>> How to Ensure Fair Fight in LVC Simulation: Architectural and Procedural Approaches Robert Siegfried, Johannes Lüthi, Günter Herrmann, Matthias Hahn.

Slides:



Advertisements
Similar presentations
Andrea Maurino Web Service Design Methodology Batini, De Paoli, Maurino, Grega, Comerio WP2-WP3 Roma 24/11/2005.
Advertisements

Integration of MBSE and Virtual Engineering for Detailed Design
1 Aspects of IEEE P1471 Viewpoints in Unified Modeling Language (UML) Manzur Ashraf, BRAC University Humayra Binte Ali, Dhaka University Md.Mahfuz Ashraf,
COMET Approach for UML Overview
Quality Assurance/Quality Control Plan Evaluation February 16, 2005.
Eindhoven Technische Universiteit What offers VR to the Designer Bauke de Vries Henri Achten.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 4 Slide 1 Software processes 2.
Requirements Specification and Management
Improving System Safety through Agent-Supported User/System Interfaces: Effects of Operator Behavior Model Charles SANTONI & Jean-Marc MERCANTINI (LSIS)
System Integration Verification and Validation
Deliverable #8: Detailed Design - Overview due: Wednesday, 7 March All Deliverable materials are to be posted into Team Concert. Your to.
Chapter 4 Quality Assurance in Context
Software Requirements
SE 555 – Software Requirements & Specifications Introduction
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
System Engineering Instructor: Dr. Jerry Gao. System Engineering Jerry Gao, Ph.D. Jan System Engineering Hierarchy - System Modeling - Information.
Software Quality Assurance For Software Engineering && Architecture and Design.
WORKFLOWS IN CLOUD COMPUTING. CLOUD COMPUTING  Delivering applications or services in on-demand environment  Hundreds of thousands of users / applications.
10 December, 2013 Katrin Heinze, Bundesbank CEN/WS XBRL CWA1: DPM Meta model CWA1Page 1.
© Rheinmetall Defence 2013 The Geospatial Catalogue and Database Repository (GCDR) and the Knowledge Management System (KMS) Shane Reschke – Technical.
Chapter 10 Architectural Design
UML - Development Process 1 Software Development Process Using UML (2)
Introduction to Software Quality Assurance (SQA)
Chapter 2 The process Process, Methods, and Tools
CLEANROOM SOFTWARE ENGINEERING.
1 REQUIREMENT ENGINEERING Chapter 7. 2 REQUIREMENT ENGINEERING Definition Establishing what the customer requires from a software system. OR It helps.
1 Chapter 2 The Process. 2 Process  What is it?  Who does it?  Why is it important?  What are the steps?  What is the work product?  How to ensure.
Active Monitoring in GRID environments using Mobile Agent technology Orazio Tomarchio Andrea Calvagna Dipartimento di Ingegneria Informatica e delle Telecomunicazioni.
Chapter 2: Software Process Omar Meqdadi SE 2730 Lecture 2 Department of Computer Science and Software Engineering University of Wisconsin-Platteville.
High Level Architecture Overview and Rules Thanks to: Dr. Judith Dahmann, and others from: Defense Modeling and Simulation Office phone: (703)
Odyssey A Reuse Environment based on Domain Models Prepared By: Mahmud Gabareen Eliad Cohen.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
OOI CI LCA REVIEW August 2010 Ocean Observatories Initiative OOI Cyberinfrastructure Architecture Overview Michael Meisinger Life Cycle Architecture Review.
Modeling and simulation of systems Model building Slovak University of Technology Faculty of Material Science and Technology in Trnava.
Lecture 7: Requirements Engineering
P1516.4: VV&A Overlay to the FEDEP 20 September 2007 Briefing for the VV&A Summit Simone Youngblood Simone Youngblood M&S CO VV&A Proponency Leader
SOFTWARE DESIGN AND ARCHITECTURE LECTURE 05. Review Software design methods Design Paradigms Typical Design Trade-offs.
1 What is OO Design? OO Design is a process of invention, where developers create the abstractions necessary to meet the system’s requirements OO Design.
Part4 Methodology of Database Design Chapter 07- Overview of Conceptual Database Design Lu Wei College of Software and Microelectronics Northwestern Polytechnical.
Object-Oriented Modeling: Static Models. Object-Oriented Modeling Model the system as interacting objects Model the system as interacting objects Match.
From FOMs to BOMs and Back Again Paul Gustavson Tram Chase Larry Root SimVentions, Incorporated Bowman Drive, Suite 502 Fredericksburg, VA
International Workshop Jan 21– 24, 2012 Jacksonville, Fl USA Model-based Systems Engineering (MBSE) Initiative Slides by Henson Graves Presented by Matthew.
Chapter 2 Object-Oriented Paradigm Overview. Getting Acquainted with the Class Project Read the requirements specification carefully Make note of any.
1 Chapter 8 Building the Analysis Model (1) Analysis Concepts and Principles.
16/11/ Semantic Web Services Language Requirements Presenter: Emilia Cimpian
Week 04 Object Oriented Analysis and Designing. What is a model? A model is quicker and easier to build A model can be used in simulations, to learn more.
Winter 2007SEG2101 Chapter 31 Chapter 3 Requirements Specifications.
Software Engineering Introduction.
Software Production ( ) Lecture 3: Dr. Samer Odeh Hanna (PhD) office: 318.
Testing Overview Software Reliability Techniques Testing Concepts CEN 4010 Class 24 – 11/17.
SwCDR (Peer) Review 1 UCB MAVEN Particles and Fields Flight Software Critical Design Review Peter R. Harvey.
 Copyright 2005 Digital Enterprise Research Institute. All rights reserved. SOA-RM Overview and relation with SEE Adrian Mocan
Requirement Elicitation Review – Class 8 Functional Requirements Nonfunctional Requirements Software Requirements document Requirements Validation and.
Viewpoint Modeling and Model-Based Media Generation for Systems Engineers Automatic View and Document Generation for Scalable Model- Based Engineering.
Getting Ready for the NOCTI test April 30, Study checklist #1 Analyze Programming Problems and Flowchart Solutions Study Checklist.
 System Requirement Specification and System Planning.
Software Design Process. What is software? mid-1970s executable binary code ‘source code’ and the resulting binary code 1990s development of the Internet.
1 The XMSF Profile Overlay to the FEDEP Dr. Katherine L. Morse, SAIC Mr. Robert Lutz, JHU APL
16CS202 & Software Engineering
Software Quality Assurance
BOMs – Base Object Models
IEEE Std 1074: Standard for Software Lifecycle
Software Requirements
Entry-Task-Validation-Exit (ETVX)
The Extensible Tool-chain for Evaluation of Architectural Models
Chapter 5 Designing the Architecture Shari L. Pfleeger Joanne M. Atlee
Software Quality Assurance
Ontology-Based Approaches to Data Integration
Dept. of Computation, UMIST
Software Development Process Using UML Recap
Presentation transcript:

>> How to Ensure Fair Fight in LVC Simulation: Architectural and Procedural Approaches Robert Siegfried, Johannes Lüthi, Günter Herrmann, Matthias Hahn

>> Context and Overview Fair Fight Live, Virtual, Constructive Verification & Validiation Fair Fight Interoperability Service Based Approaches Development Processes

>> The Levels of Conceptual Interoperability Model (LCIM) [Tolk 2003]

>> Fair Fight Definitions „Two or more simulations may be considered to be in a fair fight when differences in the simulations‘ performance characteristics have significantly less effect on the outcome of the conflict than actions taken by the simulation participants.“ [DIS Glossary, 1995] „Fair-Fight exists among two simulation systems if the differences in representing and mapping reality in the simulation models does not lead to a systematic model immanent advantage and consequently unrealistic simulation results for one of the simulation systems.” [Ufer et al., 2009] “Fair Fight is obtained when the systems are interoperable and the system performance capabilities of the simulators are complimentary for a given task throughout the simulation environment. Fair Fight is also task dependent and includes items such as similarity in the equality made in use of the synthetic environment features, automated force behaviors, etc. Equality of use is determined within pre-determined tolerances.” [Goldiez, Sottilare, 2008]

>> Fair Fight Examples for Violations Environment Representation Object Representation Capabilities of Entities Computation of Visibility / Line of Sight Weapon Effect Computation Time Management Issues Bandwith of Communication [Picture: IABG mbh]

>> Fair Fight Verification & Validation Fair Fight is a V&V Issue! Fair fight violation  violation of pragmatic interoperability Reasons for violations can be found on all LCIM levels Fair fight Requirements must be defined at pragmatic level Detection is subject to pragmatic level Validity requirements für other (lower) levels can be derived Open questions: Unambiguous and quantifiable description of fair fight requirements? Systematic and reliable tests for fair fight?

Do not explicitely address fair fight >> Fair Fight Service-Based Approaches Usually: Service-Based architecture striving for Reusability Composability using existing components offered as services Or: Simulation services as support functions Most prominent example: HLA and its services (HLA Federate Interface Specification) Do not explicitely address fair fight

>> Service Based Architecture VINTEL [Neugebauer et al. 2009]

>> Service-Based Architecture in VINTEL Examples for Services Weapon Effect Service (WES) Service-Based computation of weapon effects Unified algorithms and levels of detail within one simulation Communication Effect Service (CES) Calculation of probabilities of radio communication between entities Equal algorithms, constraints, and side effects Synthetic Environment Service (SES) Initial synthetic environmental data Unified dynamic updates of this data

>> Fair Fight Need for Conceptual Interoperability [Tolk 2003]

>> Fair Fight Treatment in VEVA VEVA phases Documentation to be prepared according to VEVA Products to be prepared and additional documentation Objectives and Requirements Organization and Execution IT Security Concept Goal Definition Scenario Conceptual Planning Conceptual Model Data Recording and Management Plan Simulation Environment Data Recording and Management Plan Federation Object Model (FOM) Federation Agreements System-Dependent Planning InitService Configuration Structural Plan Adapted Components Federation Execution Preparation Configuration and Execution Plan Data Recording and Management Plan Configuration and Execution Plan Results Execution Simulation Data Processed and Verified Data Analysis Results Results Reusable Components Follow-Up Final Report(s)

>> Fair Fight Meta Process complimenting VEVA Procedure Model VEVA tries to check for fair fight violations Phase 3 (system dependent planning) Phase 4 ( execution preparation) Supported by List of known fair fight problems structured according to LCIM List Updates via Phase 5 (simulation execution): simulation monitoring + identification of fair fight violations Phase 7 (follow up): documenting and reporting fair fight violations

Thank you for your attention. >> Fair Fight Thank you for your attention. Questions? Comments?