MODELS & SIMULATIONS
The survivability of weapon systems and platforms and the protection of them against new, lethal, and asymmetric threat innovations are critical in today’s defense environment. Accordingly, the S&V community must apply lessons learned from combat and tests to improve future system designs, performance capability, and survivability against anticipated lethal and non-lethal threats. The challenge for the survivability professional is to glean insights from combat and test data, find leading-edge technology solutions, and apply approved state-of-the-art methodologies.
Inquiries should be directed to DSIAC by visiting dsiac.org. Each inquiry should specify the computer and operating system (OS) on which the model will be executed as well as how the media should be written (e.g., CD-ROM, etc.).
All requesters must complete a memorandum of agreement (MOA), which must be signed and returned to DSIAC (requester must be on file before any software can be released). Contractors must have this statement signed by the contractor’s Government contracting agent to certify need-to-know.
Information on model training may also be obtained by contacting DSIAC. Model training fees vary based on the resources required for training preparation and administration. Note that user group meetings are informal and are free of charge.
For frequent users, the DSIAC subscription plan can provide a substantial savings over the individual purchase price of models and modeling services. The basic subscription plan includes the price of one model/documentation set and allows half-price attendance for up to two persons per organization for each workshop. The DSIAC subscription option is a cost-effective way for an organization to build its analysis capabilities.
ALARM
ALARM is a generic digital computer simulation designed to evaluate the performance of a ground-based radar system attempting to detect low-altitude aircraft. The purpose of ALARM is to provide a radar analyst with a software simulation tool to evaluate the detection performance of a ground-based radar system against the target of interest in a realistic environment. The model can simulate pulsed/Moving Target Indicator (MTI), and Pulse Doppler (PD) type radar systems and has a limited capability to model Continuous Wave (CW) radar. Radar detection calculations are based on the Signal-to-Noise (S/N) radar range equations commonly used in radar analysis. ALARM has four simulation modes: Flight Path Analysis (FPA) mode, Horizontal Detection Contour (HDC) mode, Vertical Coverage Envelope (VCE) mode, and Vertical Detection Contour (VDC) mode.
BLUEMAX6
BlueMax6 provides high-fidelity air-vehicle dynamics and Time & Space Position Information (TSPI) for constructive and virtual modeling simulation and analysis. BlueMax6 output can be fed directly into other models, such as ESAMS, ALARM, RADGUNS, SUPPRESSOR, JAAM, and the model can be directly interfaced to constructive non-real-time or virtual real-time environments.
ESAMS
ESAMS is a computer program used to model the interaction between an airborne target and a surface-to-air missile (SAM) air defense system. Detailed data have been abstracted from intelligence information and incorporated into the model to provide comprehensive representation of radio frequency (RF) land-based and naval-based SAM systems. The user has the option of specifying the threat site layout in various ways, including rectangular grid site arrays, circular site arrays, or semi-circular arrays, or by specifying specific sites one-by-one. Missile fire control, guidance, aerodynamics, and movement are also patterned. The model details the characteristics of both ground and missile seeker radar. ESAMS models aircraft from their signature data and optional vulnerability data.
BRAWLER
BRAWLER simulates air-to-air combat between multiple flights of aircraft in both the visual and beyond-visual-range (BVR) arenas. This simulation of flight-vs.-flight air combat is considered to render realistic behaviors by Air Force pilots. BRAWLER incorporates value-driven and information-oriented principles in its structure to provide a Monte Carlo, event-driven simulation of air combat between multiple flights of aircraft with real-world stochastic features.
IVIEW 2000
IVIEW 2000 is a post-processing graphical presentation package, for various computer simulations modeling multiple object engagements and is used to view player activity in a real-time movie-like 3-D display. It is a powerful and dynamic modular software package developed as an engagement reconstruction tool to meet the needs of the modeling, simulation, and analysis communities. Research applications include supporting analysis of aerodynamic system engagements, supporting dynamic weapon platform analysis models, and visualizing models for ballistic missiles and space systems.
RADGUNS
RADGUNS is used to evaluate the effectiveness of Air Defense Artillery (ADA) gun systems against penetrating aerial targets. It is also used to evaluate the effectiveness of different airborne target characteristics (radar cross section (RCS), maneuvers, use of electronic countermeasures, etc.) against a specific ADA system. RADGUNS is a complete one-on-one simulation, including weapon system, operators, target model (RCS and presented/vulnerable areas), flight profiles, environment (clutter and multipath), electronic attack, and endgame. RADGUNS can assess many aspects of a weapon system’s performance including target detection, tracking performance, probability of hit (Ph), probability of kill (Pk), expected number of hits, and the effects of jamming.
THUNDER
THUNDER is in the Air Force Standard Analysis Toolkit (AFSAT) suite of models and is a two-sided, theater-level campaign simulation. It has an extensive representation of air, land, and naval systems combined in a joint environment and simulates realistic geographic, environmental, and meteorological conditions. THUNDER provides analysts a tool to gain insights into the full range of potential outcomes of a military campaign and in turn provide decision-makers with quantitatively based results for various alternatives and course of actions.
VULNERABILITY TOOLKIT
The DSIAC Vulnerability Toolkit (VTK) is a suite of software tools supporting the performance of ballistic vulnerability and lethality studies involving military systems. The goal of the toolkit is to act as a “one-stop shop” for ballistic vulnerability/lethality analysis, providing analysts with the software needed to conduct pre-test predictions, concept evaluations, trade studies, and requirements compliance verification studies. The software provided with the toolkit helps the analyst to determine the probability of kill (Pk) for a system of interest given a particular ballistic threat impact.
WINFIRE
WINFIRE with the Fire Prediction Model (FPM) integrated simulates events that accompany a single threat penetrating through a vehicle and impacting a container of flammable fluid (e.g., a fuel tank or pressurized line containing fuel or hydraulic fluid). Specifically, the model predicts whether ignition would occur and continues modeling events through fire growth and spread. Simulating ignition is a unique capability that distinguishes FPM from other models outside the survivability discipline, which concentrate primarily on the sustained combustion phase of fires and do not address ballistic-initiated fires.