Modeling control in computer simulations
Claflin, Robert Alan
Parry, Samuel H.
MetadataShow full item record
This study outlines the design, implementation, and testing of the General Control Model as applied to the Future Theater-Level Model (FTLM) for the control of Joint and Allied Forces for all operational sides. The study develops a notion of battlefield control and describes the characteristics necessary to represent this notion of control in a computer simulation. Central to the implementation of the General Control Model is the robust capability for the user-analyst to describe any control relationship of research interest and to do so without having to alter the programming code. The user-analyst is provided the capability to determine the cause and effect relationship of different control representations in a simulation. A full description of the model is complimented by an explanation of the implementation to facilitate the use of the General Control Model. A discussion of the initial test results leads to a more rigorous test which confirms the intended behavior of the General Control Model in FTLM. Lastly, recommendations for future improvements to the General Control Model and FTLM are outlined to assist future research endeavors.
Showing items related by title, author, creator and subject.
Boston, Glenn J. (Monterey, California: U.S. Naval Postgraduate School, 1979-12);NALCOMIS has been conceived as a modern management information system which will provide for effective and efficient execution of the Naval Aviation Maintenance Program (NAMP) by providing aviation maintenance and material ...
Larimer, Larry R (Monterey, California. Naval Postgraduate School, 1997-06);The Department of Defense proclamation that all simulations comply with High Level Architecture (HLA) standards prompted the U.S. Army Training and Doctrine Command (TRADOC) Analysis Center (TRAC) to investigate the ...
Baugess, Kenneth G.; Chamberlain, Jason R.; Chung, Samuel K.; Kelly, Ryan F. (Monterey, California: Naval Postgraduate School, 2014-09);Current network protection technologies often require code recompilation to integrate new technologies, can be prone to denial of service attacks, may require invasive software applications to provide an automated response, ...