KEYWORDS: Web services, Data modeling, Stars, Chemical elements, Analytical research, Data communications, Information architecture, Software development, Standards development, Computer programming
Military solutions to enable information sharing are being developed that will fundamentally change future concepts of
operation. The development of sophisticated approaches to managing this information is a key element to reliably
disseminate valued information to the tactical edge. This paper will describe the merging of two such systems to support
these tactical edge users; the Air Force Research Laboratory (AFRL) Joint Battlespace Infosphere Reference
Implementation (JBI/RI) and the Northrop Grumman Advanced Information Architecture (AIATM). The newly formed
system is called the Advanced Information Management System (AIMS).
The resulting technology, rooted in a service oriented approach, provides a managed information dissemination approach
through the use of publish, subscribe, and query services. Information can be collected and shared among Communities
of Interest (COI) without specific involvement from the tactical users. Persistence (via archiving to repositories), is a
new capability added to the existing AIATM. Extreme care is taken to effectively manage the information within this
dynamic environment. For example, Information resulting from queries and subscriptions is cached to mitigate potential
bandwidth challenges at critical location within the system. AIMS improves security by allowing the establishment of
roles for retrieval/publishing of information. The access to information is controlled not only at the message level but
also by specified elements within the metadata tags. Lastly, the fortification of AIMS with Web Services allows for a
highly cohesive loosely coupled design.
AIMS utilizes of a Universal Description, Definition, and Integration (UDDI)[2] registry to describe and register services
within the architecture. The UDDI allows implementations outside of AIMS (3rd party) to invoke any of the registered
services for use within their own applications.
KEYWORDS: Web services, Standards development, Information security, Reliability, Information architecture, Computer architecture, Databases, Telecommunications, Defense technologies, Defense and security
We compare the overall structure of military GIG and NCES architectures with that of the object oriented architectures (CORBA, J2EE and .NET) and of the emerging Web Services architecture. While the match is good in many ways, particularly with respect to Web Services, we also identify a series of shortcomings that could stymie attempts to implement a GIG or NCES system directly on a commercial Web Services platform. Our comparison leads to suggestions for experimental investigations of some topics, but also for more fundamental inquiry in some areas where the scientific base is inadequate. Several issues of the latter sort arise when we consider the mixture of scalability, security, robustness, and time-criticality that must be simultaneously satisfied in demanding military applications.
KEYWORDS: Radar, High power radar, Systems modeling, Computing systems, Data modeling, Electromagnetic radiation, Computer simulations, Printing, Analytical research, System integration
Effects-based operations (EBO) are proving to be a vital part of current concepts of operations in military missions and consequently need to be an integral part of current generation wargames. EBO focuses on the producing effects from military activities, as opposed to the direct result of attacking targets. Alternatively, the emphasis of conventional wargames is focused on attrition-based modeling and is incapable of assessing effects and their contribution to the overall mission objectives. For wargames to be effective, they must allow users to evaluate multiple ways to accomplish the same goal with a combination of direct, indirect and cascading events (actions). The focus of this paper is to describe the development of a methodology for the implementation of EBO concepts into modern wargames. The design approach was to develop a generic methodology and demonstrate how simulation objects can incorporate EBO capabilities. The authors will illustrate the application of the methodology utilizing an EBO scenario example, which was developed to test the system.
In the current world environment, the rapidly changing dynamics of organizational adversaries are increasing the difficulty for Military Analysts and Planners to accurately predict potential actions. As an integral part of the planning process, we need to assess our planning strategies against the range of potential adversarial actions. This dynamic world environment has established a necessity to develop tools to assist in establishing hypotheses for future adversary actions. Our research investigated the feasibility to utilize an adversarial tool as the core element within a predictive simulation to establish emergent adversarial behavior. It is our desire to use this intelligent adversary to generate alternative futures in performing Course of Action (COA) analysis. Such a system will allow planners to gauge and evaluate the effectiveness of alternative plans under varying actions and reactions. This research focuses on one of many possible techniques required to address the technical challenge of generating intelligent adversary behaviors. This development activity addresses two research components. First, establish an environment in which to perform the feasibility experiment and analysis. The proof of concept performed to analyze and assess this feasibility of utilizing an adversarial inferencing system to provide emergent adversary behavior is discussed. Second, determine if the appropriate interfaces can be reasonably established to provide integration with an existing force structure simulation framework. The authors also describe the envisioned simulation system and the software development performed to extend the inferencing engine and system interface toward that goal. The experimental results of observing emergent adversary behavior by applying the simulated COAs to the adversary model will be discussed. The research addresses numerous technological challenges in developing the necessary methodologies and tools for a software-based COA analysis framework utilizing intelligent adversarial intent.
KEYWORDS: Computer architecture, Analytical research, Computer simulations, Information operations, Modeling and simulation, Protactinium, Data processing, Information architecture, Computer networks, Sensors
A Distributed Information Enterprise Modeling and Simulation (DIEMS) framework, presently under development, is applied to the analysis of a Joint Battlespace Infosphere (JBI) Pub/Sub architecture's infrastructural requirements. This analysis is an example of one methodology that can be employed utilizing the DIEMS framework. This analysis capability permits the information systems engineer to ensure that the planned JBI architecture deployment will provide the required information exchange performance on the infrastructure provided. This paper describes the DIEMS framework including its application in constrained and unconstrained resource utilization modes. A JBI architecture is evaluated in the context of a representative operational scenario on one infrastructure. The simulator's unconstrained resource mode is employed to identify the architecture's ideal operational requirements and in turn identify potential resource limitations. The constrained simulation mode is employed to evaluate the potential choke points in relation to the
architecture's performance. The results identify the infrastructure changes required so that the specific JBI architecture will achieve the required operational performance.
The Air Force is developing a Distributed Information Enterprise Modeling and Simulation (DIEMS) framework under sponsorship of the High Performance Computer Modernization Office Common High Performance Computing Software Support Initiative (HPCMO/CHSSI). The DIEMS framework provides a design analysis environment for deployable distributed information management systems. DIEMS establishes the necessary analysis capability allowing developers to identify and mitigate programmatic risk early within the development cycle to allow successful deployment of the associated systems. The enterprise-modeling framework builds upon the Synchronous Parallel Environment for Emulation and Discrete-Event Simulation (SPEEDES) foundation. This simulation framework will utilize 'Challenge Problem' class resources to address more than five million information objects and hundreds of thousands of clients comprising the future information based force structure. The simulation framework will be capable of assessing deployment aspects such as security, quality of service, and fault tolerance. SPEEDES provides an ideal foundation to support simulation of distributed information systems on a multiprocessor platform. SPEEDES allows the simulation builder to perform optimistic parallel processing on high performance computers, networks of workstations, or combinations of networked computers and HPC platforms.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.