat vehicles and (2) vehicles with AI/ML-enabled situational awareness to show how the two types of vehicles would perform in company-level engagement between Blue (US) and Red (Russian) forces. The augmented rules and statistics we developed for this wargame were based in part on the US Army’s evolving plans for developing and fielding robotic and AI/ML-enabled weapon and other systems. However, we also portrayed combat vehicles with the capability to autonomously detect, identify, and engage targets without human intervention, which the Army does not presently envision. The rules we developed sought to realistically portray the capabilities and limitations of AI/ML-enabled systems, including their vulnerability to selected enemy countermeasures, such as jamming. Future work could improve the realism of both the gameplay and representation of AI/ML-enabled systems, thereby providing useful information to the acquisition and operational communities in the US Department of Defense.
在这份报告中,研究人员实验了如何将人工智能/机器学习(AI/ML)功能整合到战争游戏中。我们修改并增强了商业桌面战争游戏中使用的规则和交战统计数据,以启用(1)远程操作和完全自主的战斗车辆和(2)具有AI/ ml支持的态势感知的车辆,以显示这两种类型的车辆在蓝军(美国)和红军(俄罗斯)部队之间的连队级交战中如何表现。我们为这场战争游戏开发的增强规则和统计数据部分基于美国陆军开发和部署机器人和人工智能/机器学习武器和其他系统的不断发展的计划。然而,我们还描绘了具有自主探测、识别和攻击目标能力的战斗车辆,而无需人为干预,这是陆军目前没有设想的。我们制定的规则试图真实地描绘AI/ ml支持系统的能力和局限性,包括它们对选定敌人对策(如干扰)的脆弱性。未来的工作可以提高AI/ ml支持系统的游戏玩法和表现的现实性,从而为美国国防部的采办和运营社区提供有用的信息。
{"title":"An Experiment in Tactical Wargaming with Platforms Enabled by Artificial Intelligence","authors":"D. Tarraf, J. Gilmore, D. Barnett, Scott S. Boston, David Frelinger, Daniel C. Gonzales, Alexander C. Hou, Peter Whitehead","doi":"10.7249/rra423-1","DOIUrl":"https://doi.org/10.7249/rra423-1","url":null,"abstract":"In this report, researchers experimented with how postulated artificial intelligence/machine learning (AI/ML) capabilities could be incorporated into a wargame. We modified and augmented the rules and engagement statistics used in a commercial tabletop wargame to enable (1) remotely operated and fully autonomous combat vehicles and (2) vehicles with AI/ML-enabled situational awareness to show how the two types of vehicles would perform in company-level engagement between Blue (US) and Red (Russian) forces. The augmented rules and statistics we developed for this wargame were based in part on the US Army’s evolving plans for developing and fielding robotic and AI/ML-enabled weapon and other systems. However, we also portrayed combat vehicles with the capability to autonomously detect, identify, and engage targets without human intervention, which the Army does not presently envision. The rules we developed sought to realistically portray the capabilities and limitations of AI/ML-enabled systems, including their vulnerability to selected enemy countermeasures, such as jamming. Future work could improve the realism of both the gameplay and representation of AI/ML-enabled systems, thereby providing useful information to the acquisition and operational communities in the US Department of Defense.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89728564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Small is beautiful 小就是美
IF 0.8 Q3 Engineering Pub Date : 2022-05-01 DOI: 10.1177/15485129221096478
James Ryseff, M. Bond
{"title":"Small is beautiful","authors":"James Ryseff, M. Bond","doi":"10.1177/15485129221096478","DOIUrl":"https://doi.org/10.1177/15485129221096478","url":null,"abstract":"","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75946416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The applications of artificial intelligence to education and training 人工智能在教育和培训中的应用
IF 0.8 Q3 Engineering Pub Date : 2022-03-25 DOI: 10.1177/15485129221088717
M. van Lent, D. Schmorrow
{"title":"The applications of artificial intelligence to education and training","authors":"M. van Lent, D. Schmorrow","doi":"10.1177/15485129221088717","DOIUrl":"https://doi.org/10.1177/15485129221088717","url":null,"abstract":"","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79298449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling what matters: AI and the future of defense learning 重要的建模:人工智能和国防学习的未来
IF 0.8 Q3 Engineering Pub Date : 2022-03-19 DOI: 10.1177/15485129221088718
S. Schatz, J. Walcutt
Let’s be honest, artificial intelligence (AI) will change— or, rather, is already changing—so much. It would be easy, if uninspired, to fill this article with a laundry list. But rather than add to the existing litany of forecasts (many of which you can read in the chapters of this special edition), we’ll focus more narrowly. First, we’ve bound the question to learning in the defense domain, and second, we’ve challenged ourselves to target a single concept—to name the linchpin with greatest potential to have profound, paradigm-changing impacts. To give away the punchline, we’ve selected ‘‘the way we measure and evaluate.’’ Before we show our work, consider these definitions. Measure and evaluate refer to two sides of the same coin. Formally, measurement is the ‘‘quantitatively expressed reduction of uncertainty based on one or more observations’’ (p. 23). In other words, it refers to collected observations (no matter how fuzzy or incomplete) that help us fill-in (but not necessarily eliminate) uncertainty in a Claude Shannon ‘‘information theory’’ sort of way. Measurement goes hand-in-hand with evaluation. Evaluation is the process of interpreting the data collected from measurements, and for our purposes, we’ll say it covers all of the associated aggregation, transformation, analysis, and other activities needed to effectively use the measured data. Learning, as a formal concept, is related to—but notably distinct from—training and education. Those latter two terms, particularly in a defense context, are laden with connotations. ‘‘Training and education’’ refer to the organizational side of the experience, for instance, to the curriculum or the wargame delivered by a schoolhouse or training branch. They’re input-focused terms, and more than that, they tend to imply a formal learning context. In contrast, the term ‘‘learning’’ focuses on the individual (or team) side of the equation—the outcomes side. It describes any change in long-term memory that affects knowledge, skills, or behaviors, and it makes no distinction for the process through which it was acquired. 1. An operational perspective
老实说,人工智能(AI)将会改变——或者更确切地说,已经在改变——如此之多。这将是很容易的,如果没有灵感,填满这篇文章的洗衣清单。但是,我们不会再增加已有的一连串预测(其中许多你可以在本期特别版的章节中读到),我们将更狭隘地关注。首先,我们将这个问题与国防领域的学习联系在一起,其次,我们挑战自己,以一个单一的概念为目标——命名最有可能产生深远的、改变范式的影响的关键。为了透露点睛之笔,我们选择了“衡量和评估的方式”。在我们展示我们的工作之前,考虑一下这些定义。衡量和评价是指同一事物的两面。正式地说,测量是“基于一个或多个观测的定量表达的不确定性的减少”(第23页)。换句话说,它指的是收集到的观察结果(无论多么模糊或不完整),这些观察结果可以帮助我们以克劳德·香农(Claude Shannon)的“信息论”的方式填补(但不一定消除)不确定性。测量与评估是相辅相成的。评估是解释从度量中收集的数据的过程,出于我们的目的,我们认为它涵盖了所有相关的聚合、转换、分析和其他有效使用度量数据所需的活动。学习作为一个正式的概念,与培训和教育相关,但又明显不同。后两个词,特别是在国防背景下,充满了内涵。“训练和教育”指的是经验的组织性方面,例如,学校或训练部门提供的课程或兵棋。它们是以输入为中心的术语,更重要的是,它们往往暗示了一种正式的学习环境。相反,“学习”一词关注的是等式的个人(或团队)方面——结果方面。它描述的是任何影响知识、技能或行为的长期记忆的变化,它不区分获得这些变化的过程。1. 操作视角
{"title":"Modeling what matters: AI and the future of defense learning","authors":"S. Schatz, J. Walcutt","doi":"10.1177/15485129221088718","DOIUrl":"https://doi.org/10.1177/15485129221088718","url":null,"abstract":"Let’s be honest, artificial intelligence (AI) will change— or, rather, is already changing—so much. It would be easy, if uninspired, to fill this article with a laundry list. But rather than add to the existing litany of forecasts (many of which you can read in the chapters of this special edition), we’ll focus more narrowly. First, we’ve bound the question to learning in the defense domain, and second, we’ve challenged ourselves to target a single concept—to name the linchpin with greatest potential to have profound, paradigm-changing impacts. To give away the punchline, we’ve selected ‘‘the way we measure and evaluate.’’ Before we show our work, consider these definitions. Measure and evaluate refer to two sides of the same coin. Formally, measurement is the ‘‘quantitatively expressed reduction of uncertainty based on one or more observations’’ (p. 23). In other words, it refers to collected observations (no matter how fuzzy or incomplete) that help us fill-in (but not necessarily eliminate) uncertainty in a Claude Shannon ‘‘information theory’’ sort of way. Measurement goes hand-in-hand with evaluation. Evaluation is the process of interpreting the data collected from measurements, and for our purposes, we’ll say it covers all of the associated aggregation, transformation, analysis, and other activities needed to effectively use the measured data. Learning, as a formal concept, is related to—but notably distinct from—training and education. Those latter two terms, particularly in a defense context, are laden with connotations. ‘‘Training and education’’ refer to the organizational side of the experience, for instance, to the curriculum or the wargame delivered by a schoolhouse or training branch. They’re input-focused terms, and more than that, they tend to imply a formal learning context. In contrast, the term ‘‘learning’’ focuses on the individual (or team) side of the equation—the outcomes side. It describes any change in long-term memory that affects knowledge, skills, or behaviors, and it makes no distinction for the process through which it was acquired. 1. An operational perspective","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82517201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1