Pub Date : 2021-08-16DOI: 10.1177/15485129211036044
Abhishek Kesharwani, Vaibhav Aggarwal, Shubham Singh, R. B R, Arvind Kumar
In marine seismic acquisitions, signal interference remains a major menace. In this paper, a denoising approach based on the Variational Mode Decomposition (VMD) combined with the Hausdorff distance (HD) and Wavelet transform (WT) is proposed. There has been substantial research in this field over the years. However, traditional denoising methods fall short of achieving satisfactory results in an extremely low signal to noise ratio (SNR) environment. The feasibility, and stability of the proposed method was validated by performing simulations in MATLAB on both a synthetic signal and a seismic signal generated using real dataset. It was found that the proposed method does well in preserving marine signals in low SNR environments, and has a superior output SNR.
{"title":"Marine seismic signal denoising using VMD with Hausdorff distance and wavelet transform","authors":"Abhishek Kesharwani, Vaibhav Aggarwal, Shubham Singh, R. B R, Arvind Kumar","doi":"10.1177/15485129211036044","DOIUrl":"https://doi.org/10.1177/15485129211036044","url":null,"abstract":"In marine seismic acquisitions, signal interference remains a major menace. In this paper, a denoising approach based on the Variational Mode Decomposition (VMD) combined with the Hausdorff distance (HD) and Wavelet transform (WT) is proposed. There has been substantial research in this field over the years. However, traditional denoising methods fall short of achieving satisfactory results in an extremely low signal to noise ratio (SNR) environment. The feasibility, and stability of the proposed method was validated by performing simulations in MATLAB on both a synthetic signal and a seismic signal generated using real dataset. It was found that the proposed method does well in preserving marine signals in low SNR environments, and has a superior output SNR.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82590239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-08-10DOI: 10.1177/15485129211033040
Sharnil Pandya, Patteti Krishna, Ravi Shankar, Ankur Singh Bist
In a defense scenario, the communicating nodes are mobile and, due to this, the fading channel links become time selective in nature. Non-orthogonal multiple access (NOMA) is a promising technique in modern wireless communication systems, and it is employed in a variety of defense ad hoc wireless communication scenarios where nodes are mobile and it is difficult to estimate the channel coefficients perfectly. NOMA contributes to increased spectral efficiency (SE), firstly by enabling fifth-generation new radio deployment in the 3.5 GHz frequency range, and secondly by employing a simultaneous wireless information and power transfer (SWIPT) time switching and power splitting-based cooperative NOMA (C-NOMA) network where simple radio frequency circuitry is used for energy harvesting. NOMA together with the selective decode-and-forward (S-DF) protocol will increase the SE and energy efficiency simultaneously. The outage probability performance is evaluated for various values of the fading severity parameter and node velocity forming the channel error. It is significant to note that digital S-DF-based SWIPT C-NOMA performs much better than an analog amplify-and-forward-based C-NOMA SWIPT system.
{"title":"Examination of the fifth-generation vehicular simultaneous wireless information and power transfer cooperative non-orthogonal multiple access network in military scenarios considering time-varying and imperfect channel state information conditions","authors":"Sharnil Pandya, Patteti Krishna, Ravi Shankar, Ankur Singh Bist","doi":"10.1177/15485129211033040","DOIUrl":"https://doi.org/10.1177/15485129211033040","url":null,"abstract":"In a defense scenario, the communicating nodes are mobile and, due to this, the fading channel links become time selective in nature. Non-orthogonal multiple access (NOMA) is a promising technique in modern wireless communication systems, and it is employed in a variety of defense ad hoc wireless communication scenarios where nodes are mobile and it is difficult to estimate the channel coefficients perfectly. NOMA contributes to increased spectral efficiency (SE), firstly by enabling fifth-generation new radio deployment in the 3.5 GHz frequency range, and secondly by employing a simultaneous wireless information and power transfer (SWIPT) time switching and power splitting-based cooperative NOMA (C-NOMA) network where simple radio frequency circuitry is used for energy harvesting. NOMA together with the selective decode-and-forward (S-DF) protocol will increase the SE and energy efficiency simultaneously. The outage probability performance is evaluated for various values of the fading severity parameter and node velocity forming the channel error. It is significant to note that digital S-DF-based SWIPT C-NOMA performs much better than an analog amplify-and-forward-based C-NOMA SWIPT system.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85232028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1177/15485129211031673
Dionysios Tompros
The object of this study is space surveillance activity and the information systems involved for actors and national security organizations. Near and Deep Space Surveillance areas are presented, the former dealing with artificial objects and the latter the inner planetary system, including asteroids and its exploration and exploitation. (Near Space includes the upper layers of the atmosphere (thermosphere, exosphere) and the magnetosphere up to the limits of the magnetopause (6–15 RE). Deep Space refers to the space after the magnetopause and practically up to the limits of the Kuiper belt, about 50 A.U.) Due to the different matter of each area, the two sectors cannot have a common system for surveillance. The ever-increasing interest in natural resource extraction from the asteroid belt, the Moon, and Near-Earth Objects, combined with the explosive growth of the number of satellite commercial applications, makes the development and interconnection of the two distinct sector systems a necessity. This study describes the surveillance systems, the available technologies and methods, and develops a comprehensive oversight proposal.
{"title":"Space surveillance architecture: issues and challenges – an integrated approach","authors":"Dionysios Tompros","doi":"10.1177/15485129211031673","DOIUrl":"https://doi.org/10.1177/15485129211031673","url":null,"abstract":"The object of this study is space surveillance activity and the information systems involved for actors and national security organizations. Near and Deep Space Surveillance areas are presented, the former dealing with artificial objects and the latter the inner planetary system, including asteroids and its exploration and exploitation. (Near Space includes the upper layers of the atmosphere (thermosphere, exosphere) and the magnetosphere up to the limits of the magnetopause (6–15 RE). Deep Space refers to the space after the magnetopause and practically up to the limits of the Kuiper belt, about 50 A.U.) Due to the different matter of each area, the two sectors cannot have a common system for surveillance. The ever-increasing interest in natural resource extraction from the asteroid belt, the Moon, and Near-Earth Objects, combined with the explosive growth of the number of satellite commercial applications, makes the development and interconnection of the two distinct sector systems a necessity. This study describes the surveillance systems, the available technologies and methods, and develops a comprehensive oversight proposal.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79711377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-24DOI: 10.1177/15485129211033039
Panagiotis Touzopoulos, K. Zikidis
The capability of the first strike is crucial in the modern battlefield. An important parameter is the radar signature or Radar Cross Section (RCS) of a weapon system, such as a fighter aircraft, a warship, or a missile, affecting the range at which this weapon system would be detected as a target by an enemy radar. If the attacker is detected too late, there will be minimal time for the defender to react, possibly not sufficient to counter the threat. The RCS of a weapon system is considered generally as classified information. However, it can be measured at a suitable measurement test range, if that weapon system is available. Otherwise, it can be predicted with the help of computational electromagnetics. Concerning the second approach, the following procedure was recently proposed: construction of a three-dimensional model of a target, based on available images and any relevant data, and then computation of the target RCS, with the Physical Optics approximative method. In the present approach, this procedure is applied to an anti-ship cruise missile in order to compute its RCS. Finally, the expected detection range for various naval radars is calculated.
{"title":"Physical Optics Radar Cross Section predictions for an anti-ship cruise missile","authors":"Panagiotis Touzopoulos, K. Zikidis","doi":"10.1177/15485129211033039","DOIUrl":"https://doi.org/10.1177/15485129211033039","url":null,"abstract":"The capability of the first strike is crucial in the modern battlefield. An important parameter is the radar signature or Radar Cross Section (RCS) of a weapon system, such as a fighter aircraft, a warship, or a missile, affecting the range at which this weapon system would be detected as a target by an enemy radar. If the attacker is detected too late, there will be minimal time for the defender to react, possibly not sufficient to counter the threat. The RCS of a weapon system is considered generally as classified information. However, it can be measured at a suitable measurement test range, if that weapon system is available. Otherwise, it can be predicted with the help of computational electromagnetics. Concerning the second approach, the following procedure was recently proposed: construction of a three-dimensional model of a target, based on available images and any relevant data, and then computation of the target RCS, with the Physical Optics approximative method. In the present approach, this procedure is applied to an anti-ship cruise missile in order to compute its RCS. Finally, the expected detection range for various naval radars is calculated.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78379484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-23DOI: 10.1177/15485129211028317
Randall D. Spain, Jonathan P. Rowe, A. Smith, B. Goldberg, R. Pokorny, Bradford W. Mott, James C. Lester
Advances in artificial intelligence (AI) and machine learning can be leveraged to tailor training based on the goals, learning needs, and preferences of learners. A key component of adaptive training systems is tutorial planning, which controls how scaffolding is structured and delivered to learners to create dynamically personalized learning experiences. The goal of this study was to induce data-driven policies for tutorial planning using reinforcement learning (RL) to provide adaptive scaffolding based on the Interactive, Constructive, Active, Passive framework for cognitive engagement. We describe a dataset that was collected to induce RL-based scaffolding policies, and we present the results of our policy analyses. Results showed that the best performing policies optimized learning gains by inducing an adaptive fading approach in which learners received less cognitively engaging forms of remediation as they advanced through the training course. This policy was consistent with preliminary analyses that showed constructive remediation became less effective as learners progressed through the training session. Results also showed that learners’ prior knowledge impacted the type of scaffold that was recommended, thus showing evidence of an aptitude–treatment interaction. We conclude with a discussion of how AI-based training can be leveraged to enhance training effectiveness as well as directions for future research.
{"title":"A reinforcement learning approach to adaptive remediation in online training","authors":"Randall D. Spain, Jonathan P. Rowe, A. Smith, B. Goldberg, R. Pokorny, Bradford W. Mott, James C. Lester","doi":"10.1177/15485129211028317","DOIUrl":"https://doi.org/10.1177/15485129211028317","url":null,"abstract":"Advances in artificial intelligence (AI) and machine learning can be leveraged to tailor training based on the goals, learning needs, and preferences of learners. A key component of adaptive training systems is tutorial planning, which controls how scaffolding is structured and delivered to learners to create dynamically personalized learning experiences. The goal of this study was to induce data-driven policies for tutorial planning using reinforcement learning (RL) to provide adaptive scaffolding based on the Interactive, Constructive, Active, Passive framework for cognitive engagement. We describe a dataset that was collected to induce RL-based scaffolding policies, and we present the results of our policy analyses. Results showed that the best performing policies optimized learning gains by inducing an adaptive fading approach in which learners received less cognitively engaging forms of remediation as they advanced through the training course. This policy was consistent with preliminary analyses that showed constructive remediation became less effective as learners progressed through the training session. Results also showed that learners’ prior knowledge impacted the type of scaffold that was recommended, thus showing evidence of an aptitude–treatment interaction. We conclude with a discussion of how AI-based training can be leveraged to enhance training effectiveness as well as directions for future research.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89015035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-23DOI: 10.1177/15485129211028661
A. Donas, I. Famelis, P. Chu, G. Galanis
The aim of this paper is to present an application of high-order numerical analysis methods to a simulation system that models the movement of a cylindrical-shaped object (mine, projectile, etc.) in a marine environment and in general in fluids with important applications in Naval operations. More specifically, an alternative methodology is proposed for the dynamics of the Navy’s three-dimensional mine impact burial prediction model, Impact35/vortex, based on the Dormand–Prince Runge–Kutta fifth-order and the singly diagonally implicit Runge–Kutta fifth-order methods. The main aim is to improve the time efficiency of the system, while keeping the deviation levels of the final results, derived from the standard and the proposed methodology, low.
{"title":"Optimization of the Navy’s three-dimensional mine impact burial prediction simulation model, Impact35, using high-order numerical methods","authors":"A. Donas, I. Famelis, P. Chu, G. Galanis","doi":"10.1177/15485129211028661","DOIUrl":"https://doi.org/10.1177/15485129211028661","url":null,"abstract":"The aim of this paper is to present an application of high-order numerical analysis methods to a simulation system that models the movement of a cylindrical-shaped object (mine, projectile, etc.) in a marine environment and in general in fluids with important applications in Naval operations. More specifically, an alternative methodology is proposed for the dynamics of the Navy’s three-dimensional mine impact burial prediction model, Impact35/vortex, based on the Dormand–Prince Runge–Kutta fifth-order and the singly diagonally implicit Runge–Kutta fifth-order methods. The main aim is to improve the time efficiency of the system, while keeping the deviation levels of the final results, derived from the standard and the proposed methodology, low.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76603055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-23DOI: 10.1177/15485129211031669
Zachary W LaMere, D. Holland, W. Dailey, J. McClory
Neutrons from an atmospheric nuclear explosion can be detected by sensors in orbit. Current tools for characterizing the neutron energy spectrum assume a known source and use forward transport to recreate the detector response. In realistic scenarios the true source is unknown, making this an inefficient, iterative approach. In contrast, the adjoint approach directly solves for the source spectrum, enabling source reconstruction. The time–energy fluence at the satellite and adjoint transport equation allow a Monte Carlo method to characterize the neutron source’s energy spectrum directly in a new model: the Space to High-Altitude Region Adjoint (SAHARA) model. A new adjoint source event estimator was developed in SAHARA to find feasible solutions to the neutron transport problem given the constraints of the adjoint environment. This work explores SAHARA’s development and performance for mono-energetic and continuous neutron energy sources. In general, the identified spectra were shifted towards energies approximately 5% lower than the true source spectra, but SAHARA was able to capture the correct spectral shapes. Continuous energy sources, including real-world sources Fat Man and Little Boy, resulted in identifiable spectra that could have been produced by the same distribution as the true sources as demonstrated by two-dimensional (2D) Kolmogorov–Smirnov tests.
{"title":"Space to Air High-Altitude Region Adjoint Neutron Transport","authors":"Zachary W LaMere, D. Holland, W. Dailey, J. McClory","doi":"10.1177/15485129211031669","DOIUrl":"https://doi.org/10.1177/15485129211031669","url":null,"abstract":"Neutrons from an atmospheric nuclear explosion can be detected by sensors in orbit. Current tools for characterizing the neutron energy spectrum assume a known source and use forward transport to recreate the detector response. In realistic scenarios the true source is unknown, making this an inefficient, iterative approach. In contrast, the adjoint approach directly solves for the source spectrum, enabling source reconstruction. The time–energy fluence at the satellite and adjoint transport equation allow a Monte Carlo method to characterize the neutron source’s energy spectrum directly in a new model: the Space to High-Altitude Region Adjoint (SAHARA) model. A new adjoint source event estimator was developed in SAHARA to find feasible solutions to the neutron transport problem given the constraints of the adjoint environment. This work explores SAHARA’s development and performance for mono-energetic and continuous neutron energy sources. In general, the identified spectra were shifted towards energies approximately 5% lower than the true source spectra, but SAHARA was able to capture the correct spectral shapes. Continuous energy sources, including real-world sources Fat Man and Little Boy, resulted in identifiable spectra that could have been produced by the same distribution as the true sources as demonstrated by two-dimensional (2D) Kolmogorov–Smirnov tests.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73937268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-20DOI: 10.1177/15485129211031672
Ian Lunsford, Thomas H. Bradley
Aircraft survivability is a classical consideration of combat aircraft design and tactical development, but the fundamental model of aircraft survivability must be updated to be able to consider modern tactical scenarios that are applicable to unmanned aircraft. This paper seeks therefore to define the set of design tradeoffs and an evaluation of the tactical effectiveness for unmanned aircraft survivability. Traditional and modern survivability evaluation methods are presented and integrated into a computational simulation to create a probabilistic evaluation of unmanned aircraft survivability. The results demonstrate the development of design tradeoffs for a hypothetical unmanned C-130J Hercules against a single man-portable air defense system. The discussion focuses on the demonstration of the utility of this survivability evaluation framework for consideration of survivability in unmanned aerial vehicle (UAV) design, the utility of considering survivability in the design of multi-UAV configurations (including the loyal wingman and swarms), and the value of the probabilistic survivability model for multi-aircraft simulations.
{"title":"Evaluation of unmanned aerial vehicle tactics through the metrics of survivability","authors":"Ian Lunsford, Thomas H. Bradley","doi":"10.1177/15485129211031672","DOIUrl":"https://doi.org/10.1177/15485129211031672","url":null,"abstract":"Aircraft survivability is a classical consideration of combat aircraft design and tactical development, but the fundamental model of aircraft survivability must be updated to be able to consider modern tactical scenarios that are applicable to unmanned aircraft. This paper seeks therefore to define the set of design tradeoffs and an evaluation of the tactical effectiveness for unmanned aircraft survivability. Traditional and modern survivability evaluation methods are presented and integrated into a computational simulation to create a probabilistic evaluation of unmanned aircraft survivability. The results demonstrate the development of design tradeoffs for a hypothetical unmanned C-130J Hercules against a single man-portable air defense system. The discussion focuses on the demonstration of the utility of this survivability evaluation framework for consideration of survivability in unmanned aerial vehicle (UAV) design, the utility of considering survivability in the design of multi-UAV configurations (including the loyal wingman and swarms), and the value of the probabilistic survivability model for multi-aircraft simulations.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83486089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-19DOI: 10.1177/15485129211031668
M. Gargalakos
The role of unmanned aerial vehicles (UAVs) is becoming increasingly important for military conflicts. UAVs are more and more strongly considered as a force multiplier that could play a decisive role for the final outcome of an ambiguous battle. While the role of UAVs for Identification/Surveillance/Reconnaissance missions has been well established within many modern armies, their contribution to the upgrade or the restoration of military communications is still vague. In the current paper we review the current situation in military communications utilizing UAV platforms, and we also explore its future trends and capabilities taking into consideration the parallel developments in the civil UAV manufacturing sector involving UAV swarms and fifth-generation networks. Furthermore, a set of realistic combat scenarios involving the utilization of UAVs as a multipurpose communication node is presented and discussed, highlighting its critical role as a catalyst for the successful accomplishment of diverse military missions.
{"title":"The role of unmanned aerial vehicles in military communications: application scenarios, current trends, and beyond","authors":"M. Gargalakos","doi":"10.1177/15485129211031668","DOIUrl":"https://doi.org/10.1177/15485129211031668","url":null,"abstract":"The role of unmanned aerial vehicles (UAVs) is becoming increasingly important for military conflicts. UAVs are more and more strongly considered as a force multiplier that could play a decisive role for the final outcome of an ambiguous battle. While the role of UAVs for Identification/Surveillance/Reconnaissance missions has been well established within many modern armies, their contribution to the upgrade or the restoration of military communications is still vague. In the current paper we review the current situation in military communications utilizing UAV platforms, and we also explore its future trends and capabilities taking into consideration the parallel developments in the civil UAV manufacturing sector involving UAV swarms and fifth-generation networks. Furthermore, a set of realistic combat scenarios involving the utilization of UAVs as a multipurpose communication node is presented and discussed, highlighting its critical role as a catalyst for the successful accomplishment of diverse military missions.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79214348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-19DOI: 10.1177/15485129211028318
William T. DeBerry, Richard Dill, K. Hopkinson, D. Hodson, M. Grimaila
This research presents the wargaming commodity course of action automated analysis method (WCCAAM) – a novel approach to assist wargame commanders in developing and analyzing courses of action (COAs) through semi-automation of the military decision making process (MDMP). MDMP is a seven-step iterative method that commanders and mission partners follow to build an operational course of action to achieve strategic objectives. MDMP requires time, resources, and coordination – all competing items the commander weighs to make the optimal decision. WCCAAM receives the MDMP’s Mission Analysis phase as input, converts the wargame into a directed graph, processes a multi-commodity flow algorithm on the nodes and edges, where the commodities represent units, and the nodes represent blue bases and red threats, and then programmatically processes the MDMP steps to output the recommended COA. To demonstrate its use, a military scenario developed in the Advanced Framework for Simulation, Integration, and Modeling (AFSIM) processes the various factors through WCCAAM and produces an optimal, minimal risk COA.
{"title":"The wargame commodity course of action automated analysis method","authors":"William T. DeBerry, Richard Dill, K. Hopkinson, D. Hodson, M. Grimaila","doi":"10.1177/15485129211028318","DOIUrl":"https://doi.org/10.1177/15485129211028318","url":null,"abstract":"This research presents the wargaming commodity course of action automated analysis method (WCCAAM) – a novel approach to assist wargame commanders in developing and analyzing courses of action (COAs) through semi-automation of the military decision making process (MDMP). MDMP is a seven-step iterative method that commanders and mission partners follow to build an operational course of action to achieve strategic objectives. MDMP requires time, resources, and coordination – all competing items the commander weighs to make the optimal decision. WCCAAM receives the MDMP’s Mission Analysis phase as input, converts the wargame into a directed graph, processes a multi-commodity flow algorithm on the nodes and edges, where the commodities represent units, and the nodes represent blue bases and red threats, and then programmatically processes the MDMP steps to output the recommended COA. To demonstrate its use, a military scenario developed in the Advanced Framework for Simulation, Integration, and Modeling (AFSIM) processes the various factors through WCCAAM and produces an optimal, minimal risk COA.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84861398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}