{"title":"Modeling fog and friction in military enterprise","authors":"R. Wallace","doi":"10.1177/15485129231195904","DOIUrl":"https://doi.org/10.1177/15485129231195904","url":null,"abstract":"","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89600205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adapting military doctrine in the shadow of the future","authors":"Todd C. Lehmann","doi":"10.1177/15485129231189286","DOIUrl":"https://doi.org/10.1177/15485129231189286","url":null,"abstract":"Strategic competition creates significant evolutionary pressures on conventional militaries to improve their doctrines and overall military effectiveness. Why are some militaries more effective at evolving their doctrine than others? This paper develops a theory which argues that complex security environments force militaries to optimize their organizations for the commitment horizon they possess for a security issue. This optimization drives militaries to take on particular organizational characteristics, such as the amount of delegation and the tolerance for experimenting with new tactics, which affect their performance in systematic ways as a result. Using an agent-based model, this study evaluates the theory by simulating different organizational characteristics and evaluating how doctrinal effectiveness changes based on different commitment horizons. Results from the simulations suggest a typology of militaries according to their commitment horizon. Contrary to existing arguments that military effectiveness is determined by a particular set of strategies or by a favorable military culture, the results also suggest that doctrinal effectiveness follows a U-shaped curve as the commitment horizon increases. To illustrate the logic of the model, this study describes the typology and its implications.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75540486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Rotshtein, Brian A. Polin, D. Katielnikov, Neskorodieva Tetiana
{"title":"Modeling of Russian–Ukrainian war based on fuzzy cognitive map with genetic tuning","authors":"A. Rotshtein, Brian A. Polin, D. Katielnikov, Neskorodieva Tetiana","doi":"10.1177/15485129231184900","DOIUrl":"https://doi.org/10.1177/15485129231184900","url":null,"abstract":"The Russian–Ukrainian conflict is considered as a dynamic system, whose variables are factors affecting the losses of the Russian army and the threat of the use of nuclear weapons. A fuzzy cognitive map (FCM) is used for modeling, that is, a directed graph whose vertices are model variables, and the weights of arcs are the degrees of positive and negative influences of variables on each other. The following factors influencing the losses of the Russian army and the threat of a nuclear strike were selected: resistance of the Ukrainian army, support of Ukraine with weapons, economic sanctions against Russia, opposition to the Russian government and its self-preservation instinct. The degrees of the influence of factors on each other and on the possibility of using nuclear weapons are evaluated by experts using fuzzy terms, which correspond to numeric values. To adjust the FCM, a genetic algorithm is used to select the degrees of influence of factors that minimize the discrepancy between the simulation results and expert estimations. The obtained FCM is used for scenario modeling of the conflict according to the “what if” scheme and ranking of factors according to their degree of influence on the level of nuclear threat.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86087779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decision-making in the shadow of strategic competition costs","authors":"Karen E. Albert","doi":"10.1177/15485129231186411","DOIUrl":"https://doi.org/10.1177/15485129231186411","url":null,"abstract":"In today’s current climate of near-peer conflict, it is important to understand the dynamics of strategic competition. Understanding these dynamics will improve decision-making in this environment, which is often called the gray zone of conflict. I use a two-stage simultaneous move game to study the state of strategic competition. The simulation of this model reveals two dynamics through which strategic competition can be managed. The first is the probability of winning a confrontation. The second is the cost of actions. As the cost of more-aggressive actions increases relative to the cost of less-aggressive actions, then even with higher chances of winning a confrontation, players are incentivized to choose less-aggressive actions. Increasing costs of the most-aggressive actions, but not the less-aggressive ones, offers decision-makers a second avenue through which they can encourage less-aggressive competition, which is less likely to instigate a full crisis or lead to war.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86098182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
James Humann, Michael Equi, Natalie Link, Perla Latorre-Suarez
{"title":"Multiple UAVs on a shared tether: Use cases, modeling, and probabilistic path planning","authors":"James Humann, Michael Equi, Natalie Link, Perla Latorre-Suarez","doi":"10.1177/15485129231185588","DOIUrl":"https://doi.org/10.1177/15485129231185588","url":null,"abstract":"We analyze the concept of multiple unmanned aerial vehicles (UAVs) on a shared tether (MUST), where the UAVs act as control nodes for the shape of the tether, enabling the system to maneuver around obstacles without tangling or colliding for increased flexibility compared with single-tethered UAVs. MUST use cases are gathered from stakeholders in the military, public safety, and commercial domains. We present a model for the tether shape to use in collision checking and a model for the interactions among tether weight, size, and power, which we exercise to determine the maximum tether segment sizes. We apply three probabilistic path-planning algorithms from the literature to MUSTs, using a novel local planner and constraint set. In simulation, we show that probabilistic planners are a feasible approach to path planning for MUSTs with curved tether segments. We also show the first manual piloting modality of MUSTs.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77470296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Back to the basics: international relations, intelligence, and strategic competition","authors":"C. Q. Thurston","doi":"10.1177/15485129231185363","DOIUrl":"https://doi.org/10.1177/15485129231185363","url":null,"abstract":"As United States foreign policy returns to a focus on great power competition, it is worth reviewing the fundamental theories associated with understanding the threat and its impact on state relations. The social science fields of international relations (IR) and security studies provide the foundational theory and associated concepts for strategic intelligence analysis in this area. The paper addresses four broad theories (realism, liberalism, economic structuralism, and constructivism) and illustrates their impact on policymakers and intelligence analysts as they craft strategy. The author argues for a more explicit inclusion of IR theories, frameworks, and methods in strategic intelligence analysis.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85153023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ryan Byrne, Nichole Davis, Raj Gupta, Anthony C. Santago, A. Tolk
{"title":"Developing a Blast Injury Modeling Capability: Application of Concepts from the Defense M&S Domain","authors":"Ryan Byrne, Nichole Davis, Raj Gupta, Anthony C. Santago, A. Tolk","doi":"10.1177/15485129231184258","DOIUrl":"https://doi.org/10.1177/15485129231184258","url":null,"abstract":"Increases in computational power have contributed to growing interest in using modeling and simulation (M&S) to better understand and address blast injury for US service members. The development of an M&S capability that can comprehensively simulate human injury, lethality, and impairment due to blast injury threats in the military environment requires a large, coordinated integration of many models and simulations. This contribution describes how various lessons learned from the defense M&S domain were used to support the future development of an envisioned Modeling Capability for blast injury by providing simulation functionality for simulation-based experimentation. It first addresses conceptually the interoperability challenges when more than one simulation can be or must be applied and possibly composed for the experiment. This leads to the development of a proposed concept of operations for the application of the Modeling Capability and the development of a framework of services needed to allow the identification of an applicable simulation solution, selecting the subset of those simulations, composing them for the experiment, and assessing the results. As a nascent endeavor, anticipated challenges for implementing these concepts are discussed, leveraging lessons learned regarding interoperability, composability, use of services, repositories, and development of simulation compositions to conduct simulation-based experiments.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82066888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adam T. Biggs, Joseph A. Hamilton, Greg Huffman, R. Markwald
{"title":"The lethality paradox: Goodhart’s Law and the challenge of measuring lethality","authors":"Adam T. Biggs, Joseph A. Hamilton, Greg Huffman, R. Markwald","doi":"10.1177/15485129231165527","DOIUrl":"https://doi.org/10.1177/15485129231165527","url":null,"abstract":"Military performance must be evaluated, and one of the most critical concepts to measure involves the lethal capabilities of a military force. However, there are multiple challenges that complicate any accurate performance assessment, including theoretical issues of measurement due to statistical irregularities and practical limitations due to the military context. Here, we describe the lethality paradox, which states that measuring lethality could be a self-defeating exercise despite its necessity. Specifically, the value of any collected metric may be inherently reduced by the act of measurement while, also, creating operational vulnerabilities for a military force. This paradox is conceived as an extension of Goodhart’s Law and incorporates the same challenges of a personnel gaming a set standard rather than developing the skill set supposedly measured by this standard. Our discussion identifies the limitations and applications of Goodhart’s Law to lethality while also concluding with several proposed solutions to different paradoxical challenges.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83753184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preliminary debris risk assessment for mega-constellations in low and medium earth orbit due to satellite breakup","authors":"J. Canoy, Robert A. Bettinger","doi":"10.1177/15485129231163868","DOIUrl":"https://doi.org/10.1177/15485129231163868","url":null,"abstract":"This paper presents a theoretical analysis of the potential risk posed by artificial debris clouds in low Earth orbit (LEO) from mega-constellations, modeled after current communication constellations such as Starlink and OneWeb with 750 satellites each. The analysis examines three different constellation designs: a low-altitude LEO, a high-altitude LEO, and a medium Earth orbit (MEO) constellation, which will be positioned using the Walker-Delta design. The study is based on physics-based digital mission engineering and a Monte Carlo simulation framework. The simulation involves debris generated from a single breakup of one randomly selected satellite per run, but does not consider cascading debris events. This debris cloud is propagated for 1 week and how it interacts with the mega-constellation is recorded. The results show an average of 705.65 potential conjunctions within the LEO constellation, with 14.40% of those being considered catastrophic, and an average of 165.5 conjunctions in the MEO constellation, with 0.72% considered catastrophic.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91228980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A stochastic jump model applied to collaborative queue-based high energy laser defense","authors":"Mitchell M Kracman","doi":"10.1177/15485129231161092","DOIUrl":"https://doi.org/10.1177/15485129231161092","url":null,"abstract":"High energy lasers (HELs) are evolving to provide an effective solution for air and missile defense. The emergence of this technology comes at a similar time to the development of cooperative and collaborative defense systems that collect and communicate data to inform decisions. This paper proposes a stochastic jump method for modeling the performance of networked HELs, defending against aerial threats which follow a queueing methodology. By drawing on an existing method that quantifies performance using the sum of sojourn times in a stochastic jump process, the model can predict the probability of survival when multiple effectors are tasked in defending against an arbitrary number of threats. The model can be applied more generally to processes with both waiting time–dependent service and finite existence. Furthermore, a new HEL counteraction probability model is developed to enable the demonstration and comparison of three different system collaboration methods in a future warfare application. Results suggest the prevailing superimposing laser strategy may be less effective than simple one-to-one allocation of lasers to threats. There may also be merit in targeting separate components of a threat’s structure.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85135786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}