32,343 research outputs found

    21st Century Simulation: Exploiting High Performance Computing and Data Analysis

    Get PDF
    This paper identifies, defines, and analyzes the limitations imposed on Modeling and Simulation by outmoded paradigms in computer utilization and data analysis. The authors then discuss two emerging capabilities to overcome these limitations: High Performance Parallel Computing and Advanced Data Analysis. First, parallel computing, in supercomputers and Linux clusters, has proven effective by providing users an advantage in computing power. This has been characterized as a ten-year lead over the use of single-processor computers. Second, advanced data analysis techniques are both necessitated and enabled by this leap in computing power. JFCOM's JESPP project is one of the few simulation initiatives to effectively embrace these concepts. The challenges facing the defense analyst today have grown to include the need to consider operations among non-combatant populations, to focus on impacts to civilian infrastructure, to differentiate combatants from non-combatants, and to understand non-linear, asymmetric warfare. These requirements stretch both current computational techniques and data analysis methodologies. In this paper, documented examples and potential solutions will be advanced. The authors discuss the paths to successful implementation based on their experience. Reviewed technologies include parallel computing, cluster computing, grid computing, data logging, OpsResearch, database advances, data mining, evolutionary computing, genetic algorithms, and Monte Carlo sensitivity analyses. The modeling and simulation community has significant potential to provide more opportunities for training and analysis. Simulations must include increasingly sophisticated environments, better emulations of foes, and more realistic civilian populations. Overcoming the implementation challenges will produce dramatically better insights, for trainees and analysts. High Performance Parallel Computing and Advanced Data Analysis promise increased understanding of future vulnerabilities to help avoid unneeded mission failures and unacceptable personnel losses. The authors set forth road maps for rapid prototyping and adoption of advanced capabilities. They discuss the beneficial impact of embracing these technologies, as well as risk mitigation required to ensure success

    CGAMES'2009

    Get PDF

    Expanding alliance: ANZUS cooperation and Asia–Pacific security

    Get PDF
    Is an alliance conceived as a bulwark against a resurgence of Japanese militarism and which cut its military and intelligence teeth in the Cold War is still relevant to today’s strategic concerns? Overview The alliance between Australia and the US, underpinned by the formal ANZUS Treaty of 1951, continues to be a central part of Australian defence and security thinking and an instrument of American policy in the Asia–Pacific. How is it that an alliance conceived as a bulwark against a resurgence of Japanese militarism and which cut its military and intelligence teeth in the Cold War is still relevant to today’s strategic concerns? The answer is partly—and importantly—that the core values of the ANZUS members are strongly aligned, and successive Australian governments and American presidential administrations have seen great value in working with like-minded partners to ensure Asia–Pacific security. Far from becoming a historical curiosity, today it’s not just relevant, but of greater importance than has been the case in the past few decades. To explore new ideas on how to strengthen the US–Australia alliance, ASPI conducted a high-level strategic dialogue in Honolulu in July this year. Discussions canvassed the future strategic environment; the forthcoming Australian Defence White Paper; budget, sovereignty and expectation risks; and cooperation in the maritime, land, air, cyber, space and intelligence domains. A key purpose of the Honolulu dialogue was to help ASPI develop policy recommendations on the alliance relationship for government. This report is the product of those discussions

    Research Naval Postgraduate School, v.12, no.3, October 2002

    Get PDF
    NPS Research is published by the Research and Sponsored Programs, Office of the Vice President and Dean of Research, in accordance with NAVSOP-35. Views and opinions expressed are not necessarily those of the Department of the Navy.Approved for public release; distribution is unlimited

    Gaming Business Communities: Developing online learning organisations to foster communities, develop leadership, and grow interpersonal education

    Get PDF
    This paper explores, through observation and testing, what possibilities from gaming can be extended into other realms of human interaction to help bring people together, extend education, and grow business. It uses through action learning within the safety of the virtual world within Massively Multiplayer Online Games. Further, I explore how the world of online gaming provides opportunity to train a wide range of skills through extending Revans’ (1980) learning equation and action inquiry methodology. This equation and methodology are deployed in relation to a gaming community to see if the theories could produce strong relationships within organisations and examine what learning, if any, is achievable. I also investigate the potential for changes in business (e.g., employee and customer relationships) through involvement in the gaming community as a unique place to implement action learning. The thesis also asks the following questions on a range of extended possibilities in the world of online gaming: What if the world opened up to a social environment where people could discuss their successes and failures? What if people could take a real world issue and re‐create it in the safe virtual world to test ways of dealing with it? What education answers can the world of online gaming provide

    Avoiding Pitfalls in Undergraduate Simulation Courses

    Get PDF
    Simulation development has historically been a specialized skill performed by engineers with graduate-level training and industry experience. However, advances in computing technology, coupled with the rise of model-based systems engineering, have dramatically increased the usage of simulations, such that most engineers now require a working knowledge of modeling and simulation (M&S). As such, an increasing number of undergraduate engineering programs are now requiring students to complete a simulation course. These courses are intended to reinforce foundational engineering knowledge while also teaching the students useful M&S tools that they will need in industry. Yet, a number of pitfalls are associated with teaching M&S to undergraduate students. The first major pitfall is focusing on the tool or software without properly teaching the underlying methodologies. This pitfall can result in students becoming fixated on the software, limiting their broader knowledge of M&S. The second pitfall involves the use of contrived, academic tutorials as course projects, which limits students from fully understanding the simulation design process. The third and fourth pitfalls are only superficially covering verification and validation and not building upon material that was taught in other courses. Finally, the fifth pitfall is the over-reliance on group projects and tests over individual projects. These pitfalls were uncovered during academic years (AYs) 2017 and 2018 in different undergraduate simulation courses at the United States Military Academy. The combat modeling course adapted its structure and content in AY2019 to address these pitfalls, with several lessons learned that are applicable to the broader simulation education community. Generally, students gained a broader understanding of M&S and submitted higher quality work. Additionally, the course-end feedback found an overall increase in M&S knowledge, with many students choosing to use M&S to support their honors theses and capstone projects, a trend not seen in past years

    An Evaluation Schema for the Ethical Use of Autonomous Robotic Systems in Security Applications

    Get PDF
    We propose a multi-step evaluation schema designed to help procurement agencies and others to examine the ethical dimensions of autonomous systems to be applied in the security sector, including autonomous weapons systems
    corecore