|
WSC 2007 Final Abstracts |
Military Applications Track
Monday 10:30:00 AM 12:00:00 PM
Military Keynote
Chair: J.A.
Hamilton, Jr. (Auburn University)
Military Keynote Address
John C. Deal
(BAE Systems Inc.)
Abstract:
Military keynote address delivered by John C. Deal,
Vice President of the Systems Engineering Electronics and Integrated Solutions
Operating Group at BAE Systems Inc.
Monday 1:30:00 PM 3:00:00 PM
UAV Simulation
Chair: Yan Gu
(Georgia Institute of Technology)
Validating a Network Simulation Testbed for Army
UAVs
Stephen Samuel Hamilton and Timothy Schmoyer (United States
Military Academy) and John Hamilton (Auburn University)
Abstract:
Auburn University, through the Army's Aviation and
Missile Research, Development and Engineering Center (AMRDEC) has been
supporting the Unmanned Systems Initiative (USI) program in three research
areas related to unmanned aerial vehicle (UAV). A major element in this work
is the development of a high fidelity modeling and simulation testbed to
support the USI program. This paper describes the testbed and the verification
and validation of the testbed.
Simulation-aided Path Planning of
UAV
Farzad Kamrani and Rassul Ayani (Royal Institute of Technology
(KTH))
Abstract:
The problem of path planning for Unmanned Aerial
Vehicles (UAV) with a tracking mission, when some a priori information about
the targets and the environment is available can in some cases be addressed
using simulation. Sequential Monte Carlo Simulation can be used to assess the
state of the system and target when the UAV reaches the area of responsibility
and during the tracking task. This assessment of the future is then used to
compare the impact of choosing different alternative paths on the expected
value of the detection time. A path with a lower expected value of detection
time is preferred. In this paper the details of this method is described.
Simulations are performed by a special purpose simulation tool to show the
feasibility of this method and compare it with an exhaustive search.
Self Organized UAV Swarm Planning Optimization for
Search and Destroy Using SWARMFARE Simulation
Dustin J. Nowak (Air
Force Institute of Technology), Ian Price (AEDC) and Gary B. Lamont (Air Force
Institute of Technology)
Abstract:
As military interest continues to grow for Unmanned
Aerial Vehicle (UAV) capabilities, the Air Force is exploring UAV autonomous
control, mission planning and optimization techniques. The SWARMFARE
simulation system allows for Evolutionary Algorithm computations of swarm
based UAV Self Organization (SO). Through Swarmfare, the capability exists to
evaluate guiding behaviors that allow autonomous control via independent agent
interaction with its environment. Current results show that through an
implementation of ten basic rules the swarm forms and moves about a space with
reasonable success. The next step is to focus on optimization of the
formation, traversal of the search space and attack. In this paper we cover
the capabilities, initial research results, and way ahead for this simulation.
Overall the SWARMFARE tool has established a sandbox in which it is possible
to optimize these and build new behaviors.
Monday 3:30:00 PM 5:00:00 PM
Military Communications
Chair:
Susan Heath (Naval Postgraduate School)
Simulation of Army Unmanned Aerial Vehicle
Communications
Richard Chapman, Drew Hamilton, Daniel Box, Stephen
Hamilton, Mark Kuhr, and Jonathan MacDonald (Auburn University)
Abstract:
We explore development of a high-fidelity simulation
testbed for various network architectures for communication between components
of tactical unmanned aerial systems, and for distribution of intelligence
gathered by these systems.
Applying Parallel and Distributed Simulation to Remote
Network Emulation
Yan Gu and Richard Fujimoto (Georgia Institute of
Technology)
Abstract:
Many of today's military services and applications run
on geographically distributed sites and need to be tested and evaluated under
realistic scenarios with many unpredictable factors. A remote network
emulation framework called ROSENET is proposed that can meet this requirement
by using a remote parallel simulation server to model the wide area network
and a local network emulator to provide timely QoS predictions for real world
applications. This paper discusses problems faced in applying parallel and
distributed simulation technique for the remote network emulation. The
experimental results show that timeliness and remote accessibility are main
concerns in applying parallel simulation to remote network emulation.
Application of BML to Inter-agent Communication in
the ITSimBw Simulation Environment
Philipp Huegelmeyer (Bundesamt
fur Sicherheit in der Informationstechnik), Ulrich Schade (FGAN) and Thomas
Zoeller (Fraunhofer IAIS)
Abstract:
In this contribution we analyze communication
requirements of multi-agent simulation systems using ITSimBw - developed at
Fraunhofer IAIS - as an example. A focus is put on issues concerning
inter-agent communication but complementary aspects of user interaction and
coupling with C2 systems are also discussed. We propose an augmented version
of the battle management language BML as a communication protocol that
perfectly matches our communication requirements both syntactically as well as
on the semantic level. We furthermore explain how such BML messages are
processed by our system.
Tuesday 8:30:00 AM 10:00:00 AM
Military Modeling
Chair: Arnold
Buss (Naval Postgraduate School)
Using a Low-resolution Entity Model for Shaping
Initial Conditions for High-resolution Combat Models
Darryl Ahner
(U.S. Army TRADOC Analysis Center-Monterey), Arnold H. Buss (Naval
Postgraduate School) and John Ruck (Rolands and Associates)
Abstract:
Determining the initial conditions for high-resolution
combat models presents a challenging modeling problem. These initial
conditions can have a major impact on the outcome of the analysis, and yet
there is a significant difficulty setting those conditions in a manner that
spans the important areas of the input factor space. This paper presents a
method for setting those initial conditions using a low-resolution,
entity-level combat model, Joint Dynamic Allocation of Fires and Sensors
(JDAFS). Like its predecessor DAFS, JDAFS models entities on the battlefield,
but to a lower degree of detail than most high-resolution combat models. This
allows substantial exploration of the input factor space, and can help make
the eventual high-resolution simulation runs more effective.
Model-based Measurement of Situation
Awareness
W. Scott Neal Reilly and Sean L. Guarino (Charles River
Analytics, Inc.) and Bret Kellihan (DCS Corporation)
Abstract:
Decision making in complex environments in the face of
uncertain and missing information is a daunting task. We describe a modeling
and simulation based approach to providing planners, analysts, and decision
makers with a better understanding of the effect of imperfect information on
the reliability of decisions made in such situations. We use techniques
adopted from Sensitivity Analysis to evaluate the sensitivity of particular
decision-making procedures to the uncertainty associated with the information
that is being used to make the decision. We use this analysis to support the
development of more robust decision-making procedures and effective and
efficient information-gathering plans. We demonstrate how these tools can be
used in both on-line decision analysis and off-line decision evaluation and
development, and we describe how these tools can be used to support complex
simulation systems such as the U.S. Army's Modeling Architecture for
Technology and Research EXperimentation (MATREX).
A Simulation Model for Military
Deployment
Ugur Ziya Yıldırım, Ihsan Sabuncuoglu, and Barbaros
Tansel (Bilkent University)
Abstract:
The Deployment Planning Problem (DPP) for military
units may in general be defined as the problem of planning the movement of
geographically dispersed military units from their home bases to their final
destinations using different transportation assets and a multimodal
transportation network while obeying the constraints of a time-phased force
deployment data describing the movement requirements for troops and equipment.
Our main contribution is to develop a GIS-based, object-oriented,
loosely-coupled, modular, platform-independent, multi-modal and
medium-resolution discrete event simulation model to test the feasibility of
deployment scenarios. While our simulation model is not a panacea for all, it
allows creation and testing the feasibility of a given scenario under
stochastic conditions and can provide insights into potential outcomes in a
matter of a few hours.
Tuesday 10:30:00 AM 12:00:00 PM
Operational Use of Military
Simulation
Chair: Alan Johnson (Air Force Institute of Technology)
Analyzing Air Combat Simulation Results with
Dynamic Bayesian Networks
Jirka Lauri Poropudas and Kai Matti
Virtanen (Helsinki University of Technology)
Abstract:
In this paper, air combat simulation data is
reconstructed into a dynamic Bayesian network. It gives a compact
probabilistic model that describes the progress of air combat and allows
efficient computing for study of different courses of the combat. This
capability is used in what-if type analysis that investigates the effect of
different air combat situations on the air combat evolution and outcome. The
utilization of the dynamic Bayesian network is illustrated by analyzing
simulation results produced with a discrete event air combat simulation model
called X-Brawler.
Integration of Underwater Sonar Simulation with a
Geographical Information System
Yanshen Zhu, Serge Sala-Diakanda,
Luis Rabelo, Jose A. Sepulveda, and Maria Teresa Bull (University of Central
Florida)
Abstract:
This paper discusses the integration of a geographical
information system (GIS) with a simulation model of the sensors (active and
passive) used as components of a detection system on US Navy ships. The
simulation model is a tool developed to improve threat recognition, undersea
tactical awareness, countermeasure emissions, and counter-weapon fire control
that enables surface ships to survive a salvo of torpedo attacks. The model,
was implemented (2005-2006) in Java using AnyLogic?(by XJ Technologies). A
commercial GIS application provides data visualization, query, analysis, and
integration capabilities along with the ability to create and edit geographic
data. The simulation model runs and seamlessly gets geographical information
from ArcGIS (by ESRI corporation) in order to make decisions such as avoiding
a ship going aground. Statistics and animations are controlled by the
simulation software, while the maps and the movements of the environment
object above of the map is handled by ArcGIS.
Using Discrete Event Simulation to Examine Marine
Training at the Marine Corps Communication-Electronics School
Jon
W. Davenport, Charles R. Neu, William R. Smith, and Susan K. Heath (Naval Post
Graduate School)
Abstract:
This paper presents a discrete-event simulation model
used to explore various possibilities for improving the training continuum at
the Marine Corps Communication-Electronics School. The goal of the analysis is
to reduce the average waiting time experienced by Marines as they wait for
their formal training to commence. Results show that the implementation of
even the least beneficial of these improvements yields a 37 percent reduction
in waiting time. The best single change yields an 82 percent reduction. This
translates into a 30 day reduction in average waiting time per Marine. If all
improvements were implemented, a reduction of 88 percent could be achieved,
bringing the average waiting time per Marine down to less than 5 days.
Tuesday 1:30:00 PM 3:00:00 PM
Advanced Techniques in Military
Simulation
Chair: Robert Owor (Albany State University)
A Knowledge-based Method for the Validation of
Military Simulation
Feiyan Min, Ping Ma, and Ming Yang (Harbin
Institute of Technology)
Abstract:
The validation of modern military simulation relies
heavily on the opinions of military experts, and it makes the validation task
exhaustive and time-consuming. The knowl-edge-based methods can be applied for
these problems. There are three kinds of knowledge sets in military simulation
validation, namely, domain knowledge, inference knowledge and validation task
knowledge. By analyzing the context of these knowledge, three types of
knowledge models are developed. Based on these knowledge models, the implement
of knowledge-based system is detailed. However, this validation system can be
practical for the validation of military simulation by enriching the knowledge
base.
Blending Systems Engineering Principles and
Simulation-based Design Techniques to Facilitate Military Prototype
Development
Stephanie J. Lackey and Johathan T. Harris (Naval Air
Warfare Center Training Systems Division) and Linda C. Malone and Denise M.
Nicholson (University of Central Florida)
Abstract:
Tactical communications represent a critical skill set
to military training at the individual service level and to the joint military
community. As the complexity of the operational environment increases, the
methods and devices employed to address tactical communications training
follow suit. One mitigation approach incorporates simulation tools by merging
live training elements with virtual, or simulated, training devices. Thus,
integrating live and virtual components is particularly important to the
tactical communications training domain. A logical step in the advancement of
live-to-virtual communications is the development of a device capable of
merging, managing, and allocating multiple requests for live radio resources
in a dynamic live, virtual, constructive configuration. This paper details the
application of systems engineering principles and simulation-based design to
the development of a prototype Integrated Live-to-Virtual Communications
Server. A detailed discussion of the developmental approach and its impact
upon cost, schedule, and technical risks is provided.
Feasibility Study of Variance Reduction in the
Logistics Composite Model
George P. Cole III, Alan W. Johnson, and
John O. Miller (Air Force Institute of Technology)
Abstract:
The Logistics Composite Model (LCOM) is a stochastic,
discrete-event simulation that relies on probabilities and random number
generators to model scenarios in a maintenance unit and estimate optimal
manpower levels through an iterative process. Models such as LCOM involving
pseudo-random numbers inevitably have a variance associated with the output of
the model for each run. Reducing this output variance can be costly in the
additional time needed for multiple replications. This research explores the
application of three different methods for reducing the variance of the
model's output. The methods include Common Random Numbers, Control Variates,
and Antithetic Variates. The result is a successful variance reduction in the
primary output statistics of interest using the application of the Control
Variates technique, as well as a methodology for the implementation of Control
Variates in LCOM.
Tuesday 3:30:00 PM 5:00:00 PM
Security in Military Simulation
Chair: Stephen Hamilton (United States Military
Academy)
A Simulation Framework for Energy-efficient Data
Grids
Ziliang Zong, Kiranmai Bellam, and Xiao Qin (Auburn
University) and Yiming Yang (Intel Corporation)
Abstract:
High performance data grids increasingly become popular
platforms to support data-intensive applications. Reducing high energy
consumption caused by data grids is a challenging issue. Most previous studies
in grid computing focused on performance and reliability without taking energy
conservation into account. As such, designing energy-efficient data grids
system becomes highly desirable. In this paper, we propose a framework to
simulation energy-efficient data grids. We present an approach to integrating
energy-aware allocation strategies into energy-efficient data grids. Our
framework aims at simulating a data grid that can conserve energy for
data-intensive applications running on data grids.
An Elliptical Curve Cryptographic Algorithm for
Wireless RF Systems
Robert Steven Owor, Khalil Dajani, and
Zephyrinus Okonkwo (Albany State University) and John Hamilton (Auburn
University)
Abstract:
In this paper, we propose a new asymmetric
cryptographic algorithm (HOOD CRYPT) based on the Elliptical Curve
Cryptographic approach. The algorithm describes how an orthogonal frequency
division multiplexing (OFDM) based RF wireless system can be encrypted using
planner matrix Elliptical Curve Cryptography (ECC). The newly described
asymmetric algorithm can be applied to the OFDM transmission scheme in the
design of more robust and secure cryptography in portable wireless devices. An
analysis of the proposed algorithm is made using the discrete logarithm
approach. Two methods, namely, Pollard's rho Attack and Index Calculus are
investigated with respect to the new algorithm. We found that our method makes
it even more difficult to break the ECC encryption.
Real-time Prediction in a Stochastic Domain Via
Similarity-based Data-mining
Timo Steffens and Philipp Huegelmeyer
(Fraunhofer IAIS)
Abstract:
This paper introduces an application and a methodology
to predict future states of a process under real-time requirements. The
real-time functionality is achieved by creating a Bayesian tree via
data-mining on agent-based simulations. The computationally expensive parts
are handled in an offline phase, while the online phase is computationally
cheap. In the offline phase the simulations are run and meaningful clusters of
states are identified by use of virtual attributes. Then the transition
probabilities between states of different clusters are organized in a Bayesian
tree. Finally, in the online phase similarity measures are used again in order
to classify query states into the clusters and to infer the probability of
future states. The application domain is the support of military units during
missions and maneuvers.